Archive for October 2015

Chat Anonymously with Tor Instant Messenger

The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat anonymously over the Tor network. Built over Mozilla’s Instantbird platform, the Tor Messenger can be used by Windows, Mac and Linux users.

With its motto of anonymity and security by default, The Tor Project has released the beta version of its Tor Messenger after a year long of effort which saw three alpha versions distributed for testing. The Tor IM is built over Mozilla’s Instantbird, an existing open-source messenger and supports multiple transport networks like Gooogle Talk, Facebook Chat, Twitter, Yahoo and others.

Instantbird was not the only choice of the team developers, says Tor, as they had considered Pidgin and Adam Langley’s xmpp-client as well. But, as the Tor developer team had an experience working on the XUL (XML User Interface Language over which Tor Browser is built), they chose Mozilla’s Instantbird.

The Tor messenger boasts of Off-the-Record (OTR) messaging which will protect your identity. The Tor IM will encrypt and send the data through the reliable Tor network. Read to know more about Tor and how it maintains anonymity.

However, the developers are still working on parts of creating absolute anonymity, and therefore, had asked the users ‘not to rely heavily on the Tor Messenger’ for some time. The Tor IM developers are looking for feedbacks and have already started working on the updates.

Tor Messenger comes in different versions for the users of Windows, Mac and Linux. 

Also read..
Saturday, 31 October 2015
Posted by Siva Priya

CCNA certification are immensely valuable in the networking field.

This program assumes no prior knowledge of Networking. So people from any field who wish to flourish in networking industry can attend this training program.

Skills and knowledge gained through training for the CCNA certification are immensely valuable in the networking field as the topics covered during the CCNA training program provide the basis for all networking topologies and protocols. 

Over the last many years Redback It Academy has successfully trained several hundreds of networking professionals who have qualified in the CISCO CCNA certification exam.

About CCNA:
Cisco Certified Network Associate (CCNA) Routing and Switching is a certification program for entry-level network engineers that helps maximize your investment in foundational networking knowledge and increase the value of your employer's network. CCNA Routing and Switching is for Network Specialists, Network Administrators, and Network Support Engineers with 1-3 years of experience. The CCNA Routing and Switching validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.

Skills Measured by CCNA Certification:
Key knowledge areas and skill sets covered by the Cisco CCNA certification exam include the following.
ü  Cisco Certified Network Associates can:
ü  Understand how different network topologies interact to form a secure IT network
ü  Explain how a computer network works and how it interacts with networked devices
ü  Configure, verify and troubleshoot a switch with VLAN & interswitch communications.
ü  Implement an IP addressing scheme and IP Services to meet specific network requirements
ü  Configure, verify and troubleshoot routing and router operations on current Cisco devices
ü  Identify network security threats and describe threat mitigation methods & countermeasures
ü  Describe and perform the appropriate tasks for wireless local area network (WLAN) administration
ü  Setup and verify WAN links and execute the proper methods for connecting to a wide area network
ü  Implement & support Network Address Translation (NAT) and Access Control Lists (ACLs) in branch office networks

Cisco CCNA Certification Prerequisites:
·         Required: No required prerequisites for CCNA certification.
·         Recommended: No recommended prerequisites for CCNA certification.

Further Details: 
Training Coordinator 

Tuesday, 27 October 2015
Posted by Siva Priya
Tag : ,

Ethical Hacking as a career option

This program lies in the Infrastructure Management space and acts as a value add to working professionals in networking background who would like to upgrade themselves to security operations.
Becoming Ethical Hacker enables the individual to conduct penetration testing to assess the vulnerability in the IT system of an organization. This is required by many organizations as ISO/IEC 27001 is increasingly becoming mandatory security compliance that is governed by customers globally.

Why it is BIG?
Cybercrime is increasingly on the rise. According to a report India lost 8 bn dollar in 2011 due to cybercrime and is ranked 5th in e-commerce breaches. Govt of India has also recognized the need for building capability to fight against hackers and as a result also rolled out India's first cyber security policy in 2013. According to NASSCOM, India requires about 77,000 ethical hackers every year while Forbes has ranked Ethical Hacking as the no.2 in high paying jobs of the future.

