2010年8月8日星期日

Leap-A/Oompa-A

Perhaps you have seen the Apple ads, which have Justin . Long play "I am Apple," and John . Hochman played "I'm the computer." Hochman play computer crash because of a virus, we should be grateful to Al . Jankovic reminds us that "stinking cheese" against the virus

He also pointed out that there are more than 100,000 kinds of virus attacks your computer. And Justin says, that the virus only infects a computer with Windows systems, Apple Computer does not work.

In most cases, these things right. Apple introduced its "do not open a safe" design philosophy, to avoid a lot of harm to the virus. Apple's hardware and operating system is essentially a closed system, because they are Apple's own products. Thus it can be said of Apple's operating system is a "closed" system. Has been in the home computer market, Apple occupies the second place, but there is a great distance away from the PC great. One can imagine, for Apple Computer viruses can not produce as big as Windows viruses harm.

But this did not prevent the emergence of an Apple hackers. In 2006, Leap-A virus, also known as Oompa-A viruses. It uses Apple's iChat chat program between the spread. When Apple computer virus, it will automatically search for iChat's contact list to send information to one of the friends, the message looks like with an incomplete picture of the damaged jpeg attachment.

Virus will not have computer generated much harm, it proves that even Apple may also be toxic. With the Mac's more and more popular, more and more viruses for Mac will appear.

Sasser and Netsky virus

Sometimes virus makers can escape easily traced. However, the virus may also spread through the back way to find the source. Sasser (Sasser) and Netsky (NetSky) was thus discovered.

A 17-year-old named Sven Jaschan created both German and they spread the virus to the network. Although the two methods of virus is completely different, but similar to the code so that experts have determined that they were from one hand.

Sasser virus infection of computer vulnerabilities of Microsoft. Unlike other worms, it does not spread through the mail, if the computer infected with the virus, the virus will automatically look for loopholes in computer systems, and remote control that computer to download the virus. The virus can search for any IP addresses to find potential victims. The virus will modify the user's operating system so that users can not shut down, only force power.

Netsky virus spread through e-mail and network. It also e-mail address spoofing, and accessories for self-replication [Data: CERT]. When the virus spread, will also carry out denial-of-service attacks (DoS), thereby control the bandwidth resources. Sophos experts believe that Netsky and its variants infected once on the Internet 1 / 4 computer [data: Wagner].

Sven Jaschan did not go to jail, but was sentenced to 1 year and 3 months of probation, because he was under the age of 18 years, which escaped.

Until now, we look back at all those viruses attack computers running Windows system. This does not mean that Apple machines can be free from viruses. Here we will experience a kind of virus against the Mac.

Black Hat

In Oz, you can expect to find a good witch and bad witch. Similarly, the hacker community has good and bad. Those who create viruses and hackers to find vulnerabilities is also called "black hat." Many hackers at Black Hat or Defcon hackers conference to discuss the impact and how to use loopholes to the system intrusion.

Nuowei Ge virus

This Nuowei Ge (Novarg) virus, also known as MyDoom, it also would leave a back door in the user's operating system. The virus was later produced many variants, the initial Nuowei Ge virus has two triggers.

The first program in the February 1, 2004 start to launch denial-of-service attack (DoS), the second program in the February 12, 2004 to stop the virus self-replication. But after a virus attack to stop, leaving the back doors still have harmful [Data: Symantec].

Soon after, another outbreak of the virus to several search engines a mortal blow. And other viruses, Nuowei Ge virus infected users computer search for the contact list, then send the message. In addition, it will send search requests to search engines to search the mailbox and then send e-mail. This led to Google like search engine receive millions of search requests, so that they become very slow service and even server crashes [Data: Sullivan].

Nuowei Ge virus through e-mail and P2P networks to spread. According to Internet security firm MessageLabs information, then every 12 will have a message carrying the virus [data: BBC]. And cover letter similar to the virus, the virus will be carried out e-mail sender Nuowei Ge camouflage, which makes the virus through e-mail inquiries, the source extremely difficult.

Strange computer virus

Not all computer viruses are broken ring or network. Some viruses cause computers to a variety of strange changes occur. Early virus called table tennis table in the computer to generate a constant jump ball, but it will not harm the computer. Funny virus will give you a lot of that computer viruses, and it does not cause any harm, not self-replicate. If you do not trust it, you can use anti-virus software to remove them.

SQL Slammer / Sapphire virus

In late January 2003, a new server, the virus began to spread in the network. As many computer does not have proper precautionary measures, a number of important large-scale computer system eventually paralysis. Bank of America ATM machine can not use the 911 service centers in Seattle was interrupted, Continental Airlines booking system paralyzed, some flights were canceled.

Slammer virus a great impact on South Korea, many bars and cafes to provide Internet services to flow sharply.

This network is the culprit storm SQL Slammer, also known as Sapphire virus. In the software patches and virus by killing before the appearance of this virus has caused 10 billion dollars in losses [Data: Lemos]. Sapphire process of very rapid spread of the virus. The first server in minutes after infection, virus replication in a short time began to multiply. 15 minutes later, the importance of the server line, half are infected [Data: Boutin].

Slammer virus left us a profound lesson, timely patching and upgrading anti-virus software is not enough, hackers will use any loophole they can find to attack, especially those unknown vulnerabilities. Good anti-virus before the poisoning is very important work, while the backup job in a timely manner to prevent the worst situation is also essential.

Time to solve the problem

Some hacker program lurking in the poisoning of the computer until a specific time before the outbreak. Here are some of the virus triggered at a specific time.
"Jerusalem" virus only 13 days to trigger this every Friday, the victim's computer data sabotage.
"Michelangelo" virus in March 6, 1992 broke out, Michelangelo, I was born March 6, 1475.
" Chernobyl "virus outbreak on April 26, 1999, the day is the 13th anniversary of the Chernobyl nuclear leakage.

