Computer Viruses that Come a Calling

Wednesday, October 29, 2008 · 0 comments


Every day new computer viruses are CREATED to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.
Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

Virus: W32.Beagle.CO@mm
A mass-mailing WORM that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

Virus: W32/Netsky-P
A mass-mailing worm which spreads by EMAILING itself to addresses produced from files on the local drives.

Virus: W32/Mytob-GH
A mass-mailing worm and irc backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus: W32/Mytob-EX
A mass-mailing WORM and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER

This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

Virus: Zafi-D
A mass mailing worm AND a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to "We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)"

Computer Viruses that Come a Calling

Securing Your Computer System

· 0 comments

Today , more and more people are using their computers
for everything from communication TO online banking
and investing to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some MAY be looking to phish your personal information and identity for resale,
others simply just want to use your computer as a platform from which to attack other unknowing targets. Below are a few EASY, cost-effective steps you can take to make your computer more secure.

1. Always make backups of important information and store in a safe place separate from your computer.

2. Update AND patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. THIS program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to LOCATE possible patches for your Office programs.

3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can ALL easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.


4. Review YOUR browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are RELATIVELY harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a MINIMUM set your security setting for the "internet zone" to High, and your "trusted sites zone" to medium Low.

5. Install antivirus software and set for automatic UPDATES so that you receive the most current versions.

6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because MANY viruses can spread from a familiar address.

7. Do not run programs from UNKNOWN origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They MAY contain a Trojans horse waiting to infect a computer.

8. Disable hidden filename extensions. By default, the Windows operating system is set to "hide file extensions for known file TYPES". Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you ARE more likely to see any unusual file extensions that do not belong.

9. Turn off your computer and disconnect from the network when not using the computer. A hacker can NOT attack your computer when you are disconnected from the network or the computer is off.

10. Consider MAKING a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of YOUR system.


Securing Your Computer System

Why we require a security software?

Wednesday, October 15, 2008 · 0 comments

In this risky environment , you and your system may be prone to internet attacks. Those who are not giving care to this kind of activities seems to be vulnerable.So please don't be a person like that. Give enough preference to the security side. Otherwise , someone else will be using your credit card number for his purchase.


Here "LIMITED SERVICE" is providing latest internet security softwares.

STATUTORY WARNING: Please try to use the genuine one...but one key that's valid is placed along with all our updations.


Note: you will be able to get the updates.Try browsing our tabs above...McAFee, Norton, Kaspersky, AVG, and alot more in the near future...stay in touch..