Program Highlights :
1.Expert Faculty : Renowned Evangelist, Researchers and Practitioner from the Info security world to train professionals on the concepts and best practices of Ethical Hacking
2.Program structure and pace designed to enable learners to comprehensively grasp the concepts
3.Program is bundled with International Certification – RISC Redback International Security Council.
4.35 GB of real life hacking tools that are used by hackers underground
5.Enabled with Cloud Services
a)      Cloud Classroom: Learn from the experts
b)      Cloud Courseware: Anywhere access to the courseware
c)       Guided virtual labs to practice exercises from anywhere.
d)      Cloud Bytes: Blogs/Journals, updated material
e)      Focused Cloud learning complimenting what you learn in class
6.Invitations to focused and closed door technology webinars
7.Special Capsule on Indian Cyber Laws
8.Online screening test to assess the pre-requisite skills to undertake the program

1.Working professionals with 1-3 yrs of experience in IT
2.Knowledge of networking concepts and implementations especially TCP/IP fundamentals
3.Working knowledge of operating systems UNIX, Linux

Further Details :
Training Coordinator

Saturday, 24 October 2015
Posted by Siva Priya

The Cisco Certified Network Associate Security Certification

Once upon a time, security was something that IT departments, network teams, and application developers knew they needed to address, but rarely did. And, if security was addressed, it was most likely the last and least-addressed item on the list of priorities for the IT department. 
There were just too many other priorities ahead of security, and everyone was more focused on performance, and cool features, and just getting the technologies in question to work, rather than security.

Enter the CCNA Security Certification 

The CCNA Security tests a candidate’s skills across of range of subject matter areas, such as designing, deploying, installation and configuration, testing and maintenance of Cisco security devices and appliances. 

As you might expect, the CCNA Security certification is centered on Cisco products and technologies. Primary devices and platforms include Cisco IOS security, and the installation, configuration and maintenance of Cisco ASA adaptive security appliances, Cisco Intrusion Prevention Systems (IPS), and Cisco security management tools.

Some of the core skills tested by the CCNA Security exam include:
  1. Understanding the different kinds of threats and attacks in use against networks today
  2. Designing and administering effective security policies
  3. Implementation of site-to-site VPN tunnels[2] on Cisco devices
  4. Mitigation of common layer 2 and layer 3 attacks
  5. Implementation of Cisco technologies such as the Cisco IOS firewall feature set, and the Cisco IOS Intrusion Prevention System (IPS) feature set
  6. Securing access to network devices
  7. Implementing various security protocols and technologies such as AAA and ACLs
  8. Installation, configuration, and maintenance of Cisco security devices and appliances such as the Cisco Adaptive Security Appliance (ASA)
Also refer ..
Monday, 19 October 2015
Posted by Siva Priya

Best Computer Hardware and Networking Certifications

Becoming a computer technician is a great point of entry into the IT field, and computer hardware certifications will help demonstrate your knowledge and competency in maintaining computers, mobile devices, printers and more. These top five computer hardware certs can get your IT career off the ground.  

To a certain extent, the title of this article is something of a misnomer. In the interests of increased specificity, it might be more appropriate to add the words "general" or "mostly vendor-neutral," although we do include a credential from Apple in this list that focuses exclusively on Apple hardware. And in fact, it's possible to view some certifications from hardware vendors such as HP, Dell, Cisco, Juniper, Fortinet and so forth as hardware focused, at and beyond the entry level. Thus, as you peruse this guide, don't forget that there are lots of other options from which you can choose if you're interested in demonstrating your knowledge and abilities with particular vendor's products and devices.

There's another misnomer involved in calling these credentials hardware certifications, too -- namely, the idea that hardware can exist or operate independently of software (or vice versa). If you dig into the curriculum for any specific hardware-related certifications in any depth, you'll quickly realize that by and large software is in control of hardware nowadays. 

Software comes into play for installation, configuration, maintenance, troubleshooting and just about any other activity you can undertake with hardware. We don't want to misrepresent the focus and coverage of these certs, so it's important to understand that the hardware label simply indicates that devices are involved, not that hardware is ALL that's involved. Here are the best computer hardware certification listed below :

Apple Certified Mac Technician Certification ACMT :
Apple Certified Mac Technician (ACMT) certification verifies the ability to perform basic troubleshooting and repair of both desktop and portable Macintosh systems, such as iMac and MacBook Pro. ACMT certification exams emphasize identifying and resolving common Mac OS X problems, and using Apple Service and Support products and practices to effectively repair Apple hardware.

