<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>at videa</title><description></description><managingEditor>noreply@blogger.com (at_videa)</managingEditor><pubDate>Wed, 6 Mar 2024 15:41:55 +0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">53</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://atvidea.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="http://advidea.blogspot.com"/><itunes:subtitle/><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><title>Protect yourself from Conficker</title><link>http://atvidea.blogspot.com/2009/08/protect-yourself-from-conficker_25.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Tue, 25 Aug 2009 16:47:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-29770738078451065</guid><description>&lt;p&gt;       The Conficker worm is a &lt;a href="http://www.microsoft.com/security/worms/whatis.aspx"&gt;computer worm&lt;/a&gt; that can infect your computer and spread itself to other computers   across a network automatically, without human interaction.     &lt;/p&gt;   &lt;p&gt;       If you are an IT professional, please visit &lt;a href="http://technet.microsoft.com/en-us/security/dd452420.aspx"&gt;Conficker Worm:   Help Protect Windows from Conficker&lt;/a&gt;.     &lt;/p&gt;   &lt;h3&gt;On This Page&lt;/h3&gt;   &lt;table border="0" cellpadding="0" cellspacing="0"&gt;     &lt;tbody&gt;       &lt;tr valign="top"&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#ETB"&gt;             &lt;img alt="Is my computer infected with the Conficker worm? " src="http://www.microsoft.com/security/assets/images/arrow_px_down.gif" border="0" height="9" width="7" /&gt;           &lt;/a&gt;           &lt;img src="http://www.microsoft.com/security/assets/images/spacer.gif" border="0" height="1px;" width="8px;" /&gt;         &lt;/td&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#ETB"&gt;Is my computer infected with the Conficker worm? &lt;/a&gt;          &lt;br /&gt;         &lt;br /&gt;        &lt;/td&gt;       &lt;/tr&gt;       &lt;tr valign="top"&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#EWC"&gt;             &lt;img alt="What does the Conficker worm do? " src="http://www.microsoft.com/security/assets/images/arrow_px_down.gif" border="0" height="9" width="7" /&gt;           &lt;/a&gt;         &lt;/td&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#EWC"&gt;What does the Conficker worm do? &lt;/a&gt;          &lt;br /&gt;         &lt;br /&gt;        &lt;/td&gt;       &lt;/tr&gt;       &lt;tr valign="top"&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#EKE"&gt;             &lt;img alt="How does the Conficker worm work?" src="http://www.microsoft.com/security/assets/images/arrow_px_down.gif" border="0" height="9" width="7" /&gt;           &lt;/a&gt;         &lt;/td&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#EKE"&gt;How does the Conficker worm work?&lt;/a&gt;          &lt;br /&gt;         &lt;br /&gt;        &lt;/td&gt;       &lt;/tr&gt;       &lt;tr valign="top"&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#ETE"&gt;             &lt;img alt="How do I remove the Conficker worm? " src="http://www.microsoft.com/security/assets/images/arrow_px_down.gif" border="0" height="9" width="7" /&gt;           &lt;/a&gt;         &lt;/td&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#ETE"&gt;How do I remove the Conficker worm? &lt;/a&gt;          &lt;br /&gt;         &lt;br /&gt;        &lt;/td&gt;       &lt;/tr&gt;       &lt;tr valign="top"&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#EAF"&gt;             &lt;img alt="Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm? " src="http://www.microsoft.com/security/assets/images/arrow_px_down.gif" border="0" height="9" width="7" /&gt;           &lt;/a&gt;         &lt;/td&gt;         &lt;td&gt;           &lt;a href="http://www.microsoft.com/security/worms/conficker.aspx#EAF"&gt;Where can I find more technical information about the Conficker worm and how can I stay up to date on   the Conficker worm? &lt;/a&gt;          &lt;br /&gt;         &lt;br /&gt;        &lt;/td&gt;       &lt;/tr&gt;     &lt;/tbody&gt;   &lt;/table&gt;   &lt;div class="new_content"&gt;     &lt;a name="ETB"&gt;&lt;/a&gt;     &lt;h2&gt;Is my computer infected with the Conficker worm? &lt;/h2&gt;     &lt;p&gt;         Probably not. Microsoft released a security update in October 2008 (&lt;a href="http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx"&gt;MS08-067&lt;/a&gt;) to protect against Conficker.       &lt;/p&gt;     &lt;p&gt;If your computer is up-to-date with the latest security updates and your antivirus software is also up-to-date, you probably don't have the Conficker worm. &lt;/p&gt;     &lt;p style="margin-bottom: 1em;"&gt;         If you are still worried about Conficker, follow these steps:       &lt;/p&gt;     &lt;ol&gt;&lt;li&gt;           Go to &lt;a href="http://go.microsoft.com/fwlink/?LinkId=148275"&gt;http://update.microsoft.com/microsoftupdate&lt;/a&gt; to verify your settings and check for updates.          &lt;/li&gt;&lt;li&gt;           If you can't access &lt;a href="http://go.microsoft.com/fwlink/?LinkId=148275"&gt;http://update.microsoft.com/microsoftupdate&lt;/a&gt;, go to &lt;a href="http://safety.live.com/"&gt;http://safety.live.com&lt;/a&gt; and scan your   system.          &lt;/li&gt;&lt;li&gt;           If you can't go to &lt;a href="http://safety.live.com/"&gt;http://safety.live.com&lt;/a&gt;, contact support at 1-866-PCSafety or 1-866-727-2338. This phone number is for virus and other security-related support. It is available 24 hours a day for the U.S. and Canada. For support in other countries, visit the &lt;a href="http://www.microsoft.com/protect/worldwide/default.mspx"&gt;Worldwide   computer security information&lt;/a&gt; page.         &lt;/li&gt;&lt;/ol&gt;     &lt;a class="backtotop" href="http://www.microsoft.com/security/worms/conficker.aspx#"&gt;Back to Top&lt;/a&gt;    &lt;br /&gt;   &lt;br /&gt;    &lt;a name="EWC"&gt;&lt;/a&gt;     &lt;h2&gt;What does the Conficker worm do? &lt;/h2&gt;     &lt;p style="margin-bottom: 1em;"&gt;To date, security researchers have discovered the following variants of the worm in the wild.&lt;/p&gt;     &lt;ul&gt;&lt;li&gt;         &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.A"&gt;Win32/Conficker.A&lt;/a&gt; was reported to Microsoft on November 21, 2008.         &lt;/li&gt;&lt;li&gt;         &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.B"&gt;Win32/Conficker.B&lt;/a&gt; was reported to Microsoft on December 29, 2008.         &lt;/li&gt;&lt;li&gt;         &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.C"&gt;Win32/Conficker.C&lt;/a&gt; was reported to Microsoft on February 20, 2009.         &lt;/li&gt;&lt;li&gt;         &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.D"&gt;Win32/Conficker.D&lt;/a&gt; was reported to Microsoft on March 4, 2009.         &lt;/li&gt;&lt;li&gt;         &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.E"&gt;Win32/Conficker.E&lt;/a&gt; was reported to Microsoft on April 8, 2009.         &lt;/li&gt;&lt;/ul&gt;     &lt;p&gt;       &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.B"&gt;Win32/Conficker.B&lt;/a&gt; might spread through file sharing and via removable drives, such as USB drives (also known as thumb drives). The worm adds a file to the removable drive so that when the drive is used, the AutoPlay dialog box will show one additional option. &lt;/p&gt;     &lt;p&gt;The Conficker worm can also disable important services on your computer. &lt;/p&gt;     &lt;p&gt;         In the screenshot of the Autoplay dialog box below, the option &lt;strong&gt;Open folder   to view files — Publisher not specified&lt;/strong&gt; was added by the worm. The   highlighted option — &lt;strong&gt;Open folder to view files — using Windows Explorer&lt;/strong&gt; is the option that Windows provides and the option you should use.       &lt;/p&gt;     &lt;p&gt;If you select the first option, the worm executes and can begin to spread   itself to other computers.&lt;/p&gt;     &lt;div&gt;       &lt;img alt=" The option Open folder to view files — Publisher not specified was added by the worm." src="http://www.microsoft.com/security/assets/images/_security/worms/Autoplay.jpg" border="0" height="412" width="381" /&gt;      &lt;br /&gt;      &lt;p&gt;           The option &lt;strong&gt;Open folder to view files — Publisher not   specified&lt;/strong&gt; was added by the worm.         &lt;/p&gt;     &lt;/div&gt;     &lt;a class="backtotop" href="http://www.microsoft.com/security/worms/conficker.aspx#"&gt;Back to Top&lt;/a&gt;    &lt;br /&gt;   &lt;br /&gt;    &lt;a name="EKE"&gt;&lt;/a&gt;     &lt;h2&gt;How does the Conficker worm work?&lt;/h2&gt;     &lt;p&gt;Here’s an illustration of how the Conficker worm works.&lt;/p&gt;     &lt;img src="http://www.microsoft.com/security/assets/images/_security/worms/diagram.jpg" alt=" Here's a visual explanation of how the Conficker worm works." border="0" height="539" width="727" /&gt;     &lt;a class="backtotop" href="http://www.microsoft.com/security/worms/conficker.aspx#"&gt;Back to Top&lt;/a&gt;    &lt;br /&gt;   &lt;br /&gt;    &lt;a name="ETE"&gt;&lt;/a&gt;     &lt;h2&gt;How do I remove the Conficker worm? &lt;/h2&gt;     &lt;p&gt; If your computer is infected with the Conficker worm, you may be unable to download certain security products, such as the &lt;a href="http://www.microsoft.com/security/malwareremove/default.aspx"&gt;Microsoft   Malicious Software Removal Tool&lt;/a&gt; or you may be unable to access certain Web   sites, such as &lt;a href="http://go.microsoft.com/fwlink/?LinkId=148275"&gt;Microsoft   Update&lt;/a&gt;. If you can't access those tools, try using the &lt;a href="http://onecare.live.com/site/en-us/default.htm?s_cid=sah"&gt;Windows Live   safety scanner&lt;/a&gt;.       &lt;/p&gt;     &lt;a class="backtotop" href="http://www.microsoft.com/security/worms/conficker.aspx#"&gt;Back to Top&lt;/a&gt;    &lt;br /&gt;   &lt;br /&gt;    &lt;a name="EAF"&gt;&lt;/a&gt;     &lt;h2&gt;Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm? &lt;/h2&gt;     &lt;ul&gt;&lt;li&gt;           For additional information, see &lt;a href="http://blogs.technet.com/mmpc/archive/2009/01/22/centralized-information-about-the-conficker-worm.aspx"&gt;Centralized Information About the Conficker Worm&lt;/a&gt;.         &lt;/li&gt;&lt;li&gt;           For more technical information about the Conficker worm, see the &lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm:Win32/Conficker.B"&gt;Microsoft Malware Protection Center Virus Encyclopedia&lt;/a&gt;.         &lt;/li&gt;&lt;li&gt;           Bookmark the &lt;a href="http://www.microsoft.com/security/portal/"&gt;Microsoft Malware Protection Center portal&lt;/a&gt; and the &lt;a href="http://blogs.technet.com/mmpc/"&gt;Microsoft Malware Protection Center   blog&lt;/a&gt; for updated information.         &lt;/li&gt;&lt;li&gt;           For symptoms and detailed information about how to remove the Conficker worm,   see &lt;a href="http://support.microsoft.com/kb/962007"&gt;Help and Support: Virus alert about the Conficker Worm&lt;/a&gt;.         &lt;/li&gt;&lt;li&gt;           To continue to get updated information on security, sign up for the &lt;a href="http://www.microsoft.com/protect/secnews/default.mspx"&gt;Microsoft Security for Home Computer Users newsletter&lt;/a&gt;.         &lt;/li&gt;&lt;/ul&gt;     &lt;p&gt;         For more information, see &lt;a href="http://www.microsoft.com/security/worms/prevent.aspx"&gt;How to prevent computer worms&lt;/a&gt; and &lt;a href="http://www.microsoft.com/security/worms/remove.aspx"&gt;How to remove computer worms&lt;/a&gt;.       &lt;/p&gt;   &lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Stop Win32/Conficker from spreading by using Group Policy settings Notes</title><link>http://atvidea.blogspot.com/2009/08/stop-win32conficker-from-spreading-by.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Tue, 25 Aug 2009 16:38:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-3872422804727727440</guid><description>&lt;ul&gt;&lt;li&gt;&lt;b&gt;Important&lt;/b&gt; Make sure that you document any current settings before you make any of the changes that are suggested in this article. &lt;/li&gt;&lt;li&gt;This procedure does not remove the Conficker malware from the system. This procedure only stops the spread of the malware. You should use an antivirus product to remove the Conficker malware from the system. Or, follow the steps in the "&lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#Manualsteps"&gt;Manual steps to remove the Win32/Conficker virus&lt;/a&gt;&lt;/span&gt;" section of this Knowledge Base article to manually remove the malware from the system.        &lt;/li&gt;&lt;li&gt;You may be unable to correctly install applications, service packs, or other updates while the permission changes that are recommended in the following steps are in place. This includes, but is not limited to, applying updates by using Windows Update, Microsoft Windows Server Update Services (WSUS) server, and System Center Configuration Manager (SCCM), as these products rely on components of Automatic Updates. Make sure that you change the permissions back to default settings after you clean the system.&lt;/li&gt;&lt;li&gt; For information about the default permissions for the SVCHOST registry key and the Tasks Folder that are mentioned in the "Create a Group Policy object" section, see the &lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#DPTable"&gt;Default permissions table&lt;/a&gt;&lt;/span&gt; at the end of this article.  &lt;/li&gt;&lt;/ul&gt;&lt;div class="topOfPage"&gt;&lt;a href="http://support.microsoft.com/kb/962007#top"&gt;&lt;img src="http://support.microsoft.com/library/images/support/kbgraphics/public/en-us/uparrow.gif" alt="" /&gt;Back to the top&lt;/a&gt;&lt;/div&gt;&lt;h3 id="tocHeadRef"&gt;Create a Group Policy object&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt; Create a new Group Policy object (GPO) that applies to all computers in a specific organizational unit (OU), site, or domain, as required in your environment.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li&gt;Set the policy to remove write permissions to the following registry subkey: &lt;div class="indent"&gt; HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Svchost &lt;/div&gt; This prevents the randomly named malware service from being created in the netsvcs registry value.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Open the Group Policy Management Console (GPMC). &lt;/li&gt;&lt;li type="a"&gt;Create a new GPO. Give it any name that you want. &lt;/li&gt;&lt;li type="a"&gt;Open the new GPO, and then move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Windows Settings\Security Settings\Registry&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Right-click &lt;strong class="uiterm"&gt;Registry&lt;/strong&gt;, and then click &lt;strong class="uiterm"&gt;Add Key&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Select Registry Key&lt;/strong&gt; dialog box, expand &lt;strong class="uiterm"&gt;Machine&lt;/strong&gt;, and then move to the following folder: &lt;div class="indent"&gt; Software\Microsoft\Windows NT\CurrentVersion\Svchost&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the dialog box that opens, click to clear the &lt;strong class="uiterm"&gt;Full Control&lt;/strong&gt; check box for both &lt;strong class="uiterm"&gt;Administrators&lt;/strong&gt; and &lt;strong class="uiterm"&gt;System&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Add Object&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Replace existing permissions on all subkeys with inheritable permissions&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Set the policy to remove write permissions to the %windir%\Tasks folder. This prevents the Conficker malware from creating the Scheduled Tasks that can reinfect the system.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;In the same GPO that you created earlier, move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Windows Settings\Security Settings\File System&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Right-click &lt;strong class="uiterm"&gt;File System&lt;/strong&gt;, and then click &lt;strong class="uiterm"&gt;Add File&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Add a file or folder&lt;/strong&gt; dialog box, browse to the %windir%\Tasks folder. Make sure that &lt;strong class="uiterm"&gt;Tasks&lt;/strong&gt; is highlighted and listed in the &lt;strong class="uiterm"&gt;Folder&lt;/strong&gt; dialog box. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the dialog box that opens, click to clear the check boxes for &lt;strong class="uiterm"&gt;Full Control&lt;/strong&gt;, &lt;strong class="uiterm"&gt;Modify&lt;/strong&gt;, and &lt;strong class="uiterm"&gt;Write&lt;/strong&gt; for both &lt;strong class="uiterm"&gt;Administrators&lt;/strong&gt; and &lt;strong class="uiterm"&gt;System&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Add Object&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Replace existing permissions on all subkeys with inheritable permissions&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Set AutoPlay (Autorun) features to disabled. This keeps the Conficker malware from spreading by using the AutoPlay features that are built into Windows.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; Depending on the version of Windows that you are using, there are different updates that you must have installed to correctly disable the Autorun functionality: &lt;ul&gt;&lt;li&gt;To disable the Autorun functionality in Windows Vista or in Windows Server 2008, you must have security update &lt;a href="http://support.microsoft.com/kb/950582"&gt;950582&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/950582)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt; installed (described in security bulletin MS08-038). &lt;/li&gt;&lt;li&gt;To disable the Autorun functionality in Windows XP, in Windows Server 2003, or in Windows 2000, you must have security update &lt;a href="http://support.microsoft.com/kb/950582"&gt;950582&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/950582)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;, update &lt;a href="http://support.microsoft.com/kb/967715"&gt;967715&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/967715)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;, or update &lt;a href="http://support.microsoft.com/kb/953252"&gt;953252&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/953252)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt; installed.&lt;/li&gt;&lt;/ul&gt;      To set AutoPlay (Autorun) features to disabled, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;In the same GPO that you created earlier, move to one of the following folders: &lt;ul&gt;&lt;li&gt;For a Windows Server 2003 domain, move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Administrative Templates\System&lt;/div&gt;&lt;/li&gt;&lt;li&gt;For a Windows 2008 domain, move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Administrative Templates\Windows Components\Autoplay Policies&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li type="a"&gt;Open the &lt;strong class="uiterm"&gt;Turn off Autoplay&lt;/strong&gt; policy. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Turn off Autoplay&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Enabled&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the drop-down menu, click &lt;strong class="uiterm"&gt;All drives&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Close the Group Policy Management Console. &lt;/li&gt;&lt;li&gt;Link the newly created GPO to the location that you want it to apply to. &lt;/li&gt;&lt;li&gt;Allow for enough time for Group Policy settings to update to all computers. Generally, Group Policy replication takes five minutes to replicate to each domain controller, and then 90 minutes to replicate to the rest of the systems. A couple hours should be enough. However, more time may be required, depending on the environment. &lt;/li&gt;&lt;li&gt; After the Group Policy settings have propagated, clean the systems of malware.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Run full antivirus scans on all computers. &lt;/li&gt;&lt;li type="a"&gt;If your antivirus software does not detect Conficker, you can use the Malicious Software Removal Tool (MSRT) to clean the malware. For more information, visit the following Microsoft Web page: &lt;div class="indent"&gt;&lt;a href="http://www.microsoft.com/security/malwareremove/default.mspx"&gt;http://www.microsoft.com/security/malwareremove/default.mspx&lt;/a&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/security/malwareremove/default.mspx)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;b&gt;Note&lt;/b&gt; You may have to follow some manual steps to clean up all the effects of the malware. We recommend that you review the steps that are listed in the "&lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#Manualsteps"&gt;Manual steps to remove the Win32/Conficker virus&lt;/a&gt;&lt;/span&gt;" section of this article to clean up all the effects of the malware. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;/ol&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>AppleScript.THT Trojan Horse New OS X Trojan Horse in the Wild SecureMac Security Advisory</title><link>http://atvidea.blogspot.com/2009/08/applescripttht-trojan-horse-new-os-x.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Mon, 17 Aug 2009 20:17:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-7978289905411577598</guid><description>Security Risk: &lt;span style="color:red;"&gt;Critical&lt;/span&gt; &lt;p&gt; SecureMac has discovered multiple variants of a new Trojan  horse in the wild that affects Mac OS X 10.4 and 10.5.  The Trojan horse  is currently being distributed from a hacker website, where discussion  has taken place on distributing the Trojan horse through iChat and  Limewire. &lt;i&gt;The source code for the Trojan horse has been  distributed,  indicating an increased probability of future variants of the Trojan  horse.