INFINITY Ultimate

Thanks For your comming....
give me your appreciated to click "one" my adv



...............Read More
Judul saya

isi laman

Sunday, August 2, 2009

understand about the VIRUS

The virus is a program I can reproduce itself and spread itself in a way to smuggle another program.
Trojan is a program of undercover as a normal file, but once executed weather damage. The difference trojan blm dpt mereplikasi himself.
Worms do the program using the network weaknesses and security for mereplikasi himself. Results replicate this computer will search for other sentient diinfeksi, and then re-breed.

various virus attacked you based on:
  1. Boot sector viruses: the boot record, MBR, FAT, and the partition table.
  2. virus file: a file a certain attack.
  3. macro virus: the program you run the macro spt word, excel, access.
  4. companion virus files: work in DOS
  5. virus cluster: change directory information, shg akan execution data in the file referring to the virus.
  6. virus batch file: the file. BAT
  7. virus cource code: insert code into the source code program.

various based on how the virus works
  1. sparse infector: using techniques menginfeksi only files with certain conditions.
  2. Stealth virus: able to enlarge the size of the file is not detected shg
  3. multipartite virus: virus resoluble do some combination of multi-infection teknik2 existing
  4. virus encryption: encryption code has a code to disguise the viral
  5. virus polimorfis: motile signaturenya, shg difficult dikenali AV
  6. armored virus: I use techniques berlapis2, usually large.
  7. cavity (spacefiller) virus: insert code into a file accessible shg time, page file will execute the virus code first.
  8. tunneling virus: create a kind of alley to avoid the AV
  9. camouflage virus: AV exploit weaknesses I rely on signature databases.

Signs exposed to the virus:
  1. AV mendetek the virus.
  2. Computer becomes slow, often crash, restart, out of memory
  3. AV plump damaged you, disable and enable ga bs in the back.
  4. plump your computer infested with strange files.
  5. plump drive supplied preformatted data2 or you lost.
  6. Dialog boxes appear / message boxes
  7. Icon appears ga I have relationships with the program I had you install
  8. Blg what your friends you have dng send an email attachment, usually extnya. Exe,. Bat,. Scr, and. Vbs, but you do not feel has been send.

Trojan and worm viruses including category, so STEP 2 and prevent it together.
How to prevent:
  1. I use the AV real time scanner
  2. Scan all the files first before the new executable.
  3. I use a secure browser
  4. Do not visit the web .. do u know it
  5. Dont recklessly opened the attachment, the files do you download / file sharing. Should scan the executable before.
  6. do not let someone you trust 100% to use your computer.
  7. Backup all data, including registry.
  8. OS tighten security, updates, patches, settings do bener.
  9. Use a firewall. We recommend you have a filter file2 ext as follows:
  • . API = Acrobat plugin
  • . BAT batch file =
  • . = BPL Borland Package Libraries
  • . = Compiled CHM html help
  • . COM = command file
  • . CPL = Windows control panel extension
  • . DLL = dynamic link library
  • . Dpl = Delphi Package library
  • . = Drv Device driver
  • . EXE = Windows executeable
  • . Hta = hyper text application
  • . JS = java script
  • . OCX = Object linking and embedding control
  • . = PIF program information file
  • . pl = pearl script
  • . = SCR screen saver program
  • . SHS = shell scrap object file
  • . SYS = system configuration file
  • . = Vbs visual basic script
  • . VBE = encoded visual basic script
  • . = VXD virtual device driver
  • . WMA = windows media audio
  • . WSF = windows script file
  • . WSH = windows script host settings
  • . = redhat rpm package manager
  • . sh = shell script

need to remember everything ext above program is evil. So it's in the firewall settings in order to provide notification when there is a file with ext over I want to go to the computer.

How to:
  1. Scan with the AV you have update, use safe mode when the virus still be naughty.
  2. no catch, try to use online AV. Use the online scanner you different from the AV do you use the computer.
  3. Use the special removal tool. To download the bs in the following link2.
  4. If you use Norton GoBack / Deep Freeze program ato image, be grateful, to live in goback to the virus before infection. Special DF, immediately restart your computer.
  5. If for example all the way over ga bs, try the email to aja "virus@vaksin.com", who is dependable gift. also to "scan@virustotal.com"

How to select good AV
  1. see frequensi upate, the more the better cepet, liat jg responnya thdp new virus appears.
  2. Resource needs, the more light the good of course, what make you computer ud , this never considered.
  3. Complete protection, is there any anti trojan, worm? have also firewallnya? cek email? etc.
  4. Cost, the cheaper the more ya do it
  5. It's real time scanning, kalo ga jgn should have chosen. Kalo ga bs or made as a backup AV ke2
  6. Ability repair / heal infected files do.
  7. Support. How is the quality of service?
=======================================

Buat yang belum paham ttg VIRUS

Virus adalah sebuah program yg dapat menggandakan dirinya dan menyebar dengan cara menyusupkan dirinya ke program lain.
Trojan adalah sebuah program yg menyamar sebagai file biasa, namun begitu dieksekusi dpt merusak. Bedanya trojan blm dpt mereplikasi dirinya sendiri.
Worms bagian program yg menggunakan kelemahan network dan keamanan komputer untuk mereplikasi dirinya. Hasil replikasi ini akan mencari komputer lain yg dpt diinfeksi, dan kemudian kembali berkembang biak.

