This week in computer security we learned about different kinds of computer threats in class. It turns out not that spam and Nigerian letters are not the only things to look out for. There is spy ware, malware, trojan horses and worms. about but there are loads of other threats looking to take over your computer. Literally! through malware/spy ware and viruses such as Trojan hoses and worms. For the most part everyone has at least heard of these types of security threats right?? The thing that is most shocking to me was the fact that hackers are now able to turn your computer into what is known as a zombie. Sounds si-fi but it’s the real deal. A zombie computer is a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombie applications give hackers access to your machine, usually by exploiting a security vulnerability or creating a backdoor entry point. Once a cracker establishes this link, he or she can manipulate your computer. When a network of computers that have transformed into zombies they are called a botnet.
Some botnet applications allows hackers to control your computer remotely. Others give the hacker the ability to look at your private information and steal your identity. Unfortunately it is hard to get your computer out of a botnet and that is even if you knew that your computer was part of one. If you think it may be you should try a system restore( restoring your computer to the state it was last in when saved) or if that dosen't work take it to a computer professional.
System Restore
If you ever are suspicious and need to do a system restore heres how to do one
1. Go to your system control panel
2. Click System & Security Tab
3. Restore Files
Here's how it looks http://screencast.com/t/qh43kh9t
I have windows 7 on my pc so it may be diffrent on other pc's but it will still be under the same tab generally. Here's a link for exactly how to do a system restore.
http://www.ehow.com/how_2266976_do-system-recovery.html
Symptoms Of A Botnet
- unusually slow computer
- your hard drive running even when you are not active on the computer
- you have items in your sent folder that you did not send
- your software programs suddenly don’t run
In the link below is a video which describes a clever scheme hackers use get money from you. Fake anti virus software is on the rise and are being made everyday to trick you. Some of these schemes are even on legitimate sites. for instance if you are trying to watch a video sometimes certain sites will ask you to download a special ad on to be able to play the video. Hackers have exploited this by using these pop up boxes to instead download misleading software to your computer. Once downloading it the tells you that you have a virus. It also goes over why Norton security is a great anti virus to have. Norton security alerts you of risks before you download them preventing unknowing downloads of malicious software.
<object width="640" height="390"><param name="movie" value="http://www.youtube.com/v/kMLYwfSy8YE&hl=en_US&feature=player_embedded&version=3"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/kMLYwfSy8YE&hl=en_US&feature=player_embedded&version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="640" height="390"></embed></object>
Hope you enjoyed.
No comments:
Post a Comment