Kamis, 26 Mei 2016

Types of Computer Viruses and How to Overcome It


This time I want to share information about the types of computer viruses and how to overcome them. Things will be outlined, namely the location of the virus, how the spread and how to provide protection to our operating system. Here's the explanation.

1. Trojan
That is the type of virus that is created with the aim to control and steal data that is in the computer. In essence, the trojan is not a virus, but because it is considered to be quite disturbing, then the group breaks into a computer virus that needs to be wary of.
The main deployment location that is connected to the internet access, such as email and personal data dipassword.
To overcome that is by using a special antivirus untu trojans, such as Trojans and Trojan remover hunter.

2. Worm
That is a program that can copy itself. In general, no meninfeksi worm virus, but a dangerous thing: the ability to multiply themselves are so fast that if the computer is attacked in a long time, can lead to fragility in the system. Because the data in memory and hard drive to be great.
Location spread through email and Internet networks. Meanwhile, to overcome it can use the antivirus Iasa. If using antivirus pro even more optimal results.

3. Memory Resident virus
That is the type of virus that infects RAM. Of course, its location in the computer's memory. This virus will be active when the operating system starts up. With own code, virus of this kind will disturb the process pamanggilan program should be running normally. The effect is lemotnya system.
How to protect by using antivirus and update it periodically.

4. Web scripting virus
That is a complex program code which serves to enhance the content of a website. Well ... this is the code that is usually used to interrupt the program with a specific purpose. Example: JS. Fortnight
Location connect Internet, especially email.
For the protection system can be done by installing Microsoft default Windows tool. Do it regularly scans using this application.

5. Multipartite virus
Is a type of virus that is composed of a file to infect a specific operating system. Hiding location that is in RAM, then it will infect the hard drive at a later stage. Conto: invader, flip and tequila.
The fix is ​​to clean up their bad sectors and do disk defragmenter (if using Windows OS).

6. FAT virus
FAT stands for File Allocation Table. That is the type of virus that is created with the purpose to destroy files in a specific location. Usually hide in the storage of personal data. The effect is the ability to hide our important files, making it difficult to detect and will seem to disappear.
Prevention: observe and note the data stored in the hard drive. If we suspect any file that we never do to save it, meaning it is a FAT virus.

7. Companion virus
A virus to interfere with personal data. Beada location in the hard drive. But mempunyaiciri berbeda.Contoh extensions that we have the file extension me.exe, the virus made another extension me.com.
The location on the hard drive, usually gathered with the new files.
Prevention: install an antivirus scan and download the firewall.

8. Polymorpic virus
Is a type of virus that has the ability to encode themselves in different ways depending on the time it infects the system. Example: Marburg, Tuareg and elken.
The way to prevent is to install antivirus high end.

9. Directory virus
Is a type of virus that menginifeksi file with the extension exe or com, then move it. So that when the file is called to run, it will automatically be in action for the virus to infect other systems.
The location is in the hard drive and potential to disrupt all programs. Examples of Dir-2 virus.
Handling: format and reinstall all the programs and operating systems.

10. Macro viruses
Having the ability to infect macro files such as .doc, .xls, .mdb Pps and. Besides this type of virus will infect an email containing the document.
Location: via e-mail and Internet networks.
How to cope with to avoid opening unknown emails and also disable macro program.

11. Boot sector viruses
Is a type of virus that infects Baian smallest in a hard drive is called the boot sector. Its location is hiding in the floppy disk. So that when the system is running he could move kemama everywhere to take action on the infection. Example: Polyboot.B, Anti EXE.
The most powerful way to overcome that is by ensuring the floppy disk in the write protect position.

12. Direct action viruses
Viruses that infect duties AUTOXEC BAT file types. Located on the hard drive directory. This type will be in action when the operating system starts. This strain has the ability to infect external devices such as external hard drives and flash. Examples of Vienna.
Location: generally in the HDD directory. But it also has the ability to move.
How to solve it by installing an antivirus scan.

Thus the explanation of the types of viruses and how to overcome them. It is expected with this knowledge we can take the appropriate action when their computers are infected with a virus.

