Wednesday, November 25, 2009

Make Sure that you computer is secure from viruses

Computer viruses are harmful, destructive and self-replicating programs which can spread widely on a computer or from one system to other through Internet, a network or a removable computer device such as floppy disc, CD or USB drive. Over the last years, the Internet usage in organizations and homes has increased at a rapid rate which has also increased rate of spread of computer viruses and the demand for computer virus scanning and eliminating. Computer virus creators frequently target Windows operating system as it is a most widely-used operating system as compared to Apple's Mac and other operating systems.

If you have a laptop or computer working on Windows operating system and you want to be sure that your computer is secure from viruses then follow these steps:

Firstly, you need to download and install antivirus program. You must install all of its latest updates and scan your Windows computer using that antivirus program.

Now install Malwarebytes and Superantispyware on your Windows computer. Also make sure that both of them have their updates installed. Run a scan using this Malwarebytes and Antispyware program and remove all the Spywares or Malwares if found.

Windows computers have default web browser which is Internet Explorer. Although some sites do not work properly on IE, If you want to use those site, you have to set the Internet Explorer's Cookie setting slider to either Medium, Medium-High or High.

Most of the adwares, spywares and malwares are designed to attack Internet Explorer. So you can use other browsers like Firefox, Google Chrome etc. Although each of them have there own advantages and disadvantages, they are good in protecting your Windows computer from malwares and spyware.

Friday, November 20, 2009

Windows 7 zero-day bug

In this computer-savvy world, the issue of piracy is on hike. With the advent of any new technology, you can easily find its pirated version available at very low cost and sometimes for free also.

Before the release of Windows 7 Release Candidate (RC), its pirated version was made available in the market and on various bittorrent sites like Mininova.org and others. These websites clearly highlighted the warning of the potential risk to the users computers.

It was a warning for the users who were downloading the new RC builds of windows 7. This warning message was posted by Frank Fontaine on the Neowin.net discussion boards.
Various downloads carried a trojan in the setup EXE. The setup EXE is just a container which appears to be self extracting executing file. It contained Setup.exe and codec.exe.
These executable files were meant to contain trojans and other malwares that may harm your computer.

It is highly recommended and well advised not to use the leaked downloads and use the genuine copies to keep your computer healthy and working.
Recently, Microsoft has confirmed that an unpatched risk exists in Windows 7, but minimized the problem, saying by blocking two ports at the firewall, most Windows 7 users would be protected from attack.

Microsoft has accepted in a security advisory that a Microsoft-made network file- and print-sharing protocol which is a bug in Server Message Block could be used by attackers to disable Windows 7 systems.

A Canadian researcher Laurent Gaffie first reported the zero-day risk, when he lighted the bug and posted proof-of-concept attack code to the Full Disclosure security mailing list and his blog. According to Gaffie, exploiting the defect crashes Windows 7 computers so badly that the only way is to power off the computers manually.
At this time, Microsoft only said that it was investigating Gaffie's reports.

Then on 13th November, Microsoft took the next step and issued the advisory. a spokesman for Microsoft security group, Dave Forstrom has said in an e-mail that company is aware of users and the detailed exploit code that would cause Windows 7 computer to stop working. Also, the company is unaware of attacks to exploit the reported risks at this time.
Forstrom resonated Gaffie's comments that while an exploit could disable a PC, the risk could not be used by hackers to install malicious code on a Windows 7 computers.

Forstrom assured that both SMBv1 and its successor, SMBv2, contain the bug. But Windows 2000 , Windows 2003, Windows XP, Windows Vista and Windows Server 2008 are not affected.
The company has also warned that attacks could be aimed at Internet Explorer and any other browser also. Hackers could give users specially-ready uniform resource identifier and then disable their PCs with malformed SMB packets after tricking consumers into visiting a malicious web site.

Since the new operating system was launched on Oct. 22, Gaffie's risk was the first zero-day reported and was confirmed by Microsoft in Windows 7.