BICSI ITS Technician Training :
Take your installation performance to the next level through the study of specialized systems and advanced copper and optical fiber structured cabling systems. TE350 is an intensive 5-day course that provides the necessary skill set of a structured cabling systems technician. An advanced study of copper splicing, testing and troubleshooting will open this course. A significant amount of course time will then be spent on the splicing, testing and troubleshooting of optical fiber cable. The third major topic covered in this class will be field coordination, including site surveys, blueprint reading, network infrastructure and project management. 

CompTIA A+ :
A+ Certification is a widely-acknowledged, general computer certification for entry-level service technicians or anyone who wants to learn how to install, configure, upgrade, troubleshoot and repair computers. A+ Certification is a valuable computer certification on its own. But it's also a solid foundation for advanced computer certification tracks, such as those linked below under the heading Computer Certifications.

CWTS: Certified Wireless Technology Specialist :
The Certified Wireless Technology Specialist (CWTS) is the entry-level credential for the Certified Wireless Networking Professional (CWNP) program, which includes professional- and expert-level credentials, as well as specialist certs in the areas of wireless networking design, analysis and security. Wireless networking skills and knowledge are in high demand, and involve hands-on, in-depth knowledge of and interaction with wireless networking devices and interfaces.
Saturday, 17 October 2015
Posted by Siva Priya

Understanding The New MCSE

As part of their strategic push into cloud computing, Microsoft has recently introduced a new line of certifications, aimed at fostering a base of expertise centered on cloud computing technologies and solution design, involving the creation/re-invention of several Microsoft certifications.

The flagship of this new certification framework is the Microsoft Certified Solutions Expert, or MCSE.

Many who have followed Microsoft certifications over the years will recognize the initials, because this isn’t the first time that Microsoft has offered a certification called the MCSE. In fact, the Microsoft Certified Systems Engineer, also called the MCSE, was one of the most popular certifications ever offered by Microsoft.

But there are significant differences between the two certifications. Whereas the old MCSE focused on server-based administration and technologies, the new MCSE takes more of a multi-disciplinarian approach to solving business IT problems, with a strong focus on cloud computing, database administration, and business intelligence.

Today’s version of the MCSE certification breaks down into two general categories and three individual tracks that can be followed to achieve MCSE certification.

MCSE for Private Cloud :

This is the closest equivalent to the old MCSE, in that it focuses on the server & operating system, but with a twist. The new MCSE is truly focused on the cloud, specifically private clouds managed with Microsoft System Center 2012.

The MCSE for Private cloud is based on the completion of the following:
  • Microsoft Certified Solutions Associate (MCSA) – Completion of the MCSA is a pre-requisite for all MCSE tracks.
  • Exam 70-247: Configuring and Deploying a Private Cloud with System Center 2012 – System Center is Microsoft’s cloud management platform, allowing administrators to create and manage multi-hypervisor cloud environments.
  • Exam 70-256: Monitoring and Operating a Private Cloud with System Center 2012 – Related to the exam above, this exam tests the candidate’s ability to perform ongoing administration tasks in a System Center 2012-managed environment.

MCSE for SQL Server 2012 :In addition to the MCSE for Private Cloud, and in conjunction with Microsoft’s impending release of SQL Server 2012, Microsoft is offering the MCSE for SQL Server 2012. The two tracks for certification in this category are:

The MCSE: Data Platform : The MCSE Data Platform certification demonstrates the ability to build and manage data solutions based on SQL Server 2012, in both traditional ‘on-premise’ and cloud-based environments. The MCSE Data Platform certification is based on successful completion of the MCSA for SQL Server 2012, plus two additional tests:
  • Exam 70-464: Developing Microsoft SQL Server 2012 Databases –Tests the ability to build and implement databases, and perform common administration tasks such as planning and creating database files and indexes, stored procedures, managing transactions and locks, etc.
  • Exam 70-465: Designing Database Solutions for Microsoft SQL Server 2012 - Tests the ability to architect and design database solutions, involving the planning and design of the database environment, including objects, servers, and storage.