Code Red and Code Red Generation Ⅱ

Code Red (Code Red) and the Code Red Ⅱ appeared in the summer of 2001. This use of the two worms are in the Windows 2000 and Windows NT operating system in the presence of a loophole, that is buffer overflow vulnerability Dang system cache device Jieshou Daochaoguota Chuli range of Data, the data adjacent to the Cunchu overflow Fugai unit, so that other programs can not operate normally or even cause system crashes.

Carnegie . atrazine University's Computer Emergency treatment center alerting the public to the dangers of the Code Red Virus

The original Code Red worm using distributed denial of service attack (DDOS) attacks on the White House website. In other words, all the Code Red virus infected the computer will be connected at the same time, the White House Web site, overloading the server, the site crashes.

Windows 2000 systems installed in the Code Red computer if Ⅱ, machine will become a "chicken." Worm will set up back doors in the system, allowing remote users to login and control. Term is the system control computer for the computer owner, this is sad news. Dissemination of the virus can be exploited to obtain some information on the victim's computer, or even use this computer for criminal activities. Not only for victims of paralysis to worry about the computer, there may be others as a scapegoat.

Although Windows NT is more vulnerable to Code Red's infection, but the virus in these machines is not very serious harm. Using the Windows NT network servers can often crash after poisoning, but does not produce other hazards. Compared with Windows 2000 users, this is actually nothing.

Microsoft then released patch fixes in Windows 2000 and Windows NT security holes, thus, the virus is no longer rampant. But the patch does not remove computer viruses, which requires users to deal with their own.

How should we do?

Found that computer poisoning, you should be how? This requires, as the case may be. Many anti-virus software will automatically delete the virus. Some virus will destroy your data or information, then the need to restore the backup. Regular backup of the system is very important. The Code Red, the format and then restore the backup computer is a good way. Some viruses will install malicious software on your computer, only this time anti-virus scanning is not enough.

Seeking employment letter virus

Klez (Klez) virus milestone. The virus first appeared in 2001, after a few months a number of variants. The most common cover letter by mail to spread viruses, and then self-replicate, and where the victims address book to send the same e-mail contacts.

Some variants of Klez or even fatal damage will be computer generated. According to versions, cover letter virus can be divided into ordinary viruses, worms or Trojan horses. Some may even be forced to close or disguised as antivirus software virus removal tool [Data: Symantec].

Klez soon appear on the network, hackers it has been improved to make it more contagious. With many viruses, the virus will use the cover letter to contact the victim's address book to send the same message. In addition, it contacts from the poisoning in a randomly selected person, fill in the e-mail address location of the sender. This is the e-mail address spoofing - seems the message is sent one of your acquaintances, but they are actually other human hair.

E-mail address is disguised in order to achieve the following purposes. First of all, to prevent the sender even if the recipient is useless, because the message is sent by other people. Second, users can not distinguish whether a message is spam, Klez will result in the recipient mailbox to plug in a short time. Also, because the sender is a mailing list, contact, many people will open the message and lead poisoning.

In 2001 there are several very powerful computer virus, the next section we will learn that in 2001 with the emergence of another kind of virus - Code Red.

Love Bug virus

Melissa virus outbreak after one year, the Philippines, the emergence of a new virus. And Melissa difference is that there is this worm, the independent self-replication process. The virus name is "I love you (ILOVEYOU)".

And Melissa similar to the original Love Bug virus is spread through the mail. Title usually indicate that this is an admirer of the confession from your letter. Mail attachment is the culprit. This worm file originally called LOVE-LETTER-FOR-YOU.TXT.vbs. Suffix name vbS that hackers are using the VB script program written in this [information: McAfee].

According to antivirus vendor McAfee's report, Love Bug virus attack means the following:

It will self-replicate, each partition on the hard disk has a hidden backup.
It will be inside the user's registry to add new content.
Self-replication, and then automatically replace some files.
By e-mail and chat client communication
Automatically download a file called WIN-BUGSFIX.EXE the patch, this patch will steal private information and send it to hackers.
In the end who created the virus? Many people suspected that the Philippines O'Neill . Di . Guzman. At that time the Philippines do not have a computer failure related laws, the theft of the name only summoned Di . Guzman. Guzman did not admit or deny allegations about the virus and ultimately the lack of conclusive evidence, authorities were forced to release Guzman. According to media estimates, Love Bug virus caused the loss of about 10 billion U.S. dollars.

Guard against "crying wolf"

That viruses, worms and Trojan horses are not only two, we also need to guard against hoax virus. They are not true viruses, they do not self-replicate, or on the computer any harm. Virus creators just wanted to get their real ones. Even so we can not take it lightly, like "crying wolf" story, we may overlook because of the real virus hoax virus.

Melissa Computer Virus

Spring of 1998, David • L • Smith (David L. Smith) in the macro using Word software, a computer virus preparation operations, the virus can spread through the


mail. Smith called it Melissa (Melissa), Florida, the name of a dancer [source: CNN].

Melissa virus usually transmitted by mail, usually the title of the message, "This is for your information, do not let anyone see." Once the recipient opens

the message, the virus automatically to the user address book 50 friends copy before sending the same message.

Smith put it on the network after the virus began to spread rapidly. FBI report to Congress, Melissa on the part of the Government and the private sector

network devastating blow to the federal government attaches great importance to this [data: FBI]. E-mail traffic surge forced many companies to stop the mail

service until the virus under control to re-open.

After a long trial, Smith was betrayed for 20 months in prison, while liable to a fine of five thousand U.S. dollars. In addition, without court permission,

Smith may not use the network [Data: BBC]. Melissa Although there is no cause great harm to society, but it is the first cause of concern for society


viruses.