2010年8月8日星期日

Sasser and Netsky virus

Sometimes virus makers can escape easily traced. However, the virus may also spread through the back way to find the source. Sasser (Sasser) and Netsky (NetSky) was thus discovered.

A 17-year-old named Sven Jaschan created both German and they spread the virus to the network. Although the two methods of virus is completely different, but similar to the code so that experts have determined that they were from one hand.

Sasser virus infection of computer vulnerabilities of Microsoft. Unlike other worms, it does not spread through the mail, if the computer infected with the virus, the virus will automatically look for loopholes in computer systems, and remote control that computer to download the virus. The virus can search for any IP addresses to find potential victims. The virus will modify the user's operating system so that users can not shut down, only force power.

Netsky virus spread through e-mail and network. It also e-mail address spoofing, and accessories for self-replication [Data: CERT]. When the virus spread, will also carry out denial-of-service attacks (DoS), thereby control the bandwidth resources. Sophos experts believe that Netsky and its variants infected once on the Internet 1 / 4 computer [data: Wagner].

Sven Jaschan did not go to jail, but was sentenced to 1 year and 3 months of probation, because he was under the age of 18 years, which escaped.

Until now, we look back at all those viruses attack computers running Windows system. This does not mean that Apple machines can be free from viruses. Here we will experience a kind of virus against the Mac.

Black Hat

In Oz, you can expect to find a good witch and bad witch. Similarly, the hacker community has good and bad. Those who create viruses and hackers to find vulnerabilities is also called "black hat." Many hackers at Black Hat or Defcon hackers conference to discuss the impact and how to use loopholes to the system intrusion.

没有评论:

发表评论