Bloggers From Pemalang City, Indonesia
Join 4Shared Now! Get 4Shared Premium!

Minggu, 16 Mei 2010

Most Frightening 10th Computer Virus

VBScript type virus attack is still very high, it is evident from the many reports that complain about these types of script viruses. One virus that shot high into the first sequence is Discusx.vbs. If you still remember with these viruses, the Virus Top-10 March 2008 edition of the past, viruses Discusx.vbs ranked fifth, but this time he sped up to the first sequence. The following list details:

1. Discusx.vbs
VBScript viruses on this one, have a size around 4800 bytes. He will try to infect the multiple drives in your computer, including flash disk drive, which if infected shall make autorun.inf file and System32.sys.vbs on the root drive.
2. Reva.vbs
Again, the virus types that VBScript pretty much complained of by some readers. He will try to spread itself to every drive on your computer including flash disk drives. On the drive there will be infected reva.vbs files, autorun.inf, and shaheedan.jpg. In addition, he will change the default page of Internet Explorer that leads to http://www.arrahmah.com site.

3. XFly
PC Media Antivirus recognizes two variants of this virus, namely XFly.A and XFly.B. Just like most other local viruses, he created using Visual Basic. Has amounted to 143 360 bytes in body size without being compressed. And he may be disguised as a folder, MP3 files with WinAmp or any other way directly change the existing icon resource to its body. This will make more difficult for ordinary users in recognize. On infected computers, when running Internet Explorer, its caption is changed into x-fly "..:: ::..", and when starting Windows will appear the message from the maker of the virus in the default browser. Or every time show at 12:30, 16:00, or 20:00, the virus will display a black screen that also contains messages from the virus creator.

4. Explorea
Viruses that are compiled using Visual Basic comes with a size of about 167 936 bytes, without being compressed. Using the standard Windows folder icon similar to defraud victims. This virus will attack your Windows Registry to change the default open from a few extensions such as. LNK,. PIF,. BAT, and the. COM. On infected computers, certain times when the error message sometimes appears, for example when opening the System Properties.

5. Gen.FFE
Gen.FFE or manufacturer named Fast Firus Engine is one of the program Virus Generator locally made. By simply using this program, did not take long to create a virus / new variant. Viruses of the output of this program icon-like images using standard default Windows folder. He will block access to Task Manager, Command Prompt, and also eliminate some of the menu in the Start Menu. He also will read the caption of the current program, if there are strings associated with the antivirus program will soon be closed to him.

6. Empty
Viruses are also created using Visual Basic and had a folder icon has a size of about 110 592 bytes, without being compressed. There are so many changes that he has made in Windows, such as the Registry, File System, etc., which even can cause Windows can not be used as appropriate. On a computer that is infected by this virus, when starting Windows will display a message from the virus creator.

7. Raider.vbs
This VBScript virus type size of approximately 10 000 bytes, if the virus file is opened with Notepad for example, it is not a lot of strings that can be read by the encrypted condition. In the Registry, he also gave recognition to create a new key in HKLM \ Software with same name as the name of the computer name, the contents of a string value such as a virus, Raider, and the date the first time the infected computer.

8. ForrisWaitme
Viruses are created with Visual Basic uses the standard Windows folder icon similar to disguises. Some ulahnya is exchanged with the left mouse button function right, removes the Folder Options menu, create a file the message "read saya.txt" on the drive is infected, and there are still others.

9. Pray
Local virus was created using Visual Basic. We found two variants of this virus, for Pray.A variant has no icon, while for variant Pray.B using the icon-like Windows Explorer. If the computer is infected by this virus, while at the computer clock shows 05:15 AM, 13:00, 16:00, 18:30, or 19:45 and, this virus will display a message reminding the user to perform the prayer.

10. Rian.vbs
This VBScript virus has a size of 3788 bytes. When infecting, it will create new files autorun.inf and RiaN.dll.vbs on each root drive that is installed on the victim's computer, including the Flash Disk. Computers infected by this virus, caption of Internet Explorer will change to "Rian P2 Cantiq PR
Continue reading...