MCSE - Business Intelligence : The MCSE for Business Intelligence is specifically designed for IT professionals and DBAs that work on Business Intelligence (BI) projects for enterprises. As such, the tests for the MCSE Business Intelligence have a different focus as well. As with the MCSE for Data Platform, Candidates still must complete the MCSA for SQL Server 2012, as a pre-requisite, and additionally complete two certification exams. Those exams are:
  • Exam 70-466: Implementing Data Models and Reports with Microsoft SQL Server 2012 –Covers the creation of multi-dimensional models, OLAP cubes, and information displays.
  • Exam 70-467: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 - Tests the candidate’s ability to architect and design database solutions, involving the planning and design of the database environment, including objects, servers, and storage.
Friday, 16 October 2015
Posted by Siva Priya

Creating Global IT Professionals

Posted by Siva Priya
Tag :

5 Steps to a Great Job in IT

1. Leverage Your Current Experience :
Take what you already know and use it to your advantage. If you are a student, be sure to build on specific skills or leadership positions that might apply to a new career. If you currently work in HR, stress your communication and problem solving skills. If you are in a position that requires great attention to detail, the need to work independently, or as part of a group. All of these types of experience are needed in IT.
A willingness to learn and work very hard are the best qualifications a person can have. Don't be afraid to rank potential experience over better pay in the beginning. Having hands-on skills in addition to education and certification is extremely important.

2. Choose a Certification :
Choose what certification you want to work towards. You can do this before looking for employment and/or ask potential employers if they provide training for or require certifications for certain positions. 
Here are some resources to help you decide which certifications will work best for you:

3. Study For and Take the Exam(s) :
There are many ways to prepare for your certification exams. You can attend full classroom training, and I recommend this for people who are completely new to IT. You can use online training courses and practice test software.
You can also self-study with books; there are several good ones out there. Put a lot of time and effort into your preparation. Make sure you know the material not just to you can pass the exam, but so you can take that knowledge into your workplace and really use what you have learned.

4. Write a Resume & Search for Jobs :
Writing a good resume is critical. Employers see hundreds of them so make sure yours looks good, is accurate, focused, and highlights your strengths. 

5. Build Your Experience and Certifications :
Whether you land the perfect job or not, continue to build your experience and attain the applicable certifications. Use certification as a learning tool and as a resume-builder. I would recommend continuing formal education as well if you have the time and resources. Both education and certification show your willingness to learn and a dedication to to your career.

Thursday, 15 October 2015
Posted by Siva Priya
Tag :

This Computer Cluster Cracks Every Windows Password in 5.5-hours or Less.

A password-cracking expert has created a new computer cluster that cycles about 350 billion guesses per second and it can crack any Windows password in 5.5 hours or less.

Is your password safe enough? If you are feeling confident enough, take a minute and read this story. A password-cracking expert has revealed a new computer cluster that can crack any Windows passwords in less than six hours.

This beast cycles about 350 billion guesses per second and it could use a new virtualization software that gets juice from 25 GPUs (AMD Radeon graphics card). The 64 bit Linux-based GPU cluster runs the Virtual OpenCL cluster platform that allows these graphics cards to work as if they are on a single computer.

Ars Technica writes that this cluster touches the 350 billion-guess-per-second speed while cracking password hashes generated by the NTLM cryptographic algorithm, that Microsoft uses in Windows operating systems.

This means, the cluster can try n mammoth 958 password combinations in just 5.5 hours. This amazing set of tries is enough to brute force every possible 8-character password that can contain digits, upper and lower case letters, and symbols.

The Virtual OpenCL cluster platform works along with ocl-Hashcat Plus- a free password-cracking tool. The cluster isn’t limited to brute force attacks and it deploys other techniques like dictionary attacks to crack every possible password combination.

Jeremi M Gosney, Founder and CEO of Stricture Consulting Group tells Ars, “before VCL people were trying lots of different things to varying degrees of success.”

He adds, “VCL put an end to all of this, because now we have a generic solution that works right out of the box, and handles all of that complexity for you automatically. It’s also really easy to manage because all of your compute nodes only have to have VCL installed, nothing else. You only have your software installed on the cluster controller.”

This beast was created using:
  • Five 4U servers
  • 25 AMD Radeon GPUs
  • 10x HD 7970
  • 4x HD 5970 (dual GPU)
  • 3x HD 6990 (dual GPU)
  • 1x HD 5870
  • 4x SDR Infiniband interconnect
  • 7kW of electricity
Monday, 12 October 2015
Posted by Siva Priya
Tag :

In-Demand Technical Certifications for Beginners in 2015

Computer certifications exist for a single purpose: to provide a measurable account of a specific set of skills and/or product knowledge. If you are an expert, a certification is proof. If you are not yet an expert, the path you must take to become certified will provide you with the tools to become one.

There are many paths to certification and the first step is to do some research. Spend some time defining your current skills, deciding where you want to take your career, and then look at the certifications that are applicable to your goals.

There are several resources on this site that will help you decide what, if any, certifications are right for you to help you in crafting your personal certification strategy, here are some of the certifications that are expected to be most in demand in 2015.

1.  Project Management Professional (PMP) :

Demand for project management skills continues to increase, especially as IT projects continue to increase in complexity. The PMP has emerged as one of the most in-demand certifications today, precisely because it demonstrates proficiency in managing those complex projects. The PMP test itself is rigorous, and maintaining the certification requires ongoing testing and effort, which makes the PMP certification all the more valuable to potential employers.

2.  Cisco CCNA :
The CCNA is the first of three levels of certification offered by Cisco. The next two are the CCNP and CCIE. I would put all three on this list, but that would be redundant. The CCIE is one of the most respected certifications out there. Getting a CCNA is just one step to that goal. There are six different tracks to choose from for the CCNA and you have the ability to focus on a specific area by getting a specialist certification.

3.Certified Ethical Hacker (CEH) :
A Certified Ethical Hacker V8 is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

4.  Microsoft Certified Information Technology Professional (MCITP) :
Microsoft certifications continue to be in high demand, because Microsoft continues to enjoy a strong presence in the corporate computing landscape. Like its predecessor the MCSE, the MCITP candidate can choose to specialize in a number of different domains, from desktop support to server administration to a number of specific applications, like Exchange and Lync. Some of the most valuable MCITP specializations include virtualization on the Microsoft Hyper-V platform, and SharePoint Server administration, to name a couple.

5.Certified Information Systems Security Professional (CISSP) :
The CISSP certification demonstrates knowledge of IT security across a number of domains, covering everything from network security to application security to formation and management of security policies for the enterprise. The CISSP also requires more than simply passing a test to maintain the certification - those who hold the certification are required to demonstrate on-going experience and education in the field of IT security over time.

6.Red Hat Certified Engineer (RHCE) :
According to a recent survey by jobs site, 8 out of 10 respondents indicated that hiring Linux talent was a priority for 2012, and Red Hat Linux continues to make serious headway in the enterprise. The RHCE is a challenging certification to obtain, and requires advanced knowledge of a range of Red Hat systems administration tasks. The RHCE becomes even more valuable with the completion of any of a number of optional Certificates of Expertise, which cover a range of topics such as system clustering and virtualization.

7.Information Technology Infrastructure Library (ITIL) v3 Foundation :
The Information Technology Infrastructure Library (ITIL) Foundation certification demonstrates knowledge of the ITIL framework, which has evolved into the de facto standard for IT management in many enterprises. Companies are on the lookout for those who can demonstrate knowledge of ITIL and IT service management, especially as corporate IT organizations begin to treat IT more like a business by introducing service management standards and practices.

8.VMware Certified Professional (VCP) :
Virtualization has been a very hot area in IT for years now, and demand for IT professionals with virtualization skills will only continue to increase throughout 2012 and beyond. While there are a number of options for virtual platforms in today's marketplace, most private clouds (and many public clouds) in the enterprise utilize VMware as their preferred virtualization platform. The VCP demonstrates a level of proficiency in provisioning, maintaining and supporting VMware-based virtualization platforms, and indicates a level of general proficiency in virtualization as an IT skill.

