Register

Welcome to the RDI-Board Community.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed.


Donate Now Goal amount for this month: 100 EUR, Received: 100 EUR (100%)
Donate to support this site...

Results 1 to 13 of 13
  1. #1
    Member Mentor
    Join Date
    Dec 2004
    Location
    In a Weird RooM
    Posts
    835
    Posts Thanks / Likes

    Default SPYWARE in my Computer...




    SPYWARE: -



    How it Works : Spyware is software that collects data on the PC user without his or her knowledge. This may include logging the web sites visited or even caching credit card numbers in severe cases.



    Example : Gator ( This is a software which is available for download on internet) if u download and installed in ur computer then it starts producing pop-ups & partially disable firewalls. It’s manufacturer, the claria corporation denies that the application is spuware but if u install this software in ur computer then surely strange things will do gets start.



    WORM: -



    How it Works : Worms are similar to viruses, but they are self contained & don’t need to insert themselves into other programs or files. They use email or other file transmitting capabilities of PCs to disperse themselves.



    Example : MyDoom, first detected at the end of January 2004, spread rapidly & caused a global internet slowdown.. sure it was really interesting to c that who ever developed such thing … his bug has slow down the internet world wide… it was a real disaster situation.



    EXPLOIT: -



    How it Works : An exploit is a piece of software designed to take advantage of a bug or flaw in another program, providing access to the host PC or the ability to damage it.



    Example : Exploits tend to be known by the vulnerability that they use, like the recent OLE & COM vulnerability patched by Microsoft in February 2005.



    WABBIT: -



    How it Works : Wabbits are self-contained like worms, but they don’t replicate via networks. Instead they multiply repeatedly on the local computer, seriously affecting its performance, although they may have other ill effects built in, too.



    Example : Cookie Monster, named after its sesame street inspiration. What it does is that it locks up the terminals, causing them to repeatedly demand cookies.



    ROOT KIT: -



    How it Works : There is a set of tools installed remotely on a system once it has been hacked. Root Kits exist for most operating systems & may differ depending on the method used to crack your PC.



    Example : Specific examples are hard to point to, but rootkits can either give access to the Operating System “kernel” (core service of any operating system) or to applications running remotely.



    TROJAN HORSE: -



    How it Works : A Trojan is a malicious program disguised as legitimate software. It often renders your defenses useless or opens a backdoor for an attacker.



    Example : Fraggle Rock emerged in Britain 2001. It logged keystrokes, stole passwords and provided remote access to infected PCs.



    DIALLER: -



    How it Works : A dialer is designed to use your modem to make an unauthorized phone call, usually to a premium rate number. The victim’s PC runs up big phone bill & the scammer collects the profits.



    Example : Mejorbus used the possibility of accessing porn web cams as an enticement to download. It hijacked the browser & dialed the premium rate number at startup.



    BACKDOOR: -



    How it Works : A backdoor may be installed on your system via a Trojan or worm. It may also have been planted in an otherwise legitimate (legal) application. It provides a way to access your system, usually remotely, while avoiding normal authentication procedure.



    Example : The SoBig worm installed backdoor that enabled infected computers to be used as spam relays.



    BROWSER HIJACK: -



    How it Works : Software designed to hijack your browser may be executed via a Trojan or a worm. It resets your browser home & search pages to ones favoring the site of origin. Undoing this is tricky. Means to remove these browser hijacks from your browser is quite difficult but nothing is impossible..



    Example : Fastwebfinder resets the homepage to www.fastwebfinder.com . it also modified the search bar, search page and favourites of internet explorer (only).



    ADWARE: -



    How it Works : I think I heard this name b4. This describes software supported by advertising. In it’s most kind form, adware displays advertisements within a program. However, more intrusive advertising might trigger pop-ups or even gather marketing data. This crosses over with the next category spyware.



    Example : Winad emerged in 2004. Among other behavior, it triggered numerous pop-up adverts in internet explorer (only)



    VIRUS: -



    How it Works : A virus is a program that can replicate itself. It spreads by inserting copies of itself into other programs or documents, in a similar manner to the way living viruses insert themselves into body cells.



    Example : Elk Cloner, thought to be the first computer virus, replicate itself via floppy disks.





    These all above names are very common to use now a days… and these all are some categories of the main giant family name SPYWARE. And I think this is quite enough for all of u for a week to study it thoroughly and wait for atleast a week

  2. #2
    Junior Member Master
    RDI - Board Default Avatar

    Join Date
    Apr 2005
    Location
    Q8
    Posts
    61
    Posts Thanks / Likes

    Default

    very interesting information, thanks

  3. #3
    n00b Teacher
    RDI - Board Default Avatar

    Join Date
    Mar 2005
    Location
    pakistan
    Posts
    185
    Posts Thanks / Likes

    Default

    Blocked URL: www.fastwebfinder.com
    Resource: Default

    This page has been blocked by SpyStopper due to security
    and Privacy concerns. Some Possible Reasons:


    Tracks or Profiles you.

    Gathers Private and Confidential Information from you.

    Installs software on your machine without your approval.

    Has Unsafe Content.

