Monthly Archives: June 2010

Malware infections — prevention and cure

A simple look at statistics from last 24h in virustotal.com site reveal the fact that only 2% from the files submitted are detected by the ALL antivirus engine, for the rest of 98% one or more antiviruses are failing in detection.   There is tests that shows aproximately only 20% of new trojans are detected by an antivirus, any of them, it does not matter but my believing is the percentage is in reality lower than 20%, maybe 1 -5 % of new trojans – zero day attacks are detected by an antivirus because speaking of unknown and newly  created trojans, only heuristic and file emulation can be used  as …

Continue reading

Posted in Thoughts.

What not to click ?–Clicking & Phishing

Unless you are a Command Prompt guru, you normally will use the computer by clicking “things” on the desktop,  so you have all the chances  to get infected clicking “bad things” on the Web. The experts from the security vendor Avast, estimate that 85% from the computer infections are the results of using inadequate the Internet and clicking neglectful the links. The Social Networking sites as Facebook, Twitter, MySpace are the preffered targets of hackers, due to the high volume traffic they receive. It is well known the attacks using sexy video or naked photo links, the users attention beeing disturbed by the temptingly content. The rules for preventing computer …

Continue reading

Posted in Thoughts. Tagged with , , , .

Are the sensitive data permanently deleted ?

All of us know that every time when we are deleting a file or folder under Microsoft Windows, they are moved in the Recycle Bin folder giving us the chance to restore at a later date the deleted files form there. But after emptying the Recycle Bin ? Well, the files and folders can be restored after that as well, but the procedure is a bit more complicated, must be used some software to recover deleted data, as WinUtilities Free Undelete 3.1 (free) , R-Undelete File Recovery Software 3.5 , Undelete It! 3.17 or other software, there are a plenty on the Internet. The recovery procedure is based on the …

Continue reading

Posted in Thoughts. Tagged with .

The hashes, shortest way to verify suspected files

Without doubt, scanning files with multi-engine online scanners like virustotal.com gives us the most accurate results about the possibility for a file to be infected because this kind of service will scan the file not with only one AntiVirus, but with more than 40 AntiVirus engines and is one of the best way to assure our computer will not be infected with malware, always the prevention is better than cure. The only problem with such services is the necessary time to upload the file which require some time, especially when their service is overloaded. A quick  solution to this is to install a small program called HashTab 3.0 , a …

Continue reading

Posted in Thoughts.