&lt;/i&gt; &lt;/p&gt;&lt;p&gt; The Trojan horse runs hidden on the system, and allows a malicious  user complete remote access to the system, can transmit system and  user passwords, and can avoid detection by opening ports in the  firewall and turning off system logging. Additionally, the  AppleScript.THT Trojan horse can log keystrokes, take pictures with  the built-in Apple iSight camera, take screenshots, and turn on file  sharing. The Trojan horse exploits a recently discovered  vulnerability with the Apple Remote Desktop Agent, which allows it to  run as root. &lt;/p&gt;&lt;p&gt; The Trojan is distributed as either a compiled AppleScript, called  ASthtv05 (60 KB in size), or as an application bundle called AStht_v06  (3.1 MB in size).  The user must download and open the Trojan horse in  order to become infected.  Once the Trojan horse is running, it will  move itself into the /Library/Caches/ folder, and add itself to the  System Login Items. &lt;/p&gt;&lt;p&gt; &lt;i&gt;Once installed, the Trojan horse turns on File Sharing, Web Sharing,  and Remote Login.  If the filename of the Trojan horse has not been  changed, it can be located in the /Library/Caches folder under the name  AStht_06.app.&lt;/i&gt; &lt;/p&gt;&lt;p&gt; &lt;i&gt;Until a patch is issued for the Apple Remote Desktop Agent exploit,  SecureMac classifies the security risk presented by this Trojan horse as  high.&lt;/i&gt;  &lt;/p&gt;&lt;p&gt; &lt;b&gt;Protection:&lt;/b&gt;  To protect your system against this threat, run  &lt;a target="_new" href="http://macscan.securemac.com/"&gt;MacScan  2.5.2&lt;/a&gt; (MacScan is a product of SecureMac) with the latest Spyware  Definitions update  (2008011),  dated  June  19th, 2008.  SecureMac recommends that users download files only from  trusted sources and sites. &lt;/p&gt;&lt;p&gt;Additional removal instructions and  resources  will be posted once available. &lt;/p&gt;&lt;p&gt; &lt;b&gt;Resources:&lt;/b&gt; &lt;!--&lt;a href="http://www.securemac.com/data/applescripttht.pdf"&gt;Link to  PDF  Advisory&lt;/a&gt;--&gt;&lt;br /&gt;&lt;a href="http://blog.washingtonpost.com/securityfix/2008/06/new_trojan_leverages_unpatched.html?nav=rss_blog" target="_fourth"&gt;WashingtonPost analysis on AppleScript.THT Trojan  Horse&lt;/a&gt;  &lt;/p&gt;&lt;p&gt; &lt;span style="font-size:-1;"&gt;&lt;b&gt;About MacScan:&lt;/b&gt;  MacScan quickly detects, isolates  and  removes spyware from  Macintosh computers using both real-time spyware definition updating and  unique detection methods.  The software also manages internet-related  clutter on your computer. It is designed for Mac OS X version 10.2.4 and  later, and is compatible with OS X 10.5 (Leopard). For more information, or to download a demo version of MacScan, visit  &lt;a href="http://macscan.securemac.com/"&gt;http://macscan.securemac.com&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;&lt;p&gt; &lt;span style="font-size:-1;"&gt;&lt;b&gt;About SecureMac:&lt;/b&gt;  Since 1999, SecureMac.com has been at the  forefront  of  Macintosh system security. The site not only features complete Macintosh  Anti-Spyware and Antivirus solutions, but also operates as a  clearinghouse for news, reviews and discussion of Apple computer  security issues. Users from novice to the most advanced will find useful  information at SecureMac that is designed to make their computer  experience trouble free. &lt;/span&gt;     &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How Computer Viruses Work</title><link>http://atvidea.blogspot.com/2009/08/how-computer-viruses-work.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Mon, 17 Aug 2009 20:09:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-6757937845436054135</guid><description>&lt;p&gt;Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become. &lt;/p&gt;&lt;p&gt;For example, experts estimate that the &lt;a href="http://computer.howstuffworks.com/framed.htm?parent=virus.htm&amp;amp;url=http://www.timesonline.co.uk/article/0,,1-979473,00.html"&gt;Mydoom worm&lt;/a&gt; infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the &lt;a href="http://computer.howstuffworks.com/framed.htm?parent=virus.htm&amp;amp;url=http://www.cert.org/advisories/CA-1999-04.html"&gt;Melissa virus&lt;/a&gt; was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their &lt;a href="http://computer.howstuffworks.com/email.htm"&gt;e-mail systems&lt;/a&gt; until the virus could be contained. The &lt;a href="http://computer.howstuffworks.com/framed.htm?parent=virus.htm&amp;amp;url=http://vil.nai.com/vil/content/v_98617.htm"&gt;ILOVEYOU virus&lt;/a&gt; in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.&lt;/p&gt;&lt;p&gt;When you listen to the news, you hear about many different forms of electronic infection. The most common are:   &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Viruses&lt;/strong&gt; - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. &lt;/li&gt;&lt;li&gt;&lt;strong&gt;E-mail viruses&lt;/strong&gt; - An e-mail virus travels as an attachment to &lt;a href="http://computer.howstuffworks.com/email.htm"&gt;e-mail messages&lt;/a&gt;, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source: &lt;a href="http://howstuffworks.com/framed.htm?parent=virus.htm&amp;amp;url=http://www.pcworld.com/article/id,81968/article.html"&gt;Johnson&lt;/a&gt;]. &lt;/li&gt;&lt;li&gt;&lt;a&gt;&lt;strong&gt;Trojan&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;horses&lt;/strong&gt; - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your &lt;a href="http://computer.howstuffworks.com/hard-disk.htm"&gt;hard disk&lt;/a&gt;). Trojan horses have no way to replicate automatically. &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Worms&lt;/strong&gt; - A worm is a small piece of software that uses &lt;a href="http://computer.howstuffworks.com/home-network.htm"&gt;computer networks&lt;/a&gt; and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. &lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;­In this article, we will discuss viruses -- both "traditional" viruses and e-mail viruses -- so that you can learn how they work and understand how to protect yourself.