AIR (Adobe Integrated Runtime), a New Way Internet access as well Desktop

Adobe's latest re-launch the application which is surprising, because it can incorporate a variety of Internet access and multimedia applications into a single container. Containers are labeled by the Adobe AIR which stands for Adobe Integrated Runtime. AIR provides convenience for the user to access various Internet access and multimedia needs daily with enough run an application interface. Even more interesting is the AIR, the application can retrieve files from both local and Internet desktop in a similar way to then proceed to use a special file system. Thus, the user will hardly find a significant difference between accessing files from local desktop or from the Internet, because the user does not need another browser to search for data on the Internet.

AIR runs on Windows platform, although the development is also designed for MacOS. While for the Linux version will be released soon. To use the AIR, users can medownload first at http://labs.adobe.com installer for free, then install it on the computer. After all the installation process is complete, users can directly use it. Even more interesting, AIR does not include entry into the Windows registry, and did not use the library's Windows, so the bit does not affect the stability of Windows, not even no effect at all on Windows at the time of uninstall.

At the time of operation, the Adobe Integrated Runtime is working with three basic components to process data from the desktop and the Internet. The third component consists of the WebKit engine that functions as HTML, Flash Engine that functions almost like a Flash Player and SQL Lite.

As the software that runs with two input data, from the desktop and the Internet, the Adobe Integrated Runtime is taking preventive measures security by not letting any one application is installed without the user's knowledge. AIR confirmation process is always executed to secure existing systems will occur when the installation process.

Basically, the application called the Adobe Integrated Runtime is very interesting, because the user will be able to bridge the needs of a future application, where the user can access data from desktop and online Internet simultaneously. In other words, the Adobe Integrated Runtime is also a reflection of Web 2.0 application development with huge potential. (Dna)
Continue reading...

Local Eradicate Virus Manually

Faced with a variety of computer virus attacks - with OS Microsoft Windows, of course - most people will figure out how to get the latest antivirus and anti-virus for certain local viruses because most antivirus software can not detect it. In contrast to a very general way of thinking, I offer an alternative solution to deal with local virus that is Eradicate manually.

Viruses are programs / applications (= series of commands) that can reproduce themselves. Most programmers make these viruses as a series of commands that infiltrated into the ranks of the commands in other applications. Certain viruses can be programmed even sneak in the master boot record or specific sectors in the disk with special protection without being able to recognize the user as a file. Unfortunately, this clever work does not apply to most local viruses whose existence is very striking and inviting hostility.

Based on this weak point we can locally eradicate the virus manually. There are two common references in combating the virus manually, stop running the virus and eliminate viruses. Based on these two points are you can develop your own strategy depending on the case that you are facing.

Part I: Stop Running Virus

To attack the virus that created by Visual Basic (VB) - fortunately most of the local virus was made in VB - you can stop the virus running through 'remove' msvbvm50.dll and msvbvm60.dll which is in the directory c: windowssystem32 which is a virtual machine from the program -a program created in VB. The word 'remove' can be realized in various ways depending on the circumstances or the taste, which is removed (not recommended), moved to another folder, or replaced with another name. Also how can be done in various ways depending on the level of virus attacks from using Windows Explorer, command prompt on windows emulator (when the virus disable windows explorer), nor have to run windows in a fashion 'save mode with command prompt only' by pressing F8 on initial startup windows to display the startup menu. If the virus is still running, meaning the virus is not made in VB and to carry out the next steps you need to use Linux or another OS that is not installed emulator for windows programs.

Part II: Removing Viruses

To eliminate the viruses that you should do is gather all the files with the entry application via the find *. exe name, to identify applications which is a virus, and delete them. If you find the menu has been disabled by the virus, you can memanggilnuya by pressing F3 (much easier than having to edit the registry editor). Denouncing the program as a virus depends on the experience and your instincts, because its characters can be quite varied, but that should be the touchstone is that you are looking for things 'not as a proper and is in the proper place' or hidden impressed. Applications with the Microsoft Word document icon or folder icon could be adjudged as the virus directly, but any application with the usual icons should you suspect if you are not sure anyone ever move there. To minimize the scope, you also need to pay attention to the file size because many viruses that each have the same file size.