Macam2 virus berdasarkan yg diserang :
  1. virus boot sector : menyerang boot record, MBR, FAT, dan partition table.
  2. file virus : menyerang sebuah file tertentu.
  3. virus makro : menyerang program yg menjalankan makro spt word, excel, access.
  4. companion file virus : bekerja di dalam DOS
  5. virus cluster : mengubah informasi direktori, shg eksekusi data akan di arahkan ke file virus.
  6. virus batch file : menyerang file .BAT
  7. virus cource code : menyisipkan code ke dalam source code program.

Macam2 virus berdasar cara kerjanya
  1. sparse infector : menggunakan teknik hanya menginfeksi file dgn kondisi tertentu.
  2. virus stealth : mampu memperbesar ukuran file shg tidak terdeteksi
  3. virus multipartite : virus yg dpt melakukan multi infeksi dg gabungan teknik2 yg ada
  4. virus enkripsi : memiliki kode enkripsi untuk menyamarkan kode viral
  5. virus polimorfis : dpt mengubah signaturenya, shg sulit dikenali AV
  6. armored virus : menggunakan teknik yg berlapis2, biasanya berukuran besar.
  7. cavity(spacefiller) virus : menyisipkan code ke dalam suatu file shg saat diakses, file tsb akan mengeksekusi code virus terlebih dahulu.
  8. tunneling virus : membuat semacam lorong untuk menghindari AV
  9. camouflage virus : memanfaatkan kelemahan AV yg mengandalkan signature database.

Tanda2 terkena virus:
  1. AV mendetek adanya virus.
  2. Komputer menjadi lambat, sering crash, restart, out of memory
  3. AV anda tiba2 rusak, disable dan ga bs di aktifkan kembali.
  4. Tiba2 komputer anda penuh dgn file2 aneh.
  5. Tiba2 drive anda terformat atau data2 anda hilang.
  6. Muncul dialog boxes/ message boxes
  7. Muncul icon yg ga ada hubungan dgn program yg pernah anda instal
  8. Teman anda blg kalo anda telah mengirim email dng attachment, biasanya extnya .exe, .bat, .scr , and .vbs, namun anda tidak merasa telah mengirim.

Trojan dan worm termasuk kategori virus, jadi langkah2 mencegah dan mengatasinya sama.
Cara mencegah :
  1. Gunakan AV yg real time scanner( inget di update yg rajin ^_^)
  2. Scan terlebih dahulu semua file baru sebelum dieksekusi.
  3. Gunakan browser yg aman
  4. Jangan mengunjungi web yg..u know lah ^_^
  5. Jgn sembarangan membuka attachment, file yg anda download/ file sharing. Sebaiknya di scan terlebih dahulu sebelum dieksekusi.
  6. Jgn biarkan seseorang yg tidak anda percayai 100% menggunakan komputer anda.
  7. Backup semua data, termasuk registry.
  8. Perkuat OS security, update, patch, setting yg bener.
  9. Gunakan firewall. Sebaiknya filter file2 yg memiliki ext sbb :
  • .API = Acrobat plugin
  • .BAT = file batch
  • .BPL = Borland Package Libraries
  • .CHM = compiled html help
  • .COM = command file
  • .CPL = Windows control panel extension
  • .DLL = dynamic link library
  • .DPL = Delphi Package library
  • .DRV = Device driver
  • .EXE = Windows executeable
  • .HTA = hyper text application
  • .JS = java script
  • .OCX = Object linking and embedding control
  • .PIF = program information file
  • .pl = pearl script
  • .SCR = screen saver program
  • .SHS = shell scrap object file
  • .SYS = system configuration file
  • .VBS = visual basic script
  • .VBE = visual basic encoded script
  • .VXD = virtual device driver
  • .WMA = windows media audio
  • .WSF = windows script file
  • .WSH = windows script host setting
  • .rpm = redhat package manager
  • .sh = shell script
Tp perlu diingat ga semua yg ext diatas adalah program jahat. Jadi sebaiknya di firewall di setting agar memberikan notifikasi apabila ada file dgn ext diatas yg ingin masuk ke komputer.

Cara mengatasi :
Scan dengan AV yg sudah terupdate, gunakan safe mode apabila virus masih membandel.
Ga mempan, coba gunakan AV online. Gunakan online scanner yg berbeda dari AV yg anda pakai di komputer.
Gunakan removal tool khusus. Untuk download bs di link2 berikut.
Apabila anda menggunakan Norton GoBack/ Deep Freeze ato program image, bersyukurlah, tinggal di balikin aja ke keadaan sebelum terinfeksi virus. Khusus DF, langsung restart aja kompienya
Kalo misalnya segala cara diatas ga bs, coba aja di email ke "virus@vaksin.com", siapa tau dpt hadiahnya. Atau bs juga ke "scan@virustotal.com "

Cara memilih AV yg baik
  1. Liat frequensi upate, semakin cepet semakin baik, liat jg responnya thdp virus yg baru muncul.
  2. Kebutuhan resource, makin ringan makin bagus tentunya, tp buat yg komputernya ud kueren, hal ini ga usah dipertimbangkan.
  3. Kelengkapan proteksi, apakah ada anti trojan,worm? ada firewallnya juga? ngecek email? dll
  4. Biaya, makin murah ya makin bagus dunk
  5. Ada real time scanning, kalo ga ada sebaiknya jgn dipilih. Atau kalo ga bs dijadikan backup sebagai AV ke2
  6. Kemampuan reparasi/heal file yg terinfeksi.
  7. Support. Bagaimana kualitas layanan?
  8. Moga2 bs membantu member lain dalam memilih AV yg dia perlukan.
Original Articles : Artas [DS] Forum

0 komentar: