Technodaddys

Latest technology newsreviews,tips and tricks

Technodaddys

Daily Technology News Update

Technodaddys

Latest News and Reviews

Technodaddys

Best User Friendly Website

Technodaddys

Technodaddys.blogspot.com

Friday, December 31, 2010

Top 10 Most Deadly Computer Virus In The World

A computer virus can cause a lot of destructive damage. VIRUS is an acronym which stands for Vital Information Resources Under Siege. Viruses are sometimes confused with worms and Trojan horses, which are technically different. So, I recommend you to read this article Difference Between a Virus, Trojan Horse and Worm. You just imagine how big organizations, governments, schools,businesses and IT sector were affected when certain viruses attacked their systems.
Computer Virus creates lots of problem in an organization which would result in millions, even billions of dollars in damages and losses. Though not all of these malicious computer programs are massively destructive, there are still some that have caused a lot of damage.Checkout6 Techniques used by malware composers to know more about malwares. Here are the top 10 most destructive computer viruses of all time.
1. Bagle
Bagle was detected in 2004, it infected users through an email attachment, and also used email to spread itself. Bagle did not rely on the MS Outlook contact list to make a list of where to send itself. It harvested email addresses from various document files stored in the infected computer – from plain-text files to MS Excel files. The danger of this virus was that its design opened a backdoor where a remote user could gain access and control of the infected computer. It could download additional components to either spy and steal information from the user or launch DDoS attacks to certain networks and computers.
2. Melissa
Melissa virus was made in 1999 by David L. Smith, created with Basic program, exactly with Microsoft Word macros. The Melissa virus was mass-mailing malware that was said to have infected up to 20 percent of computers worldwide. This virus spreads via email with the document “Here is That document you asked for, do not show it to anybodey else”. When this file will be opened or clicked it will automatically run the virus replication and automatically send a pass up to the top 50 in the address book of an email. Email servers around the world were forced to shut down in order to prevent the virus from spreading, as well as to remove the virus from their system.Smith was jailed 20 months and fined $ 5,000 and prohibited from accessing the computer without supervision.
3. Sasser
Creator by 17 year old German student, Sven Jaschan in 2004. Sasser attack Microsoft Windows. Sasser does not spread via email. The virus is usually spread through the network. It infected computers by exploiting vulnerability present in both Windows 2000 and Windows XP machines, known as the RPC (Remote Procedure Call) exploit. This will create a computer virus could not be shutdown without unplug the power. Jaschan Finally caught but he’s not jail, was only given probation 1 year 9 months, because at that time still under the age of 18.
4. ILOVEYOU a.k.a. Lovebug/Loveletter Virus
This virus started spreading in the Philippines, these virus classified as worm, which has the ability to do her own replication. Creator Onel de Guzman was from the Philippines. ILOVEYOU spread via email, with the title “love letters” from a secret admirer. Once opened, it loaded itself to the memory, infecting executable files. When a user received and opened the email containing the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”, the computer became automatically infected. It then spread itself by infecting *.exe,*.jpg,*.mp3 files. After that, the virus sent itself to others by looking up the addresses contained in the MS Outlook contact list. The virus was written by a Filipino programmer who was still a college student at that time. He said the release of the virus was only “accidental.” This virus spread throughout the world in just a day, infecting computers of large corporations and governments, including the Pentagon in the United States. It caused billions of dollars in damages. The actual “damage” occurred during the removal of the infection from computers, as email servers and computer networks had to be shut down before the virus could be removed.His original file LOVE-LETTER-FOR-YOU.TXT. vbs.
5. MyDome
MyDome virus was detected in 2004. This virus is making a backdoor on the OS. Computer was first known attack on first February by doing DDoS. Then reported back to attack on the 12th of Feb, after that the virus stopped spreading and start creating backdoors. MyDoom spreads via email. MyDoom slowed down global Internet access by ten percent, and caused some website access to be reduced by 50%.
6. Leap-A/Oompa- A
Mac that has a concept of security through obscurity, Mac believe thea system can’t be infected by a virus of cause of the OS system is a closed. But in the year 2006, Leap-A virus or commonly known as Oompa-A appears and spreads via iChat on the Mac. Having a Mac attack, the virus will search for contacts via iChat and send messages to each contact. The message will contain a form of corrupt JPEG file. It’s not dangerous, but this proved that the Mac OS systems are not immune to the virus.
7. SQL Slammer
Appeared in January in the year 2003, spread quickly via the Internet. It caused a considerable amount of damage, though, by overwhelming routers, causing them to shut down. The target of this virus was web servers running a vulnerable version of Microsoft SQL Server. Upon infection of a server, the virus generated random IP addresses through which it attempted to further infect other computers.This virus has also been a U.S. Bank ATMs crash, the collapse of Seattle’s 911 service, and Continental Airlines.
8. Nimda
Reported attacks in 2001, call Nimda taken from opposite the word “Admin”. With its multi-pronged attack, Nimda appears to be the most troublesome virus of its type that has yet appeared. Its name (backwards for “admin”) apparently refers to an “admin.DLL” file that, when run, continues to propagate the virus.These viruses spread very quickly, according to TruSecure CTO Peter Tippett, Nimda only takes 22 minutes to make the Top Ten Virus at the time. The main target of this virus is Internet servers, Nimda spread through Internet network by creating a backdoor into the OS.
9. Code Red
The world had not yet recovered from the damage caused by the ILOVEYOU virus when Code Red was released in simmer 2001.Code red virus attacks only Windows 2000 & NT OS. This virus will create a buffer becomes full so make the memory becomes full. Once a computer was compromised by the virus, it would modify the handled website, displaying the message “Welcome to http://www.worm.com! Hacked by Chinese!” Then, it would later seek other computers running the web server software and do the same thing. After about two weeks of infection, the virus was programmed to launch DDoS (Distributed Denial of Service) attacks on certain websites, including the server of the White House.
10. The Klez
This virus was first known infected on 2001, this virus spreads via email by conducting continuous replication, and sent to all email addresses in the victim’s address book. This virus makes the victim computer becomes very slow and can also turn off the antivirus application.
Checkout these Antivirus | Spyware | Security articles to secure your Pc from Malware attacks.