The applications that you have a verdict as the virus must be removed immediately by pressing the SIFT + delete. Previously, make sure all your data has been saved by copying the contents of documents and in-paste elsewhere in the state of virus is not runnig. Congratulations action.
Continue reading...

Selasa, 11 Mei 2010

Download Antivirus Handphone (HP) New.

download antivirus for mobile phones or the new HP I gave you that really want to download antivirus mobile phone which is now found in many many in the mobile phone virus that can make the application or HP you can make a damaged mobile phone you can not use the software because hp your application is broken due to the virus, many events as perna many people because the virus is very natural with the activities of your job.

Now you have a handphone nokia, samsung and Sony Erickson. Normal breathing relieved because of the antivirus software that can create comfort of no longer thinking about the damage that you use your mobile phone.

If you want to download you can download anti-virus software below :

1. NetQin Mobile Antivirus
Download : NetQin Mobile Antivirus
Type: Freeware

2. F-Commwarrior 2.0
Download : F-Commwarrior
Type: Freeware

3. AVG beta
Download : AVG beta
Type: Freeware

4. Airscanner Mobile Antivirus v2.0
Download : airscanner mobile antivirus
Type: Freeware

5. 1-2-3 Spyware Free Mobile
Download : mobile-22139-freeware
Type: Freeware

6. exoVirusStop
Download : exoVirusStop
Type: Shareware

7. Mobile Security Pack 2
Download : Security pack 2
Type: Shareware

8. BullGuard Mobile Antivirus 2.0
Download : bullguard mobile antivirus
Type: Trial

9. Kaspersky Mobile Security
Download : kaspersky mobile security trial
Type: Trial

10. ESET® Mobile Antivirus
Download : eset
Type: Trial 30-days

11. Avira Mobile
Download : antivir for mobile
Type: Trial 30-days


kaspersky anti virus

Latest versions

Continue reading...

Senin, 03 Mei 2010

Top Standalone Antivirus Software for 2010

We looked at eleven antivirus packages from around the world. G-Data Antivirus 2010 wins for its outstanding malware detection; Norton Antivirus 2010 comes in a close second thanks to its polished interface.

G-Data Antivirus 2010

Most security programs use a single antivirus engine, but the German-made G Data ($25 for a one-year, single-PC license, as of 11/20/09) uses two separate engines: BitDefender and Avast. That double coverage may have helped it rack up an impressive 99.95 percent block rate for traditional, signature-based detection of known malware, a rate better than that of any other app we tested. It was likewise strong at blocking annoying adware, running up a 99.8 percent score, and these strengths helped it earn top billing.

G Data's dominance continued on heuristic tests that use two-week-old signature databases and newer malware to simulate how well a program can detect threats that don't yet have a signature. In this test, G Data blocked 71.9 percent of the samples used by AV-Test.org--again, the best mark we saw. And in behavioral detection tests--which checks how well antivirus software recognizes malware based solely on what it attempts to do--G Data again led the pack by blocking 12 out of 15 test samples.

Despite this stellar performance, G Data AntiVirus isn't perfect. It put up a few false alerts in the behavioral tests and prevented three benign apps from adding Registry entries that would allow them to automatically start with your PC. And it didn't fare well at removing active rootkits, a type of stealth malware. It identified and blocked all ten test rootkits before they could install, but in the case of already-active rootkits, G Data removed only seven--fewer than any other program tested.

In on-access scan speed (how quickly the app can automatically check files when you save or copy them, for in­­stance), G Data finished in sixth place with a 10.15MB-per-second throughput.