9.  CompTia Security+ :
Two years of networking experience is recommended for this certification so the true IT newbie might be in over their head with this one. However, security is a big issue and if you have the familiarity to take the one exam required, the Security+ cert works as a prerequisite for the MCSA and CNE. 

10.  CompTia's Network+ :
The Network+ certification is excellent for those who need general networking knowledge that is not vendor-based. It covers the basics of installing, troubleshooting, and configuring networking protocols and services. Most people need some experience before taking the $150 exam and an A+ certification is recommended. The Network+ combined with an A+ certification can be used as an elective towards a Microsoft MCSA.

To know more.. 
Friday, 9 October 2015
Posted by Siva Priya

Dangerous Malware Has the Ability to Root Your Smartphones

A new malicious adware is here to make your lives harder. Kemoge adware has the ability to do some serious damage to your precious smartphone by rooting it and then flooding it with tons of ads.

There is no dearth of malware that are designed to serve unwanted ads in your mobile phone and steal your user information. Some of them just stick to severing tons of ads and don’t cause any harm. The security firm FireEye has reported a malware that belongs to the other class.

The malicious adware, dubbed Kemoge, can do some serious damage to your Android phones. Apart from serving the intrusive ads, Kemoge has the ability to root your devices and make them more vulnerable to attacks.

Just like every other malware and adware, Kemoge spreads by hiding itself under the hood of some popular app. Then via the route of 3rd-party app stores, it reaches the smartphones of users and starts causing the harm.

It should be noted that if you are downloading the apps from stores other than Google Play store, you need to be extra careful as they don’t employ the security steps taken by Google.

Here’s a flowchart that shows how Kemoge adware works and its lifecycle. In the first step, using third party apps app stores and web/ad promoted installation, the malicious adware gets installed on phones.

In the second step, the adware collects local info collection for aggressive ad serving and then roots the device. After opening the back door for exploits, the adware can remotely control the app, allowing app installations, uninstall and launching any app.

The Kemoge adware is infecting the smartphones over 20 countries and it’s possible that it originated from China.

The users are advised users not to install apps from 3rd-party sites. You should also keep your phones up to date to close these known root exploits.

Posted by Siva Priya
Tag :

What Is the Difference: Viruses, Worms, Ransomware, Trojans, Bots, Malware, Spyware.

If you are among the ones who consider malware, worms, viruses to be the same thing then you’re on the wrong track. Read further, and improve your knowledge about these terms.

If you’re a regular or even an occasional computer user, then you might’ve heard the terms like Viruses, Worms, Trojans, Bots, Malware, Spyware, etc. But honestly speaking, we consider all these to be a Virus, no matter, whatever be their type. But have you ever tried to acknowledge, what is the difference between these terms, although they are meant to harm your device, steal your data or spy on you, have you ever thought why they are named so differently. Basically, terms like Viruses, Trojans are all types of malicious software or simply ‘Malware’.

Now, the first and foremost question arises, where did these terms came from?

Clearly, they are not some out of the world aliens, in fact the real truth is that they were not even created with an intention to harm someone.

The history of malware attacks goes back to 1949, when John von Neumann, first developed the theoretical base for self-duplicating automation programs, but the technical implementation was not feasible at that time. The term ‘Computer Virus’ was first used by Professor Leonard M. Adleman in 1981, while in conversation with Fred Cohen.

The first computer virus named ‘Brain’ was coded by two brothers Basit Farooq Alvi and Amjad Farooq Alvi, who were from Lahore, Pakistan. Brain was meant to infect storage media based on MS-DOS FAT file systems. It was originally designed to infect the IBM PC, it replaced the boot sector of its floppy disk with the virus. The virus program changed the disk label to ©Brain and the defected boot sectors displayed this message:

Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today – Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages….$#@%$@!!

However, as you may presume, there was no evil intention behind this. Alvi brothers said in their interview with TIME magazine, they created the virus only to protect their medical software from piracy, aimed at copyright infringement acts.

Coming back to Malware, these are malicious software designed to harm a computer which may or may not be connected to a network. Malware only get in to action when there is a computer involved in the game otherwise the term Malware is of no use.

