A virus that attacks the web network

| Selasa, 19 April 2011

Onepointnet
Do you know the virus Downadup, new heuristics and other vb.
how to solve it easily:
1. Turn off the network (unplug the LAN / Disable LAN Card), it's good to first download the required applications found on the links below before turning off the internet.
2. Type msconfig in the Run menu (Start -> Run), and select Services. Turn off services that odd (usually a letter or number that does not irregular)
3. Then still in msconfig, select Startup. Turn off Startup that leads to the C: \ WINDOWS \ System32, and were deemed unnecessary. (To reduce the excessive memory usage and speed up a bit rate of PC / Laptop)
4. Now to My Computer, then type in his address C: \ WINDOWS \ Temp And delete all files in the temp folder (the folder does not need to be removed, if the error message because it can not be deleted, so be it, delete all files that get deleted )
5. After finishing at the temp, now type back in My computer at his address C: \ WINDOWS \ Prefetch and delete also all the files there.
6.Restart PC / Laptop
7. If there is a virus Avast AV updated please scanning Via Safe Mode.
8.Repair registry with SmadAV.
So how to mngatasi virus that attacks the Internet network berikuta I will explain about the media are usually used as a place to spread.
According to security researchers at WatchGuard, the threat to corporate networks of the fastest growth today are web-based social media applications. The application of this type could cripple network security, open and sensitive data can mengurasi employee productivity.
There are a number of reasons why the application of social media can bring risks to the business, of any size. Here are a few:
• Loss of productivity: A number of research organizations have reported that the United States lost milliaran dollars per year due to reduced productivity. Employees lose productivity because the time is sucked into the social media sites. While social media sites are also useful for collaboration and communication, IT administrators do not have the ability to manage and control the web applications for business productivity or Web application in the form of games.
• Loss of Data: Although a number of countries already have rules about confidentiality of data, businesses are still concerned about data leakage, whether intentional or not. Unfortunately the power of social media as a medium of communication on the other hand creates a potential risk of leakage of information and confidential data. Administrators should have control over the application to reduce the risk of losing data, intentionally or not.
• Malicious software (malware) and the source of the attack: WatchGuard predicts that social networking will become a source of malware attacks in recent forward for three reasons:
(1) Social networking sites developed on the basis of trust. The purpose of the use of social media is to interact with people who are considered 'friends'. That is, there is confidence in these interactions. In fact, social media does not have the technical ability to validate whether they are considered friend is who he really is. Environment based on trust in social media is a fertile field for fraud with the method of social engineering (social engineering).
(2) Social networking sites have many technical weaknesses. Web 2.0 technology is promising a number of advantages, but in it was also stored various weaknesses. The complexity of developing Web 2.0 applications can create errors in the programming code so that applications are vulnerable to Web application threats such as SQL Injection and cross-site scripting attacks (XSS). Moreover, the concept of Web 2.0 that allows users who do not know their credibility incorporate Website content into conflict with the traditional security paradigm. Put simply, social media websites are more vulnerable to exploitation Web weakness than a website that is not interactive.
(3) The popularity of social networking. According to the analyst Compete, Facebook is the purpose of surfing the Internet the most popular after Google, followed by Twitter and YouTube. The attackers interested in the popularity of sites like that because they can get a 'payback' for the attack they did.
Various reasons above, research Watchguard has compiled a list of social media at high risk for corporate network security:
1. Facebook. Social networking site Facebook has become the most dangerous moment, because it is so popular among users, including businesses. With more than 500 million users, Facebook has become fertile ground for hackers (hackers). Plus a number of technical concerns, such as open App API (Application Programming Interface).
2. Twitter. Many people do not think the threat could come from only 140 characters, it is a false assumption. In some cases, a short Twitter posts are creating the weakness of penyingkat URL. Facilities penyingkat this URL can indeed save the character, but hackers could be misused to create malicious links. Additionally, Twitter is threatened attack from related weakness Web 2.0 and API, including worms.
3. YouTube. As one of the most popular video site on the Internet, the hackers also targeted YouTube. The hackers often create malicious Web page that masquerades as YouTube video page. In addition, the attackers are often flooded the comments section of YouTube with spam and malicious links.
4. LinkedIn. LinkedIn carry heavier loads because these sites are generally oriented business. This also attract hackers because it is very reliable. Because many users of LinkedIn use this site to establish business relationships, they generally display the information that could be sensitive and confidential, without them knowing it.
5. 4chan. Is a website to share images that are very popular. 4chan has been heavily involved in various Internet-related attack "anonymous," which is the only username is obtained users. The hackers 4chan forum flooded with spam.
6. Chatroulette. Is a website that allows users Web camera chat with other people at random. Anonymous nature of the website has become soft targets for Internet predators.

0 komentar:

 

Copyright © 2010 onepointnet