If I missed out any destructive virus add it in comment.

Suspicious Account Activity Now Shown In Google Account Dashboard

Google introduced a suspicious account activity warning system in Gmail back in march 2010. Google just compares gmail login system IP addresses of computers. Gmail logins from different regions in the world, for example the U.K and India in short time would trigger the warning notification, giving Gmail users the chance to react promptly by changing the account password to protect further abuse.
I recommend you to read these 2 articles,
How To Check Whether My Orkut/Gmail Account Hacked or Not ?
How To Get Back Your Hacked Gmail/Orkut/Google Account ?

The above two articles must me know to every Gmail users.
How does this work?
Using the IP address you provide to us, our automated system can determine your broad geographic location. If you log in using a remote IP address, our system will flag it for you. So if you normally log into your account from your home in India and then a few hours later your account is logged in from U.K, you’ll get a notice like the one above at the top of your Dashboard page – alerting you to the change and providing links for more details.
Recently Google rolled out this Security feature to all Google services, and will display suspicious account activity in the Google Dashboard.
Two links are provided in the Dashboard notification message,
1. Details &
2. Change Password.
Check the below screenshot which clearly reveals Gmail login details from different IP address within minutes,

Detials:
Details opens a small popup with additional information about the account activity listing the location, IP address and date and time. The alert can be ignored or closed in this popup.
Change Password:
The other option is to change the Google Account password, an option that is also provided directly in the initial notification message.
I recommand you to read this article which will guide you to create a strong password for your email accounts.
Stay protected with your Google accounts…

5 Way to Have Fun With Google Search


Google search engine
got lots of fun oriented search results and easter eggs. Impress your friends with these fun search and have a nice time in using Google search engine.Lets now play with Google,

1. Go to Google.com, type in “Lol limewire” and click “I’m Feeling Lucky”
Just see whta happens.
2. Type “world cup” in Google Search box and hit google search.
On search result page you will see GOOOOOOOOOOAL instead of gooOOOgle at bottom of page!!
3. Type “Who Is The Cutest” in Google Search and hit search.
Biggest Lie Ever waiting in first result.
4. Type in “Ewmew Fudd”. Click “I’m feeling lucky”
5. Make Google Dance
Typegoogle loco and Click “I’m feeling lucky”
The google loco starts dancing!
Check out more Google fun by typing the follwing things and click “I’m Feeling Lucky”
  1. Google 133t 
  2. Google gothic 
  3. xx~klingon
  4. xx~piglatin
  5. Google easter egg
  6. Google Bearshare
Checkout, Gtalk/Google Talk Tips & Tricks
Add if you know more…Add it in Comment.

How to Install Ubuntu Control Center in Ubuntu 10.04

Simple Tool for Ubuntu Administration
Ubuntu Control Center(UCC) is an application inspired by Mandriva Control Center and aims to centralize and organize in a simple and intuitive form the main configuration tools for Ubuntu 10.04. Ubuntu Control Center uses all the native applications already bundled with Ubuntu, but it also utilize some third-party apps like “Hardinfo”, “Boot-up Manager”, “GuFW” and “Font-Manager”.
Here I provide step by step tutorial for installing Ubuntu Control Center,
1. First download these three packages.



  • Font Manager.
  • jstest-gtk.
  • UCC
2. Then install Font Manager .deb package by double clicking it.
3. After that double click jstect-gtk .deb package the installation process will start.