Malware are of the following types:

Worms: These programs have the ability to replicate themselves. Their sole objective is to increase their population and transfer themselves to another computers via the internet or through storage media, all the work is done like a top secret mission hiding their movement from the user. They don’t cause any harm to the computer, their replicating nature consumes hard drive space, thus slow down the machine. Some of the notable worms are, SQL Blaster which slowed the internet for a small period of time, Code Red took down almost 359,000 websites.

Viruses: They also have the ability to replicate themselves, but they do damage files on the computer they attack. Their main weakness lies in the fact, they can get into action only if they have the support of a host program, otherwise they’re just like a defeated warrior. They stick themselves to songs, videos, and executable files and travel all over the internet. W32.Sfc!mod, ABAP.Rivpas.A, Accept.3773 are some of the examples of Virus programs.

The Virus Gang:

  • File Viruses
  • Macro Viruses
  • Master Boot Record Viruses
  • Boot sector Viruses
  • Multi-Partite Viruses
  • Polymorphic Viruses
  • Stealth Viruses

Feel free to Google anyone of them if you like.

Trojans: Basically, Trojans are no Viruses, and are not meant to damage or delete files on your system. Their sole task is to provide to a backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permission. JS.Debeski.Trojan is an example of Trojan.

They are named after the ‘Trojan Horse’ tale, in which Greeks entered the city of Troy with the help of a wooden horse which was meant to be a gift, but turned out to be a sweet poison, as depicted in the movie Troy.

The Trojan Gang:

  • Remote Access Trojans
  • Data Sending Trojans
  • Destructive Trojans
  • Proxy Trojans
  • FTP Trojans
  • Security Software Disabler Trojans
  • Denial-Of-Service Attack Trojan

Adware: Adware are used to display advertisements in the programs. They generally come attached with software programs that are free to use as they are the only source of revenue for the developers of those software programs. Adware can’t be completely called as Malware as they have no intention to harm your machine, they only track what advertisements you’re more interested in, so as to display the relevant advertisements on your screens.

Spyware: These programs also come attached with other freeware software, track your browsing and other personal details and send it to a remote user. They can also facilitate installation of unwanted software from the internet. Unlike Adware, they work as a standalone program and do their operations silently.

Spam: You get very irritated when you receive unwanted emails from unknown senders, these are called Spams or junk mails. And the process of flooding the internet with the same message is called Spamming, is done for the purpose of commercial advertising. These junk mails may sometimes contain Viruses or Trojans that enter your system as soon as you open the mail.

Bots: Bots or Robots are automated processes that are designed to interact over the internet without the need of human interaction. They can be used for good and bad intentions. An evil minded person can create a malicious Bot that is capable of infecting the host on its own. After transmitting itself to the host device, a Bot creates a connection with central servers which act as the command centers for the infected hosts attached to that network, called Botnet.

Their skills include stealing passwords, logging keystrokes, analyzing network traffic, relay spam, launch DoS (Denial of Service) attacks and open back doors on infected hosts. These Bots can be seen as the advanced form of Worms, their infection rate and tactic is more effective than those of Worms. These malicious Bots are created after a lot of hard work done by their malignant creators.

Ransomware: These type of malware alter the normal operation of your machine, thus barring you to use it properly. Thereafter, these programs display warning messages asking for money to get your device back to normal working condition.

After reading all this, you might be thinking why people create Malware. Here are some reasons which may compel a coder to write malware codes:

  • Take control of a person’s computer for personal or professional reasons.
  • To get financial benefits.
  • To steel confidential data.
  • To prove their point regarding a security breach can be done on a system.
  • To take down an individual computer or a complete network.

and many more….

How can you protect your Computer :

  • Keep your system up to date.
  • Use genuine software.
  • Install an antivirus software and update it regularly.
  • Set-up a firewall, may it be custom as provided by antivirus software. Windows has an in-built firewall option in case you don’t want to use a custom firewall.
  • Never open unknown emails that generally reside in your Spam folder.
  • Never open unknown links, use online website safety checker tools if you’re not sure to open a website.

By taking these simple measures, you can effectively keep your machine free from Malware and other potential threats.
Thursday, 8 October 2015
Posted by Siva Priya
Tag :

Follow by Email

Google+ Followers


Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -