Email and Internet Security [Simple Guide]
- Updated On 09/01/2016
- Author : Andrew Thomas
- Topic : Security
- Short URL : https://hellboundbloggers.com/?p=23292
CONNECT WITH HBB ON SOCIAL MEDIA
A computer user has to be aware of the incredible dangers lurking on the internet. Here are the two computer viruses causing the most damage in the digital land. Included are suggestions on how to deal with them in the most efficient way.
Downloader.Agent.Family – 26% of coverage
Trojans are programs that include in their code hidden features – harmful to the user’s computer system.
Principle of Operation
Trojans from downloader.agent.family group are self installing on your computer, in addition they download other Trojans or malicious files from the Internet on to your system, as well. Most Trojans run every time Windows starts using the system registry entries.
HKLM SOFTWARE Microsoft Windows CurrentVersion Run
Trojan files can be placed into folders
Because of variety and different types, the list does not cover all possibilities, but her are the most common:
C: Windows system32
C: Windows Temp
Immediate removal of the file before downloader.agent.family Trojan downloads and installs other Trojans. BitDefender software is right now the most effective tool in dealing with internet security threats.
Family Worm.Autorun – 23% of coverage
It uses worms to spread widely using a mechanism for Windows AutoPlay Media. Infected media (especially USB drives) contain specially crafted file autorun.inf which is responsible for automatically running specified applications when you connect the drive to your computer.
Here is a sample autorun.inf file used by the worm:
open = f7g.exe
shell open Command = f7g.exe
In this example, the system automatically starts the worm file named f7g.exe located in the root directory of the connected media.
Infection of the computer system in most cases is through stored copies of the file autorun.inf and a copy of the worm files in the main directory of all drives available in the system.
Additional mechanisms used by the worm
Depending on the version of the worm, it also activates a mechanism for hiding the fact that the system is infected in the first place. Some variants also create auxiliary processes in the computer system, whose task is to prevent a simple end of the worm’s execution code, even to remove the worm files from the disk. For this purpose, the processes are created with names similar to the names of system processes, such as:
C: WINDOWS svchost.exe
C: WINDOWS services.exe
C: WINDOWS servets.exe
Most of the worms variations from worm.autorun are also capable of downloading recent versions of the infecting scripts.
The functions performed by the worm
The most common function is effected by a mass mailing worm, mail (spam). The infected system becomes a part of a botnet-u used for directing spam to selected target groups.
Mailwasher is by far a leading software tool of any anti spam programs, most efficiently dealing with spam and email threats, by processing your mail on the remote exchange server, before allowing the messages to be loaded on your computer system or network.
Want to discuss your queries and interact with experts? You can connect with HellBound Bloggers (HBB) Facebook group for free!
Join HellBound Bloggers (HBB) and get Instant Updates. We'll also notify you with Great Deals, Discounts and other Interesting Tips. We won't SPAM or SHARE your Email Address with anyone.
YOU CAN ALSO SEARCH FOR YOUR DESIRED TOPICS:
Thank you for reading! We welcome and appreciate your comments, but at the same time, make sure you are adding something valuable to this article. If you have any serious queries, suggestions or anything related to this article, feel free to share them, we really appreciate that.
But, if your blog comments are a random "Thank you", "Useful Post", or anything that doesn't actually upscale the article, then we'll be removing them and it won't be appeared below. Thanks for understanding and thanks for connecting with us. If you want to give us any feedback or report any errors, you can kindly contact us and we'll revert back soon.
- Facebook Comments
Leave a Reply
14 CommentsFacebook Comments
Nice and Informative post 🙂
This is nice and informative.
nice post…can u share more……..
Be very selective as far as what antivirus program you choose, do some research. I think that a separate tool is needed just for email, because the big assortment of choices, the hackers have in this area, opens an average user to being very vulnerable.
Just like for your heart surgery you would not go to a dermatologist, for true email protection against an array of self executing scripts, you don't want a general virus protection software.
I have some strong recommendations on my site, as well as what should be used for general malware protection, especially for prevention, like the bloodhound virus, Sidhant mentioned.
The amount of viruses on the internet continue to increase many criminals release viruses to create problems for people but there are many viruses which are more sinister and designed to give the creators of the virus financial gain.
I agree with you Pony 100%
Hey Andrew, any info about the bloodhound virus? I installed a program on my desktop. That is when my antivirus captured it..Help will be appreciated..thanks!
Nice article Thomas! in today world every internet user should learn basics of internet security to keep there email & other important accounts safe.
Thank you Hyder.
You are right on.
Deepak @ Internet Marketing
Thanks for the article Andrew ! But is it possible and practical to use different antivirus programs for different viruses.?
I am sorry, I thought I have replied to your question already.
In short, there are some good tools specializing in email protection. One in particular stands apart. I talk about it in great detail.
By the same token, few tools stand out as virus protection in general. And again I have some strong recommendations.
Hassam Ahmad Awan
Nice article buddy. Wat purpose do these viruses serve to their prgramers. Jst makin our life difficult 🙂
Thank you Hassam,
It is an interesting question: What purpose do these viruses serve to their programers? Just making our life difficult
In the past, it was all about the bragging rights and the power to do damage. Now malware became more that. Think financial gain, terrorism, industrial and military espionage.
Hassam Ahmad Awan
Dam this evil world 🙁