&lt;/p&gt;­­     &lt;script language="javascript"&gt;           &lt;!--            inPagePlayer(3549);                // --&gt;­         &lt;/script&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Windows virus infects 9m computers</title><link>http://atvidea.blogspot.com/2009/08/windows-virus-infects-9m-computers.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Sun, 16 Aug 2009 20:09:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-2971984941805373515</guid><description>&lt;div id="article-wrapper"&gt;       &lt;p&gt;The number of Windows computers infected with the new "downadup" worm – also known as "Conficker" and "Kido" – has exploded to almost 9 million worldwide, from roughly 2.4m last Thursday, according to the computer security company F-Secure.&lt;/p&gt;&lt;p&gt;The growth in the number of infected machines – which the company's researchers called "&lt;a href="http://www.f-secure.com/weblog/archives/00001584.html"&gt;just amazing&lt;/a&gt;" – makes it one of the worst malware outbreaks of the past five years. The principal targets are corporate Windows servers belonging to small businesses who have not installed security updates released by Microsoft last October. F-Secure estimates that a third of all potentially vulnerable systems have not had the update.&lt;/p&gt;&lt;p&gt;But antivirus researchers are still unsure of the precise purpose of the malware, which is spreading via the &lt;a href="http://www.guardian.co.uk/technology/internet"&gt;internet&lt;/a&gt;, through unpatched corporate networks and through USB memory sticks attached to infected computers.&lt;/p&gt;&lt;p&gt;First discovered last October, downadup loads itself on to a computer by exploiting a weakness in Windows servers. Although the &lt;a href="http://www.guardian.co.uk/technology/askjack/2008/oct/25/windows-critical-patch"&gt;weakness was noticed and fixed by Microsoft last October&lt;/a&gt;, not enough people with vulnerable machines – including those running Windows XP and Vista – have installed it. &lt;/p&gt;&lt;p&gt;The worm can infect USB sticks and any corporate laptop that gets infected could then launch attacks if it was later connected to a home network.&lt;/p&gt;&lt;p&gt;The reason for the explosion in infected machines seems to be a new variant which appeared last week, updated by the hackers who wrote the original. The new one attempts to crack the passwords of machines on a network using the &lt;a href="http://www.guardian.co.uk/technology/computing"&gt;computing&lt;/a&gt; power of the infected machine to apply a "brute force" approach – so that passwords such as "admin", "password" or "123456" on potential target machines will quickly be broken. &lt;/p&gt;&lt;p&gt;Once it has infected a machine, the software also tries to connect to up to 250 different domains with random names every day. Researchers reckon that one of them will be the intended "control" domain, and that when the computers connect to it they will download a fresh program that will take over the infected computer. &lt;/p&gt;&lt;p&gt;"This makes it impossible and/or impractical for us good guys to shut them all down – most of them are never registered in the first place," the F-Secure team noted on its weblog. "However, the bad guys only need to predetermine one possible domain for tomorrow, register it, and set up a website – and they then gain access to all of the infected machines. Pretty clever."&lt;/p&gt;&lt;p&gt;So far, nobody knows when that domain will become active – or whether it already is. Some have tried registering the domains that the worm tries to connect to (by advancing the clock on an infected PC by a day or two, to see which ones it will connect to) – but gave up because the cost of registering domains grew too high.&lt;/p&gt;&lt;p&gt;McAfee, another antivirus company, points out that &lt;a href="http://feeds.feedburner.com/%7Er/McafeeAvertLabsBlog/%7E3/516641222/"&gt;weaknesses in Windows are being exploited more and more quickly&lt;/a&gt;. In 2001, it took 335 days for a worm to appear that exploited a vulnerability already patched by Microsoft. That worm, called Nimda, nevertheless did serious damage. &lt;/p&gt;&lt;p&gt;Since then, the length of time between patches appearing – which hackers can use to "reverse engineer" a piece of malware that will attack the weakness – has shortened, until the latest patch appeared on the same day that an "exploit" against it was found online.&lt;/p&gt;   &lt;/div&gt;                                       &lt;a href="http://www.guardian.co.uk/technology/2009/jan/19/downadup-conficker-kido-computer-infection/print" rel="nofollow" id="printlink" class="printable rollover" title="Link to a printer-friendly version" name="&amp;amp;lid={pageToolbox}{Printer-friendly version}&amp;amp;lpos={pageToolbox}{1}"&gt;&lt;img src="http://static.guim.co.uk/static/77517/common/images/icon_print.gif" alt="Print this" class="trail-icon" /&gt;&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The 10 faces of computer malware</title><link>http://atvidea.blogspot.com/2009/08/10-faces-of-computer-malware.