G Data's user interface is clean and well organized, and makes it easy to get to most things from the opening page. Unlike many of the apps we tested, however, it requires you to select an action in a warning pop-up if it finds something suspicious on your hard drive. You can change that default action--to quarantine, for example--but this takes a little digging around in the settings.

If the program finds what it deems to be threatening code during a manual or scheduled scan, you'll have to double-click every item that it flagged and de­­cide what to do with each discovery. But the scan results window doesn't present this option intuitively.

Less technical users who are willing to forgo the best malware detection in favor of a more set-it-and-forget security solution might prefer our second-place finisher, Norton Antivirus. For anyone willing to put in a little extra effort, however, G Data is a clear choice.

DOWNLOAD G-Data Antivirus 2010

Symantec Norton AntiVirus 2010: A Polished Interface

Symantec's Norton AntiVirus ($40 for a one-year, single-PC license) offers some terrific extra features and a polished user interface. But subpar performance in one detection category prevented it from capturing the top spot in our chart of stand-alone antivirus programs.

In traditional detection tests using known Trojan horses, spyware, worms, and other baddies, Norton successfully detected 99.5 percent of samples from AV-Test.org. That's a good showing, but other apps did even better, leaving Symantec's entry in a middle-tier sixth place in this category.

Norton dropped toward the bottom in heuristic tests de­­signed to simulate a security program's ability to ward off new and unknown malware. It blocked only 42 percent of two-week-old signature files and newer malware, the second-worst showing in the bunch. But it did much better in behavioral analysis (which identifies malware based solely on how it acts), identifying and blocking 9 out of 15 samples, for third place. And it correctly removed the same number of files based on its behavioral analysis--better than any other app.

Norton's throughput of 9.26MB per second for automatic scans of files as they're opened or saved put it squarely in the middle of the pack. But it did a superb job of dealing with rootkits, blocking and removing all ten samples of this type of stealth malware.

While Norton's protection ability is decent (albeit not the best), it is head and shoulders above the rest in features and user interface. For example, the Insight feature lets you see Symantec's assigned reputation for a running program, or for a downloaded or saved file. These reputations are based on such factors as whether the file is digitally signed and how many other Norton users have it. The program uses that information to decide how thoroughly to scan any given download; you can use it to help you decide how much you want to trust a program.

Also impressive is a tool that offers a wealth of information about your PC's performance and history of changes, including when you installed programs, saved new downloads, or ran scans. One easy-to-read graph lists all the events that happened on a given day, while another shows how much of your CPU and memory was in use over time.

These and other features are easy to find in a smooth and polished user interface that includes plenty of quickly available descriptions. Settings are easy to reach, but techies might bemoan the lack of any option to have Norton ask you what to do when it finds a threat. The default action of removing or quarantining a discovered baddie is appropriate, but power users who want maximum control will be out of luck.

More technical users who are willing to deal with a less polished program in exchange for the best protection should take a look at G Data, the number one antivirus app in our roundup. For those more concerned with a smooth program that is less likely to require your attention, the number-two Norton is a good choice.

DOWNLOAD Symantec Norton AntiVirus 2010

Kaspersky Lab Anti-Virus 2010

Kaspersky's third-place ranking in our roundup of stand-alone antivirus programs reflects its ability both to impress and to disappoint. It pairs competent proactive protection with below-average signature detection, and a strong feature set with an at-times annoying user experience.

In traditional detection tests performed by AV-Test.org, this Russian-made program ($60 for a one-year, three-PC license) detected 97.27 percent of known malware samples--lackluster when compared with the performance of some competing apps we tested, which caught 99 percent or more of the threats. It fared better in heuristics tests that gauge how well a program protects against new malware with no known signature. At a time when the bad guys crank out astounding numbers of malware variants to evade traditional signature scanners, such proactive protection is more important than ever. Here Kaspersky came in third with a 66.83 percent block rate.

Like Norton, Kaspersky did very well in rootkit detection: It managed to detect, block, and remove all ten stealth malware samples that we threw at it. It also de­­tected and disabled all ten test infections, and proved more successful than most apps at getting rid of less harmful elements, such as Registry changes. Only Norton Antivirus and F-Secure Anti-virus were able to clear out more of the less-important junk.

