VJ: Nov 15, 2007
"I write for the same reason I breathe. If I didn't, I would die."
Sir Issac Assimov,



Thursday, November 15, 2007

Trojans can use your Affliate I-D | An Exclusive report -Takashi Katsuki

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Trojan is a general term for malicious software that is installed under false or deceptive pretenses or is installed without the user's full knowledge and consent. Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.Trojan.Farfli can download and execute additional threat on the infected computer. It can also modify the Internet Explorer Start Page and change many settings related to online transaction and one such example would be the Affliate ID to get more profits through the clicks.
Takashi Katsuk from Symantec is under an investigation of Trojan.Farfli. He Says" Trojan has daily tasks that are closely related to updating Trojan.Farfli. We have seen Trojan.Farfli updated three times a day on average and sometimes as much as seven times a day, and the total number of variants has reached more than 300 since July. In comparison, Trojans discovered around the same time have far fewer variants. For example, Trojan.Hachilem and Trojan.Srizbi have only 150 variants and 40 variants, respectively. Precisely speaking, because there are files dropped by this Trojan that are polymorphic there are hundred and hundred variants of this Trojan "

To read the complete report use the following link
http://www.symantec.com/enterprise/security_response/weblog/2007/11/trojan_writer_lusts_for_money.html


HOW TO REMOVE Trojan.Farfli:

1. Temporarily Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Reboot computer in SafeMode
4. Run a full system scan and clean/delete all infected file
5. Delete/Modify any values added to the registry. [Take extream caution when editing the registry- Use this only if you are tech savy]

Navigate to and delete the following entries:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 2] HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IE4\"Main"= [random]

6. Exit registry editor.
7. Delete the Web sites added to the Internet Explorer Favorites menu.
a) Start Microsoft Internet Explorer
b) Click Favorites > Organize Favorites
c) Delete the Favorites added by the risk: http://www.6781.com/?001

8. Restore the default settings in Internet Explorer. [how to]
9. Restart the computer.

Ensure you have Norton Internet Security installed in your computer to be confident and safe in this connected world.
Read more...

“Storm Trojan” Illustrated | Security Response Lab | Cyber Cops from Symantec

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Cyber crime never sleeps — so the crime-busters have to work round-the-clock too. Which is why U.S.-based Net security leader Symantec, best known for the Norton anti-virus products, has just set up in Pune, its first "24 x 7" Security Response Lab. It is equipped to keep tabs on the world's Internet traffic, monitoring 40,000 of its own sensors buried in cyberspace, across 180 countries, tracking 150 million anti-virus systems — and sending two million dummy e-mails to test the Web's defences.

The lab work is done in four shifts by Indian security specialists or Cyber cops, backed by Symantec's 2000-strong India-based development muscle.

Why Pune? "Because of the strong security expertise and programming skills available in India," explains Anil Chakravarthy, vice-president for India Technical Operations. "We have groups here who are experts in anti-fraud operations," says Vincent Weafer, Symantec's U.S.-based Senior Director (Global Operations).

In fact, Pune engineers have filed four global patents in recent months in the area of Net security. And Vishal Dhupar, Symantec India's Managing Director, feels: "The India-based Security Response Lab is a major contributor to our global response to Net threats — and will also help us track the security landscape in the country from a global vantage point."

The Pune Centre will work in tandem with response labs in seven other locations spread across North America, Europe and the Far East as they try and neutralise viruses, spam (unsolicited mail), phishing (trying to steal sensitive information) and `bots' (robot-like invaders into unsuspecting computers)... often within minutes of the threats appearing.

The Pune lab is the only one that works 24 hours, 365 days of the year.
Symantec illustrates the "Strom Trojan findings in the following link
http://www.symantec.com/content/en/us/home_homeoffice/media/flash/peacomm.html

The threat searches for some particular hashes (searches are done by hash, not by specific filename) and eventually it receives a reply that includes some 'meta tag' information. The meta tag information is encrypted and contains information on where/what to download (e.g. Mixor.Q, Trojan.Abwiz.F).
Read more...

Eye Tracking | Usability Testing

0 comments
Digg it | Stumble it | Save to Del.ico.us |
What would you do if you get an oppurtunity to know where the user see on your website .First when I saw this technology from etre I got thrilled.

Eye tracking services allow you to climb inside the users' head and see your designs through their eyes.This can increase the internet sales for any Online Internet Marketing. Amazed seeing this video file , check this out its a must see video

DONT MISS IT

Read more...

Cyber Cops | Email Tracing | Symantec Antivirus |

0 comments
Digg it | Stumble it | Save to Del.ico.us |

Today we are going to see how to trace email for free. Would you like to know how to do email tracing for free ?. We would have seen many products in the internet which would help you to trace the emails . Before moving on to the topic on email tracking lets see why we need to do that? Is that legal ? To some extent yes. We would be very curious on how we get an unsolicited email. No wonder that we can download the products available in the market and trace the email however what can can do after that?

In this topic we would see on how to trace an email and also on what to do with the collected data.Depending on the response I would post a Video on the email tracing process. Forensic tracing of e-mail is similar to traditional gumshoe detective work. Checking involves looking at each point through which an e-mail passed, with the detective working step-by-step back to the originating computer, and, eventually, the perpetrator.To know this process we have to know how the emails work,but with a email tracing software we dont need to much about how email works.
http://www.iinfosearch.com/email-tracing-software.htm
http://www.msgtag.com/Email_Tracking_Software.html

We may see some of the tools like Neo Trace,emailtrackerpro etc are the few which you can buy to trace email . However there are may more free Free Email Tracing Software available in the market to download and some of the free softwares are listed below.