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Sun, 16 Aug 2009 20:03:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-680606996973539870</guid><description>&lt;a href="http://www.techrepublic.com/" target="_blank"&gt;&lt;img src="http://www.asia.cnet.com/i/it/2002/ITManager_2004/images/techrepublic.jpg" style="padding: 5px;" align="right" border="0" /&gt;&lt;/a&gt;  &lt;strong&gt;The complexity of today's IT environment makes it easy for computer malware to exist, even flourish. Being informed about what's out there is a good first step to avoid problems.&lt;/strong&gt;&lt;br /&gt; &lt;p&gt;With all the different terms, definitions, and terminology, trying to figure out what's what when it comes to computer malware can be difficult.&lt;/p&gt; &lt;!--text blurb--&gt;  &lt;p&gt;To start things off, let's define some key terms that will be used throughout the article:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt;&lt;b&gt;Malware&lt;/b&gt;: &lt;b&gt;mal&lt;/b&gt;icious soft&lt;b&gt;ware&lt;/b&gt; that's specifically developed to infiltrate or cause damage to computer systems without the owners knowing or their permission.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Malcode&lt;/b&gt;: &lt;b&gt;mal&lt;/b&gt;icious programming &lt;b&gt;code&lt;/b&gt; that's introduced during the development stage of a software application and is commonly referred to as the malware's payload.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Antimalware&lt;/b&gt;: includes any program that combats malware, whether it's real-time protection or detection and removal of existing malware. Antivirus, antispyware applications and malware scanners are examples of antimalware.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;One important thing to remember about malware is that like its biological counterpart the number one goal is reproduction. Causing damage to a computer system, destroying data, or stealing sensitive information are all secondary objectives.&lt;/p&gt;  &lt;p&gt;Keeping the above definitions in mind, let's take a look at 10 different types of malware.&lt;/p&gt; &lt;p&gt;&lt;b&gt;1: The infamous computer virus&lt;/b&gt;&lt;br /&gt;A computer virus is malware that's capable of infecting a computer but has to rely on some other means to propagate. A true virus can only spread from the infected computer to a non-infected computer by attaching to some form of executable code that's passed between the two computers.&lt;/p&gt;  &lt;p&gt;For example, a virus could be hidden in a PDF file attached to an e-mail message. Most viruses consist of the following three parts:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt;&lt;b&gt;Replicator&lt;/b&gt;: When the host program is activated, so is the virus and the viral malcode's first priority is to propagate.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Concealer&lt;/b&gt;: The computer virus can employ one of several methods to hide from antimalware.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Payload&lt;/b&gt;: The malcode payload of a virus can be purposed to do just about anything, from disabling computer functions to destroying data.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Some examples of computer viruses currently in the wild are W32.Sens.A, W32.Sality.AM, and W32.Dizan.F. Most quality antivirus software will remove computer viruses once the application has the signature file for the virus.&lt;/p&gt; &lt;p&gt;&lt;b&gt;2: The ever popular computer worm&lt;/b&gt;&lt;br /&gt;Computer worms are more sophisticated than viruses, being able to replicate without user intervention. If the malware uses networks (Internet) to propagate it's a worm rather than a virus.&lt;/p&gt;  &lt;p&gt;The main components of a worm are:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt; &lt;b&gt;Penetration tool&lt;/b&gt;: Malcode that leverages vulnerabilities on the victim computer to gain access.&lt;/li&gt;&lt;/ul&gt; &lt;ul class="unIndentedList"&gt;&lt;li&gt;&lt;b&gt;Installer&lt;/b&gt;: The penetration tool gets the computer worm past the initial defense mechanism. At that point the installer takes over and transfers the main body of malcode to the victim.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Discovery tool&lt;/b&gt;: Once settled in, the worm uses several different methods to discover other computers on the network, including e-mail addresses, Host lists, and DNS queries.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Scanner&lt;/b&gt;: The worm uses a scanner to determine if any of the newly-found target computers are vulnerable to the exploits available in its penetration tool.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Payload&lt;/b&gt;: Malcode that resides on each victim's computer. Could be anything from a remote access application to a key logger used to capture user names and passwords.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;This category of malware is unfortunately the most prolific, starting with the Morris worm in 1988 and continuing today with the Conficker worm. Most computer worms can be removed by using malware scanners such as MBAM or GMER.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;3: The unknown backdoor&lt;/b&gt;&lt;br /&gt;Backdoors are similar to the remote access programs that many of us use all the time. They're considered malware when installed without permission, which is exactly what an attacker wants to do, by using the following methods:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt;One installation method used is to exploit vulnerabilities on the target computer.