Monthly Archives: July 2010
Complementary security tools
It’s interesting what vision has PC users with not a lot of experience about their antivirus, how they feel about that software. It’s more about a feeling, yes, they perceive the antivirus like a comrade who defend them fighting back against all kind of nasty malware and zombies for their safety and peace, look how people speak about their antivirus : “my antivirus says this or says that…” Well, if it’s about a comparison between an antivirus and a bodyguard who must defend me against the Internet threats, the bodyguard is a blind person when it comes about new threats and here you must consider as a fact that daily …
"Hacking the Hacker" — Network Security
The common way to protect against network threats is installing a Firewall, which theoretically will block all attempting to establish a malicious connection, protecting the computer. It is well-known fact that always first step a hacker do trying to hack a computer in a network is a port scanning to find what ports are open and can be used to “communicate” with the target computer. Ports are in range from 0 to 65535, and some of them are assigned for special use as : File Transfer Protocol(FTP) connections — port 21 Telnet — port 23 Hypertext Transfer Protocol(HTTP) — ports 80 and 81 HTTP over Transport Layer Security — port …
Malicious behaviour — PC Confidential 2008
Today, when I was cleaning up my kids PC, I saw on the Desktop an object, kind of icon, with name “Shredder” without an extension and with a behaviour characteristic to many malware programs –it locks itself on the desktop taking off the possibility to delete it and it has only two context menu(right-click) options: Open Create Shortcut This is how the icon looks like : For all other files from the Desktop I have a lot of options as you all know like Delete, Rename, Cut, Copy, Open with, entries added by WinRAR(Add to archive), entries added by my antivirus for scanning the file in discussion, and entries …
Programs analysis tools — Sandboxie "add-ons"
These days, when many software vendors are ready to do anything to increase their incomes, including embedding adware and other unwanted programs in their products for advertising and marketing purposes, to analyse a program carefully before to run it, it’s a normal and desirable behaviour install it fully in the computer. I’m talking about less-known programs, sometimes spreaded as freeware, sometimes advertised as program that will do “miracles” in the computer and finishing dropping adware and spyware in the computer of a naïve user. Using virtual environments as a VMware machine, or a sandbox which will emulate an Operating System are the preffered methods for analysis because they give the …