    No Content other than Advertisements and Popup windows.

    If you are sure you want to visit this site, , please remove
    the URL from the blocking list. For instructions on how to remove
    a site from the blocking list, please check 'What if SpyStopper is
    blocking a web site I want to visit' in the Information & Help
    section at http://www.itcompany.com/spystop.htm. Make sure you
    restart SpyStopper after removing a site from the blocking list.


    instal this and u pc is safe

  4. #4
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Dec 2003
    Location
    Indonesia
    Posts
    303
    Posts Thanks / Likes

    Default

    Good work

    Please download microsoft Antispyware Beta...

    This one is free and without any shit.

    Succes.

    Ps... did someone allready hack telkomvision on Telkom
    Terrorist use the muslim faith for there privat intrests, and should be killed more painfull than their victems

  5. #5
    Platinum member Expert
    Join Date
    Jun 2004
    Location
    29°20'N 47°59'E
    Posts
    5,711
    Posts Thanks / Likes

    Default

    so far, IMHO, rootkits are the most obnoxious of them all.
    HP-Compaq DC5000 MT 1.5GB RAM
    Debian Squeeze with Smargos
    CCcam 2.1.4

  6. #6
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Sep 2004
    Location
    ML
    Posts
    270
    Posts Thanks / Likes

    Default Hi all of u

    I think he is still using win98

  7. #7
    Platinum member Expert
    Join Date
    Jun 2004
    Location
    29°20'N 47°59'E
    Posts
    5,711
    Posts Thanks / Likes

    Default

    well, even if you are using win98 if you have a pretty sturdy defense against the attacks, then you will be ok. there is no such thing as an absolute guarantee that you will be protected by all these softwares. still it's best to backup all personal data and have your installers ready anytime. a fresh install of windows xp, once you connect to the internet to download the patches, you are already vulnerable to attacks.
    HP-Compaq DC5000 MT 1.5GB RAM
    Debian Squeeze with Smargos
    CCcam 2.1.4

  8. #8
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Sep 2004
    Location
    ML
    Posts
    270
    Posts Thanks / Likes

    Default hi boknoy

    winxp sp 2 is more protective than win98 builtin protection feature , i am talking in this refrence

  9. #9
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    May 2004
    Location
    Kuwait
    Posts
    451
    Posts Thanks / Likes

    Default

    I am using XP myself all u have to do is to have a good anti spy and anti virus on it.
    I am using spysweeper along with avast for antispy and mcafee for viruses & a firewall with it and thank god its ok soo far...

  10. #10
    Member Mentor
    RDI - Board Default Avatar

    Join Date
    Sep 2004
    Location
    SunshineState,Australia
    Posts
    635
    Posts Thanks / Likes

    Default PC-BUGS-Viruses etc etce

    When a bug strucks, the PC owner is struck by lighting.
    He has no operation on his/her PC.
    He has to take it to a PC specialist, pay a few hundred of dollars.
    The PC is now cleared from any bugs, and we restart
    where we left of.
    I have a XPWindow with out any protections.
    Protections costs dollars and they are updated every 6 months, so u have to repay for all updates.
    Computer was made by MEN/WOMEN
    Viruses/Bugs are made by MEN/WOMEN
    PC services makes the money.
    poor owners suffers.
    why.?

  11. #11
    Junior Member Friend
    RDI - Board Default Avatar

    Join Date
    Mar 2005
    Location
    pakistan
    Posts
    34
    Posts Thanks / Likes

    Default

    dear

    go this site www.download.com and dowload spy sweeper v4.0

    and install it on your pc.

    thanks
    help to each other

  12. #12
    Platinum member Expert
    Join Date
    Jun 2004
    Location
    29°20'N 47°59'E
    Posts
    5,711
    Posts Thanks / Likes

    Default

    @JPS,

    all in the name of money. sometimes i think these software companies are the ones supplying the virii themselves so that they can say "hey, i got the solution" and you buy it.

    solution? backup personal data, have your installers ready. anyhow, if you are using windowsxp, you oughta reformat your hdd at least every 3 months to make everything run as smooth as possible since even defragging ur hdd does not make things go any faster or even if you use registry cleaners to rid yourself of the clutters of everyday pc use.

    personally, i use nav2005, ms antispyware, ad-aware, spybot, counterspy, registry first aid and sygate firewall just to make my boxes run as smoothly as they can. but it's not a 100% guarantee that i am immune to attacks. there is no absolute when it comes to computers.
    HP-Compaq DC5000 MT 1.5GB RAM
    Debian Squeeze with Smargos
    CCcam 2.1.4

  13. #13
    Junior Member Teacher
    RDI - Board Default Avatar

    Join Date
    Jul 2004
    Location
    # 1
    Posts
    367
    Posts Thanks / Likes

    Default


    im using winXP sp2, spyware stormer, registry mechanic, norton internet security 2005...
    so far, everythings going fine
    Admin, h**p://satellite.kenforum.com click here to register

 

 

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. SPYWARE PROBLEM
    By prodigal in forum RDI - English
    Replies: 2
    Last Post: 5th January 1970, 00:24

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Back to Top