Rootkits

How To Prevent Rootkit Attack? 1 . Search on system memory . Monitor all ingress points for a process as it is invoked , keeping tracks of imported library. 2. Seek The Truth , One good rootkits detection application for windows is the RootkitRevealer by Windows security analysts Bryce Cogwell and Mark Russinovich. 3 . [...]

Advertisements

Ransomware

How to prevent Ransomware? Computer users should make sure their firewalls are on and up to date including your operating system, browser and any toolbar plug-ins you use, avoid questionable websites and then be alert when opening any suspicious email messages. Choosing proven antivirus software from a reputable company can help protect your computer against [...]

Backdoor

How to prevent Backdoors? For malicious hackers person must to understanding about security awareness in malware activity because the policy of association in computer security will take the legislation for offenders. Authorities must to control and enforce the policies to minimizing of malware. Each company must ensure that workers do not have a criminal record [...]

Adware

How to prevent? There is no better way to prevent your devices from Adware or any malware other than to install an antivirus software or anti adware tool. These preventive software will be able to recognize the pattern of Adware or spyware and delete it from the device for good. However, users must make sure [...]

Trojan Horse

"Motherhood is the strangest thing, it can be like being one's own Trojan horse!" - Rebecca West Background Trojan Horse Trojan horse is a term for a program looks typical but actually has a malicious purpose. The term comes from Greek mythology about Trojan War. A large wooden horse given to the city of Troy [...]

Rootkits

“Rootkits is Not Virus , rootkits is just a technology“ Background of RootKit Rootkits are not a new technology. Modern rootkit are the same methods used in viruses in the 1980s . The viruses during this era used floppy disks and BBS’s (bulletin board systems) to spread infected programs. Early 1990s a hacker would penetrate [...]

References

Trojan Charles P.Pfleeger & Shari Lawrence Pfleeger. (2012). Analyzing Computer Security : A Threat/Vulnerability/Countermeasure Approach. Prentice Hall. Pearson. Michael A. Davis, Sean M.Bodmer, Aron. (2010). Hacking Exposed: Malware and Rootkits. United State. Mc Graw Hill. Micheal T. Goodrich & Roberto Tamassia. (2011). Introduction to Computer Security.  Pearson https://usa.kaspersky.com/internet-security-center/threats/trojans https://sites.psu.edu/trojanblog/   Virus Chuck Easttom (2006), Computer [...]