4. Finally install Ucc .deb package.

5. Now we have successfully installed Ubuntu Control Center.
6. To use UCC goto Applications –> System Tools –> Ubuntu Control Center.
Now take some administrative control over Ubuntu 10.04 Linux
Read these 2 useful Ubuntu articles from Geekyard,
Ubuntu 10.04 Adds New Lightware Themes
Ubuntu 10.04 Radiance & Ambiance Themes For Google Chrome.

Top 10 Popular Posts for June 2010

Here is the Google Analytics pageview report of June 2010 . Totally 9800 visitors visted &  total of 21,440 pageviews were viewed.Here is the list of Top 10 articles of the month,
1. How To Fix “Bootmgr is missing” in Windows Vista
There are 5 Methods to solve this Problem.Firstly, I’ll start with the easier solutions just in case one of those happens to work. If not, we’ll go to the more complicated solutions.
2. Top 5 Windows Xp Logon Screen – Part 1
Windows Xp Logon Screens in different categories like Nature,FBI,CIA,Windows 7, Dragons,Hitman,Abstract,Biohazard,Umbrella Corporation etc.
3. How to Make Any Portable Application
In this Tutorial i am going to provide step-by-step instruction along with Screenshot to create Portable Appz .
4. Top 10 ways to Tweak your Windows Xp
Got bored with Same old Xp Themes and Boot Screens and Logon Screens ?
I am going to discuss briefly about 10 different ways to Tweak your Xp and Make it totally different from Others.
5. Remove AUTORUN.INF from infected computers
Remove Autorun.inf Manually here i have given 3 methods .Choose anyone Method to remove the Virus…
6. How to remove write protected error for the flash drive
Some times USB drive becomes write protected and deleting/Copying files or Folders on the USB drive is not Possible.
Let’s now see how to remove write protection on your portable devices like pen drives, memory cards, iPod and other USB mass storage devices.
7. The 10 Best Hacker Movies
Here is a list of 10 Best movies for computer lovers. Most of these hacker movies are good escapist fun. You can’t learn hacking into computers by watching these movies. But surely you can get some keywords regarding hacking into remote box.
8. Ubuntu 10.04 LTS Released
Ubuntu 10.04 LTS is also the 12th release of the Ubuntu OS and, being an LTS (Long Term Support) release it will be supported for 3 years on desktops and 5 years on servers.
9. Remove Khatra.exe | gHost.exe | Xplorer.exe virus From Your Computer
I face many problems with Khatra.exe virus on my computer,it runs in Process how can I remove it ? Checkout to Manually Remove instructions.
10. Tansparent/Glass Command Prompt For Xp and Vista
When you think of Linux or Mac what strikes your mind first is Transparent Terminal.But this freature of Transparent Command Prompt is missing in Windows XP or Vista.If you like to work in a Stylish Windows Atmosphere this hack is an addon.Ok,let us first see how to do this hack in Windows Xp.

How do I set the sleep time in Windows 7?

Problem:
I am new to Windows 7 I dono where is the settings to alter sleep time in Windows 7.
Solution:
The System administration settings on Windows 7 are totally different from Windows XP. You can use the built-in Windows 7 help system. Just type in “sleep” and see what you need!
1. Goto Control Panel in Windows 7.
2. Click “System and Security” , look for “Change when the computer sleeps” within the “Power Options” section,

3. Click on that and you’ll find that it’s really easy to tweak things as you desire,
4. Make the changes you want then click on “Save changes”.
Done!

Block Virus Or Trojans Being Transferred to Pendrive

Want to protect your USB Flash Drive, iPod and other removable USB storage device from getting infected from virus ?
Viruses spread fastly through pendrives when we use in schools, colleges and office. In order to prevent your USB Drive from getting infected, you will need to create some files on your pen drive like Autorun.inf file(Check this if you face Autorun.inf problem) and some other files which will later prevent the virus infection as these files being already created and cannot be deleted, so that virus or trojan cannot copy files and folders or create them on your USB Drive when you connect your drive to virus infected PC.
There some freeware to vaccinate your USB drives from virus infection. I have already discussed in detail about Panda USB Vaccine 1.0.1.4 .Today I came across a similar tool called USB Defender. Its really cool !!!

Features of “USB Defender”
USB Defender is a simple tool which extremely easy to use.
You can see just two buttons on it: “Protect” and “Unprotect”. First button you are using to vaccinate your drive,
Second button – to remove protection.

When you insert any pendrive USB defender program automatically detects it, if there is any protection active and only one button will be available for you.
USB Defender is fully portable – so you can take it with you wherever you want. Get USB Defender and take it for a spin to see what it can actually do for you!
I enabled show hidden files option and checked pendrive in windows Xp but I found no files. Then I rebooted the sytem and entered Ubuntu 10.04
I inserted pendrive and found USB defender added Autorun.inf and vaccinated it….

Give it a try today !!! icon smile Block Virus Or Trojans Being Transferred to Pendrive
0.0down Block Virus Or Trojans Being Transferred to Pendrive
USB Defender

LinkWithin

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More