If you want to trace an email instantly and dont want to download any software, then use the link below for tracing
Email Tracing
Extracting Email Headers link will guide you on how to use this email tracer.In this help document youw would not see on how to trace the email from gmail. This can be done in a very simple way.

Email Tracing Tutorial

step 1: Click on to any email that yoou want to track in gmail
step 2: Click on the option next to reply as seen in the picture
step 3: Click Show Original form the option listed
Step 4: Copy all the contents in the window and paste in the online email tracer.
http://www.cyberforensics.in/OnlineEmailTracer/index.aspx
Step 5: Click "Start Tracing"
If you want to analyze the results the the best tutorial would be
http://www.visualware.com/resources/tutorials/email.html#emailtrackerpro


You would see a video soon on email tracing in my next blog,I would request you to subscribe my blog. We would also discuss on the Assembly language.

Use Symantec Software to secure your online transaction.
To get ASCL Certified Cyber Crime Investigator click the link below to know more
http://www.asianlaws.org/courses/cci/index.htm
Read more...

N360 -comprehensive consumer security solution

0 comments
Digg it | Stumble it | Save to Del.ico.us |
Norton 360™ from Symantec™ is a comprehensive consumer security solution that offers a full circle of protection. Easy to use, it provides automatic and transparent protection from viruses and spyware, fraudulent Web sites, phishing scams, hackers, identity theft and more. With a renewable subscription, up to three PCs in your household are continuously protected, safeguarding your family when they play games, send email, download files, chat, or surf the Web. Transaction security features allow you to shop and bank online with confidence.

HighlightsDefends your PC against a broad range of threats
Transaction security safeguards you against online identity theft
Automatic backup and restore protects your important files from loss
Keeps your PC tuned up for peak performance
Provides a hassle-free user experience
Protects against the latest online threats


Norton 360™ also keeps your PCs tuned for peak performance and protects the data on them by making it easy to back up photos, music, financial documents, other files and restore them at any time. Flexible options allow you to back up your files to CD, DVD and USB devices. For even more convenience, you can also set up automatic backups to an attached hard drive or a secure online storage service to protect your important files in the event something happens to your PC. In addition to this, a smart background scheduler automatically schedules key Norton 360™ functions such as scans, backups, and tune-ups so that they don’t interfere with your PC activities.



BuyTV, Episode 071, Product Feature, Symantec, Norton 360.

Add to My Profile | More Videos
Read more...

Internet Security Threat Report

0 comments
Digg it | Stumble it | Save to Del.ico.us |
The goal of this podcast is to alert listeners to emerging threats and trends that Symantec has identified in the Symantec Internet Security Threat Report Volume XII.
Click here to know the complete report
themeid=threatreport

Read more...

iPhone Hype

0 comments
Digg it | Stumble it | Save to Del.ico.us |


An Exclusive Interview with the IPhone Freaks

Eric Schimdt Google CEO joined Apple's board few months ago and this is the first product to come out of the relationship between Apple and Google.Ipod Build Specifications:- So lets discuss about the iphone and the features that make everyone crazy over the Iphone. The dimensions of Iphone are 115 x 61 x 11.6 mm or 4.5 x 2.4 x 0.46 inches and it weights about 135 grams . The Front is almost occupied by a huge display with a small speaker on the top and a Home Button below it. It is not a flip Phone or even a slide Phone. There is no QWERTY keypad or even the Number pad in the Iphone. On the left hand side Iphone is having a speaker and a ring/Silent button. On the top a standard headset Jack, a Sim Card slot and a Sleep/wake Button.A dock is Provide for charging the Iphone and is compatible with Ipod. On the back it has a 2Mp Camera on the top Left Corner.The most promising feature of Iphone is Large touchscreen. Even the Nokia N95 is also not comparable with resolution and display size provided by Apple Iphone.Another Promising feature of Iphone is Multi-touch user interface. It can recognize you finger gestures and actions and has the ability to ignore unintended touches. Apple claims Iphone as a non Stylus needed touch sensitivity phone. Wit the Multi Touch feature Iphone can recognize your fingers whether you are using a single finger or Multiple fingers.So while browsing a web page for example you can click with a single finger to open a link at the same time use the second finger to scroll around. Even Iphone recognizes unintended touches (i.e) if you place all the fingers at a time and do something on the iphone, Iphone would not react to your actions and stays like a teddybear.The thrilling feel of the Multi-Touch interface is the Pinch and Zoom feature.
The typical iPhone buyer is a young man with a college degree and a higher than average annual household income, according to the group's online survey of buyers.
The iPhone, to cost between $500 and $600, will be available online and in Apple and AT&T stores।
Have You got one YET
Read more...
Online Reference
Dictionary, Encyclopedia & more
Word:
Look in: Dictionary & thesaurus
Medical Dictionary
Legal Dictionary
Financial Dictionary
Acronyms
Idioms
Encyclopedia
Wikipedia
Periodicals
Literature
by:
Word of the Day

Article of the Day

Today's Birthday

In the News

Quote of the Day

Spelling Bee
difficulty level:
score: -
please wait...
 
spell the word:

Match Up
Match each word in the left column with its synonym on the right. When finished, click Answer to see the results. Good luck!

 

Hangman