Wednesday, December 22, 2010

Essay On Cameras In Schools

How to prevent your PC from becoming a zombie. New trick

Online, wars are not fought with rifles and cannons, but with viruses and high-speed connections. "The most damaging weapon? The DDoS or DoS attacks, a "trampling" coordinated able to knock down almost any website within hours. The example most famous is the Operation Payback, in defense of the controversial WikiLeaks web , which consisted of attacks sites MasterCard and PayPal, among others.

And the army? Are computers infected by a particular type of malware, botnet virus . Trojans this turns a PC into a remotely piloted robot, fodder for battles whose captains are petty vandals, the script-kiddies . Defense is very difficult, but it is possible to avoid join the zombie army . First, however, be discovered one thing: Have you been infected?

you part of a botnet?


pathways to convert itself into a zombie PC are varied, but almost all involve the execution of malicious code inadvertently, especially on computers that have not applied the latest security patches. Some of the most common forms of infection are:
    patches or cracks
  • commercial programs to check out
  • Malware hidden in Java, ActiveX controls or accidental discharges
  • Trojan (fake antivirus and P2P applications)
  • Virus attachments Worms
  • emails
  • that build connections without firewalls
To carry out their attacks, botnets need always-on computers with free Internet access, so infections are difficult to detect. ESET antivirus company has compiled a list of symptoms (similar to Microsoft's ), if your situation matches the one described, it is possible that your PC is a zombie.
  • The computer operates without human intervention
  • Problems shutting down or off defective
  • unusual slowness while browsing and sending e
  • significant performance decrease
  • Failure to update the antivirus
  • strange messages appear
After infection, very discreet, hidden process remains pending orders of the "shepherd" the villain behind the zombie network. His command can only be achieved if the machine is turned on, connected and no firewall involved.


Programs like TCPView CurrPorts or help you discover hidden processes that are using the Internet, one of them could be a virus. Another great diagnostic tool-is-very advanced BotHunter specialized in detecting botnets and available for Windows, Mac and Linux.

The killer bots: RUBotted


Sometimes a standard antivirus is not enough to free the computer from the state of slavery, although its activation and updates, and use a firewall (eg, the one included in Windows) are strongly recommended preventive measures. If you want a specific vaccine, testing RUBotted Trend Micro.


RUBotted controls network activity and running processes looking for suspicious patterns. In case of detecting malicious activity, alerts the user and provides options for disposal. Among the alternatives are the RUBotted Tool Malicious Software Removal Microsoft and others free vaccines.

prevention: the black sheep of the flock

Removing the infection will avail you very little if your computer is still a comfortable home trojans and malicious scripts . The five measures presented below should be sufficient to increase the security of your computer and prevent it from becoming a zombie in the service of cyber-hooligans: Keep
  1. update your operating system, antivirus and antispyware Download
  2. free firewall on or off the Windows
  3. Activate your router firewall to keep intruders
  4. Use a secure browser and follow these recommendations
  5. Disconnect the computer from the Internet when you're not using .
Article contributed by Fabrizio Ferri softonic OnSoftware Editor.

0 comments:

Post a Comment