Monday, August 8, 2011

Ramnit and Sality

Several months ago, my laptop had been attacked by sality and ramnit virus. It's kind of annoying to have them aboard. I had cleansed them but they came back the other months. Eventually, I decided to install PClinux OS 2011 into my laptop. I used linux almost everyday then. But I still preserved my windows partitions though. Then I can live more relax. I cleansed my windows partition from linux using many antivirus. Wine applications can help us out because it can play several window's antivirus such as pcmav, ansav, smadav and even DrWeb free portable. What a nice thing to do. That way, I can say farewell to the cute viruses. Viruses are not our enemy actually, they are only a tease of our computer abilities. Think that way you won't be frustrated.

Thursday, November 19, 2009

Psychology of Virus Maker


In order to be able to fight against virus we must know how virus maker thinks. First we take a look at targets of virus attack. These are target of virus attack:

1. Registry files

Virus tends to alter registry files to make them easy to strike. Worm and virus usually are set to activate once our computer start. Utilizing registry files, virus disable significant facilities such as Ms Dos, Task Manager, MsConfig.exe, Regedit.exe, etc

2. Autorun.inf

We generally find autorun.inf in usb flash disk or in CD Rom. Autorun.inf is a file that is set to run certain command or certain software to be active once usb flash disk is zipped into our computer usb or when cd is inserted into cd rom. Autorun.inf can be set to activate a virus attack to our PC or laptop.

3. System Restore Point

Have you ever cleanse viruses with anti virus but, after a week or a month, the virus is around again in our computer? That is the example of how a worm can hide in system restore and can attack at another time. That's why we better turn off our restore point at the time we scan virus using antivirus so that the viruses can go nowhere.

4. Task Manager

Task Manager is utilized to shut down a program forcefully, virus maker realize this, they tend to manipulate or even to disable Task Manager so that their programme can run smoothly.

5. Special Directory

There are two special directory where viruses tend to attack, those are windows directory and system directory. Utilizing these directories, viruses usually multiply or copy its own self into another, it clones and clones, it multiplies, it breeds.

6. Win.ini and Autoexec.bat

Autoexec.bat and Win.ini are also files that virus maker can manipulate to run their viruses.

7. Files with ending .doc and .exe

Generally speaking there are two files virus tends to attack, .exe file and .doc file. Seemingly there are many virus makers that are unhappy if we can write in .doc format, so beware and try to change your .doc file into .rtf file or at least duplicate them into .rtf files. exe files can usually be attacked by virus, unfortunately some antivirus tends to suggest us to delete the exe files infected by virus. Don't worry use PCMAV and SMADAV, they can cure your infected exe files perfectly and return exe files into healthy without deleting them.Some virus also change folder into exe files so that we can open our folder.

8. Medium of virus to spread: Flash disk, web page, harddisk and so on

Always scan your usb flash disk, cautious when you surf, and always scan your harddisk once in a week or a month. Don't be lazy, than your PC or laptop can stay clean from virus. Always protect by antivirus when you surf on the internet.