In speed tests for automatic scans that typically occur when you open or copy a file, Kaspersky achieved a 12.15MBps throughput. Only the application from Avira--which didn't make our chart--was more nimble in that regard.

In features, Kaspersky has much to offer, with extras such as recommendations for system hardening, a virtual keyboard, and a scanner for out-of-date software. However, Kaspersky lacks descriptions for some of its recommendations, so you might be left wondering why you should take a recommended action such as disabling Autorun. And while updating old software is one of the best things you can do to keep your computer safe, you have to jump through many hoops to act on what Kaspersky finds.

The app's malware warning messages tend to be more confusing than informative. In our tests it displayed multiple different warning pop-ups for successive tests involving the same sample. And for either manual or scheduled scans, you'll know what it finds only if you happen to sit around and catch the pop-ups that appear during the scan. There's no scan summary window listing discovered files.

Kaspersky's antivirus app would likely get the job done when it comes to protecting a PC, but it's not the best bet for either detection or ease of use.

DOWNLOAD Kaspersky Lab Anti-Virus 2010/506
DOWNLOAD Kaspersky Lab Anti-Virus 2010/736


BitDefender Antivirus 2010



BitDefender Antivirus ($30 for a one-year, three-PC license) holds its own at dealing with malware, but its interface isn't especially user-friendly. Overall the program earned fourth place in our roundup of stand-alone antivirus programs.

This Romanian-made software did well in traditional detection tests that put it up against a collection of known malware kept by AV-Test.org. BitDefender detected 99.66 percent of all samples in a huge cache of spyware, Trojan horses, worms, and the like. But several other apps did even better, so that showing was good enough only for fifth place.

BitDefender did much the same in heuristic tests that simulate detection of newer malware by using two-week old databases.Its 65.34 percent block rate in these tests was respectable, but again yielded a fifth-place finish. The app did better in other proactive protection tests that measure a program's ability to block a baddie based solely on how it acts on a PC, blocking two-thirds of the brand-new test samples, earning it a tie for second place.

Presented with the task of disinfecting files, BitDefender disabled nine out of ten malware infections. By comparison, all but three programs in this roundup managed to remove every malware component we threw at them. And it languished in last place (along with G Data) when it cleaned up only seven out of ten active rootkits. It did clean up a greater percentage of the less-important files and system changes than most of the other security apps.

Despite some good features, BitDefender's interface isn't executed particularly well. For example, any se­­curity guru will tell you that keeping Windows up-to-date is essential for good security, and BitDefender can scan for missing updates. Unfortunately, it will display a critical warning if you happen to lack an optional package on its list--such as the Microsoft Base Smart Card Cryptographic Service Provider Package--even though it isn't really necessary to protect your PC.

DOWNLOAD BitdEfEndER Antivirus 2010

Panda Antivirus Pro 2010

Panda Antivirus Pro 2010 ($50 for a one-year, three-PC license) ranks fifth in our current roundup of 11 stand-alone antivirus apps. It was buoyed by positives such as strong traditional malware detection, but dragged down by negatives like poor behavioral scans.

In scans performed by AV-Test.org, Panda did well in traditional signature-based detection of known malware. Its 99.8 percent block rate placed it third in that category, behind only the G-Data and McAfee apps. However, it didn't fare as well in tests that gauge how well a program can identify and block new malware that doesn't yet have a signature. In heuristic tests that use 2-week-old signature files, Panda identified 53.7 percent of newer malware samples, which earning it eighth place in that category.

The program's ability to immediately check unknown files against Panda's online servers can help mitigate that relatively unimpressive showing, since this cloud computing approach can use the latest signatures as soon as they're available. But the app also fared poorly in behavioral analysis tests that measure how well a security program can identify malware based on how it acts. In those tests it successfully blocked only two out of 15 brand-new samples, which put it in last place among those programs that include the feature (not all do).

This app did well at getting rid of existing infections, and successfully disabled all 10 test infections. It also did a good job with a third-place tie when it came to cleaning up less-important files and system changes made by malware, which are often left behind by antivirus apps. However, it left one active rootkit in place; many of the programs we tested were able to remove all these samples of stealth malware.

Panda does sport a solid array of features. The company doesn't offer any program without a firewall, so you'll get one with Antivirus Pro (although we didn't test it as part of this standalone AV roundup). It also scans Web, e-mail and IM traffic for threats, and can check for missing Windows patches (malware authors often target existing security holes that users may have left unpatched). And its program interface is easy to get around, with different tabs for status, scans, reports, and the like.

However, checking or changing the program's settings can be a pain. A preferences link at the top of its window only shows a subset of the available options, with others split between separate settings links on the status and scan tabs. And while some of the settings and other program areas offer links to the relevant help sections, not all do. Without such links you're stuck manually searching for what you need.

Panda's middle-of-the-road rank befits its middling status. It does a fair job, but it's outperformed by other apps.

DOWNLOAD PANDA Antivirus Pro 2010
Continue reading...

Jumat, 30 April 2010

What are the computer viruses and its characteristics?

Viruses -
Threat Level - Intermediate to Severe
What is a computer virus? A computer virus is a piece of malicious code that adds itself to other existing programs, including operating systems. Computer viruses spread quickly and wreck havoc on computer systems. Including potential destruction of operating systems and data.

There are different types of viruses and they range from being a nuisance that constantly displays pop-ups to being a real severe danger that deletes system files, attaches to registries, destroys ability to log into the Internet and even destroying the computer's operating system along with all the data that is on it. Unless you have completely backed-up the data on your laptop, recovering that data will be impossible if you have to re-install the operating system after a virus infection.

While there are hundreds of different types of viruses with various levels of dangers, one of the most dangerous is the Trojan Horse, all though threat severity levels vary with the different types of Trojans, basically they are all dangerous and should always be protected against. Unfortunately some Trojans infect computers and cause such damage that it becomes irreversible and a reinstall of the entire operating system becomes necessary.

Many viruses slow down computer performance tremendously and especially Internet Browsers, there are other causes however for slow computers so do not assume that it is a virus. The best way to detect if you have a virus is by installing and running anti-virus software.

The best protection against computer viruses is prevention, early detection and removal. A good anti-virus or Malware removal program can protect computers and provide peace of mind when surfing the net.
You can read a guide to anti-virus protection software including all details and reviews of free and paid Anti-Virus programs and my top picks by clicking on Related Links Below.

LIST OF COMPUTER VIRUSES

Abraxas ( COMPUTER VIRUSES )

Abraxas
, also known as Abraxas5, discovered in April 1993, is an encrypted, overwriting, file infecting computer virus which infects .COM and .EXE files, although it does not infect command.com. It does not become memory resident. Each time an infected file is executed, Abraxas infects the copy of dosshell.com

located in the C:\DOS directory (creating the file if it doesn't exist), as well as one EXE file in the current directory. Due to a bug in the virus, only the first EXE file in any directory is infected.

Abraxas-infected files will become 1,171 bytes in length contain Abraxas' viral code. The file's date and time in the DOS disk directory listing will be set to the system date and time when infection occurred. The following text strings can be found within the viral code in all Abraxas infected programs:

"*.exe c:\dos\dosshell.com .. MS-DOS (c)1992"

"->>ABRAXAS-5<<--"

"...For he is not of this day"

"...Nor he of this mind"

Execution of infected programs will also result in the display of a graphic "ABRAXAS" on the system display, accompanied by an ascending scale being played on the system speaker.

Abraxas was created with the PS-MPC virus creation tool, which can be used to create similar, easily detected viruses, which are usually encrypted as well.

Acid ( computer virus )

Acid is a computer virus which infects .COM and .EXE files including command.com. Each time an infected file is executed, Acid infects all of the .EXE files in the current directory. Later, if an infected file is executed, it infects the .COM files in the current directory. Programs infected with Acid will have had the first 792 bytes of the host program overwritten with Acid's own code. There will be no file length increase unless the original host program was smaller than 792 bytes, in which case it will become 792 bytes in length. The program's date and time in the DOS disk directory listing will not be altered.

The following text strings are found in infected files:

  • "*.EXE *.COM .."
  • "Program too big to fit in memory"
  • "Acid Virus"
  • "Legalize ACiD and Pot"
  • "By: Copyfright Corp-$MZU"
Acme ( computer virus )

Acme is a computer virus which infects EXE files. Each time an infected file is executed, Acme may infect an EXE in the current directory by creating a hidden 247 byte long read-only COM file with the same base name. (In DOS, if the file extension is not specified, and two files with the same base name exist, one with .COM and one with .EXE, the .COM file will always be executed first.) Acme is a variant of Clonewar, a spawning virus. Acme is also perhaps a descendant of the small single-step infector Zeno, which is not to be confused with the Zeno programming language.

AGI-Plan ( computer virus )

AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software company in Germany. Because of CARO standards that dictate that viruses should not be named after companies, AGI-Plan's technical name is Month 4-6. This name also violates CARO standards, but a more minor rule involving syntax. AGI-Plan is related to the Zero Bug virus, as both it and AGI-Plan prepend 1,536 bytes to files they infect.

AGI-Plan is not initially damaging until several months after the initial infection, hence its name. After activation, AGI-Plan will begin to corrupt write operations, which results in slow, difficult-to-notice damage overtime.

AGI-Plan is notable for reappearing in South Africa in what appeared to be an intentional re-release several years after. AGI-Plan never succeeded in spreading significantly beyond the isolated incidents in Germany and South Africa.

Actifed ( computer virus )

Actifed is a G2-generated encrypted computer virus which infects .COM and .EXE files but not command.com. The virus is loaded into memory by executing an infected program and then affects the computer's runtime operation and corrupts program files.

It is interesting that G2 is a computer virus creation tool written by Dark Angel of the Phalcon/Skism organisation. This organization also wrote the "Phalcon-Skism Mass Produced Code Generator" [PS-MPC] which was used in the creation of Abraxas and numerous other viruses.

G2 generates compact, easily modified, fully commented, source code of .COM and .EXE infectors. It also supports the creation of resident and non-resident encrypted and non-encrypted viruses. The PS-MPC has similar use.

******
OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

AT&T VIRUS: Every three minutes it tells you what great service you are getting.

MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.

PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.

POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."

RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.

ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.

MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

TED TURNER VIRUS: Colorizes your monochrome monitor.

ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.

DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!

GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.

NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.

FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.

GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)

TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.

TEXAS VIRUS: Makes sure that it's bigger than any other file.

ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.

CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.

AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.

FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.

PBS VIRUS: Your programs stop every few minutes to ask for money.

ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.

OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.

NIKE VIRUS: Just does it.

SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.

JIMMY HOFFA VIRUS: Your programs can never be found again.

CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.

KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.

IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.

STAR TREK VIRUS: Invades your system in places where no virus has gone before.

HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.

GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.

CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.

LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".

CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.

ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back. >>

Continue reading...

Computer Viruses

Computer viruses are pieces of computer code, designed to implant itself in programs or files with the idea of destroying, or changing the data transmitted. Viruses can be spread through interchange of files and programs, loaded onto a computer and executed. They slow down computers, crash a system, or simply reroute data to other units. Virus numbers have risen since the 90s, and the U.S government has passed laws making virus introduction into computers of unknowing victims, a serious crime. Software companies have also sought to stem the tide by creating programs specifically for tracking down viruses and stopping them. Below are articles which provide information on latest computer viruses, virus statistics, computer virus protection and removal.
Continue reading...
 

Patron Computers And Mobile Phones From Viruses Copyright © 2009 Not Magazine 4 Column is Designed by Ipietoon Sponsored by Dezigntuts