Henry Graphics Team
Number of posts : 70 Age : 31 Location : England Infractions : Registration date : 2008-09-28 RP gold : 2848000 Reputation : 0
RPG Character Select Hp: (10/9999) Level: 1 Exp: (0/99999)
| Subject: How to keep your Computer Safe Fri Oct 03, 2008 1:56 pm | |
| Well guys, I just got bored so I wanted to share how to keep your computer safe and what a Virus or what a Trojan horse can do to your computer. Yet, I will also explain Spyware and Malware. But, to start off with, I am going to explain a very dangerous Trojan horse. This is known as the "ProRat" (Professional Remote Administration Tool). It can do all sorts of damage to your computer and is almost impossible to remove without the up-to-date Anti-Virus software. It is known that if you do not have an all up-to-date Anti-Virus software, it is undetectable. A Firewall won't block it either. ProRat is a Microsoft Windows based backdoor Trojan horse. As with other trojan horses it uses a "Client" and "Server". ProRat opens a port on the computer which allows the client to perform numerous operations on the server. Well, that's enough with the ProRat, time to explain what normal Trojan horses can do to your computer if you are misfortunate enough to receive one. Effects of a Trojan horse Remote Access. Data Destruction. Downloader. Server Trojan (Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) Security software disabler. Denial-of-service attack (DoS). Erasing or overwriting data on a computer. Re-installing itself after being disabled. Encrypting files in a cryptoviral extortion attack. Corrupting files in a subtle way. Upload and download files. Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context. Falsifying records of downloading software, movies, or games from websites never visited by the victim. Allowing remote access to the victim's computer. This is called a RAT (remote access trojan like the ProRat). Spreading other malware, such as viruses (This type of Trojan horse is called a 'dropper' or 'vector'). Setting up networks of zombie computers in order to launch DDoS attacks or send spam. Spying on the user of a computer and covertly reporting data like browsing habits to other people. Making screenshots. Logging keystrokes to steal information such as passwords and credit card numbers. Phishing for bank or other account details, which can be used for criminal activities. Installing a backdoor on a computer system. Opening and closing CD-ROM tray. Playing sounds, videos or displaying images. Calling using the modem to expensive numbers, thus causing massive phone bills. Harvesting e-mail addresses and using them for spam. Restarting the computer whenever the infected program is started. Deactivating or interfering with anti-virus and firewall programs. Deactivating or interfering with other competing forms of malware. Randomly shutting off the computer. Randomly installing a Virus.
Computer VirusA computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors.
Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
Some malware is programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem.SpywareSpyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.
In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.======================================================================== Enough with the effects, let me explain to you recommended Anti-Virus software and Firewalls. Top 10 Anti-Virus SoftwareShield Deluxe - 5 Stars CA - 4 Stars BitDefender - 4 Stars Norton - 4 Stars Kaspersky - 3 Stars NOD32 - 3 Stars Panda - 2 Stars McAfee - 2 Stars Trend Micro - 2 Stars Recommended FirewallsZoneAlarm Pro Outpost Firewall Norman Firewall EConceal Pro Webroot Desktop Injoy Firewall SurfSecret Firewall Closing MessageAnyway, thanks for reading this guide. I did not write all of this, so I will give credits to Wikipedia, Personal Firewall Review, 2009SoftwareReviews and me for the generosity of sharing this with the community. | |
|
ilikecorn5 Administrator
Number of posts : 1848 Age : 29 Custom Title : TeH FrienCH AdmINz Location : In my house... WHY DO YOU WANT TO KNOW!!!!! Infractions : Registration date : 2008-08-18 RP gold : 2868673 Reputation : 12 Acheivments Score : 15
RPG Character Select Hp: (10/10) Level: 1 Exp: (0/99999)
| Subject: Re: How to keep your Computer Safe Fri Oct 03, 2008 3:40 pm | |
| Or just get AVG and NORTON anti-virus/Firewall
Oups sorry... i didn't see Norton on there...
Add AVG to the list... thats what i use (And a few others). And i don't have any problems | |
|
Dex3 Global Moderator
Number of posts : 788 Age : 29 Custom Title : Ken is c00l Location : In my Doll House Infractions : Registration date : 2008-08-20 RP gold : 2867210 Reputation : 9 Acheivments Score : 15
RPG Character Select Hp: (10/9999) Level: 1 Exp: (0/99999)
| Subject: Re: How to keep your Computer Safe Fri Oct 03, 2008 4:29 pm | |
| Thanks for the advise. My computer recently had to be repaired. It used to be SO SLOW. Turns out it had 146 viruses, most of them being Trojan. It used to make my computer restart without notice, makes Youtube videos always stop early, and sometimes brought me to the wrong website (mostly from Google links). Infact, there were a few times it brought me to porn sites. Wasn't happy about that AT ALL! Anyways, my computer is fixed, and we have Norton installed. Thanks for the advise! | |
|
Henry Graphics Team
Number of posts : 70 Age : 31 Location : England Infractions : Registration date : 2008-09-28 RP gold : 2848000 Reputation : 0
RPG Character Select Hp: (10/9999) Level: 1 Exp: (0/99999)
| Subject: Re: How to keep your Computer Safe Sat Oct 04, 2008 5:09 am | |
| No problem. Also, AVG is no good. As stated by McAfee, it sometimes "falsely" detects. It also has a very low detection rate therefore it shall NOT be added to my brilliant list. I would recommend Avast Home Edition instead. | |
|
ilikecorn5 Administrator
Number of posts : 1848 Age : 29 Custom Title : TeH FrienCH AdmINz Location : In my house... WHY DO YOU WANT TO KNOW!!!!! Infractions : Registration date : 2008-08-18 RP gold : 2868673 Reputation : 12 Acheivments Score : 15
RPG Character Select Hp: (10/10) Level: 1 Exp: (0/99999)
| Subject: Re: How to keep your Computer Safe Sat Oct 04, 2008 10:49 am | |
| - Henry wrote:
- No problem. Also, AVG is no good. As stated by McAfee, it sometimes "falsely" detects. It also has a very low detection rate therefore it shall NOT be added to my brilliant list. I would recommend Avast Home Edition instead.
Well that's fine... but i'm just saying my computer has no problems | |
|
Henry Graphics Team
Number of posts : 70 Age : 31 Location : England Infractions : Registration date : 2008-09-28 RP gold : 2848000 Reputation : 0
RPG Character Select Hp: (10/9999) Level: 1 Exp: (0/99999)
| Subject: Re: How to keep your Computer Safe Sat Oct 04, 2008 12:03 pm | |
| OK, no problem. | |
|
ilikecorn5 Administrator
Number of posts : 1848 Age : 29 Custom Title : TeH FrienCH AdmINz Location : In my house... WHY DO YOU WANT TO KNOW!!!!! Infractions : Registration date : 2008-08-18 RP gold : 2868673 Reputation : 12 Acheivments Score : 15
RPG Character Select Hp: (10/10) Level: 1 Exp: (0/99999)
| Subject: Re: How to keep your Computer Safe Sat Oct 04, 2008 12:53 pm | |
| - Henry wrote:
- OK, no problem.
Nope.... i'm glad we're finally getting allong | |
|
Sponsored content
| Subject: Re: How to keep your Computer Safe | |
| |
|