How To Easily Hide Folders or Files Secret

Your computer is often used by your friends? Worried by personal files you opened by them? do not have to worry about this time I will share how to hide folde or files with ease. Here are the steps:

  • Select the folder / files to be hidden



  • Right-click the folder select Properties




  • Checklist on the hidden ago ok




  • Then the dialog box will appear as below select ok



The next step for perfectly menyebunyikan file
1. Open Windows Explorer or press Windows + E on your keyboard simultaneously
2. Show the menu bar by pressing Alt on your keyboard
3. Click the Tools menu and select Folder Options


 4. Click View and then check the article Do not Show hidden Files, click Ok

 5. If successful it will be successfully hidden folder



Selasa, 24 Mei 2016

DDOS Attacking Server Using Notepad

Using a simple notepad application we are able to perform to a certain DDOS server. How to ?

  • Open your notepad by clicking the Windows + R, then typing notepad and enter.
  • Once open notepad type the following command, as in the screenshot of my notepad






  • Save your notepad and name dossmysteryofcyberpace.bat or up to you as long as it ends in .bat
  • Open the file that has been saved before, it will appear as shown below



  • Then ping the targeted site to get the ip address, for example : 216.58.196.68



  • Then you type the IP address, for example: ip Host: 216.58.196.68 |  Packet size: 1000000 press enter




  • If Dos successful it will appear as follows



If you want maximum results, do DDOS simultaneously so fast website down

Explanation of DOS and DDOS attack

Explanation of DOS and DDOS attack

    Attacks DoS (denial-of-service attacks') is a type of attack on a computer or server in the Internet network by spending resources (resource) owned by that computer until the computer is not able to function properly thus indirectly prevent users others to gain access to the services of the computer that was attacked.
     In a Denial of Service attacks, the attacker will try to prevent a user access to a system or network using several different ways, including the following:

  • Flooding the network traffic with a lot of data so that network traffic is coming from unregistered users will be unable to enter into the network system. This technique is referred to as traffic flooding.
  • Flooding the network with a lot of requests to a network service disedakan by a host so that requests are coming from a registered user can not be served by such services. This technique is referred to as a request flooding.
  • Interfere with communication between a host and a client that is registered by using a lot of different ways, including by changing the system configuration information, or even the physical destruction of the components and servers.

 DDos Attack Denial of Service in Distributed (Distributed Denial of Service (DDos)) is one type of denial of service attacks that use multiple host attacker (either using a dedicated computer to attack or computer "forced" into a zombie) to attack one fruit in a target host jaringan.Atau an attempt to make a computer resource can be used by its user, using thousands of zombie systems 'attack' simultaneously. The goal is negative, namely that a website or online service can not work efficiently or even dead at all, temporarily or permanently. DDoS attack is one of the models of DoS (denial-of-service) attacks.

 HISTORY DOS ATTACK

Forms of Denial of Service attacks are attacks initial SYN Flooding Attack, which first appeared in 1996 and exploit the weaknesses contained in the protocol Transmission Control Protocol (TCP). Other attacks finally developed to exploit the flaw contained in dalamsistem operations, network services or applications to make that system, network service, or application can not serve the user, or even crash. Some of the tools used to perform DoS attacks was developed after it (even some freely available tools), including Bonk, LAND, Smurf, Snork, WinNuke, and Teardrop.
Nevertheless, attacks against the TCP DoS attacks are often performed. This is because the other type of attack (as well as filled the hard disk in the system, locking one valid user account, or modify the routing table in a router) requires network penetration in advance, the possibility of penetration is small, especially if the network system has been strengthened.
 
Differences Dos and DDos attack atta

The difference between a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack is the DoS attack, a computer and an internet connection is used to flood the server with the package, with the aim of overloading the targeted server bandwidth and resources.
A DDoS attack, using multiple devices and multiple internet connections, often distributed globally into what is called a botnet. A DDoS attack is, therefore, much more difficult to deflect, simply because there is no single attacker to maintain than, as resources are targeted to be inundated with requests from hundreds and thousands of different sources.