&lt;/li&gt;&lt;li&gt; Another approach is to trick the user into installing the backdoor through social engineering.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Once installed, back doors allow attackers complete remote control of the computer under attack. SubSeven, NetBus, Deep Throat, Back Orifice, and Bionet are backdoors that have gained notoriety. Malware scanners like MBAM and GMER are usually successful at removing backdoors.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;4: The secretive Trojan horse&lt;/b&gt;&lt;br /&gt;It's difficult to come up with a better definition for Trojan horse malware than Ed Skoudis and Lenny Zelter did in their book &lt;i&gt;Malware: Fighting Malicious Code&lt;/i&gt;:&lt;/p&gt; &lt;blockquote&gt;"A Trojan horse is a program that appears to have some useful or benign purpose, but really masks some hidden malicious functionality."&lt;/blockquote&gt; &lt;p&gt;Trojan horse malware cloaks the destructive payload during installation and program execution, preventing antimalware from recognizing the malcode. Some of the concealment techniques include:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt;&lt;b&gt;Rename&lt;/b&gt; the malware to resemble files that are normally present.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Corrupt&lt;/b&gt; installed antimalware to not respond when malware is located.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Polymorphic code&lt;/b&gt; is used to alter the malware's signature faster than the defensive software can retrieve new signature files.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Vundo is a prime example; it creates pop up advertising for rogue antispyware programs, degrades system performance, and interferes with Web browsing. Typically, a malware scanner installed on a LiveCD is required to detect and remove it.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;5: Adware/Spyware, more than an annoyance&lt;/b&gt;&lt;br /&gt;Adware is software that creates pop-up advertisements without the user's permission. Typically the way adware gets installed is by being a component of free software. Besides being very irritating, adware can significantly decrease computer performance.&lt;/p&gt;  &lt;p&gt;Spyware is software that collects information from your computer without your knowledge. Free software is notorious for having spyware as a payload, so reading the user agreement is very important. The Sony BMG CD copy protection scandal is probably the most notable example of spyware.&lt;/p&gt; &lt;p&gt;Most quality antispyware program will quickly find unwanted adware/spyware and remove it from the computer. It's also not a bad idea to regularly remove temp files, cookies, and browsing history from the Web browser program as preventative maintenance.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Malware stew&lt;/b&gt;&lt;br /&gt;Up until now, all the malware discussed has distinctive characteristics, making each type easy to define. Unfortunately that's not the case with the next categories. Malware developers have figured out how to combine the best features from different types of malware in an attempt to improve their success ratio.&lt;/p&gt;  &lt;p&gt;Rootkits are an example of this, integrating a Trojan horse and a backdoor into one package. When used in this combination, an attacker can gain access to a computer remotely and do so without raising any suspicion. Rootkits are one of the more important combined threats, so let's take a deeper look at them.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Rootkits: Uniquely different&lt;/b&gt;&lt;br /&gt;Rootkits are in a class all their own, choosing to modify the existing operating system instead of adding software at the application level like most malware. That's significant, because it makes detection by antimalware that much more difficult.&lt;/p&gt;  &lt;p&gt;There are several different types of rootkits, but three make up the vast majority of those seen in the wild. They are user-mode, kernel-mode, and firmware rootkits. User-mode and kernel-mode may need some explanation:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt;&lt;b&gt;User mode&lt;/b&gt;: Code has restricted access to software and hardware resources on the computer. Most of the code running on your computer will execute in user mode. Due to the restricted access, crashes in user mode are recoverable.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Kernel mode&lt;/b&gt;: Code has unrestricted access to all software and hardware resources on the computer. Kernel mode is generally reserved for the most trusted functions of the operating system. Crashes in kernel mode aren't recoverable.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;&lt;b&gt;6: User-mode rootkits&lt;/b&gt;&lt;br /&gt;It's now understood that user-mode rootkits run on a computer with the same privileges reserved for administrators. This means that:&lt;/p&gt; &lt;ul class="unIndentedList"&gt;&lt;li&gt;User-mode rootkits can alter processes, files, system drivers, network ports, and even system services.&lt;/li&gt;&lt;li&gt;User-mode rootkits remain installed by copying required files to the computer's hard drive, automatically launching with every system boot.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Hacker Defender is one example of a user-mode rootkit and luckily Mark Russinovich's well-known application Rootkit Revealer is able to detect it as well as most other user-mode rootkits.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;7: Kernel-mode rootkits&lt;/b&gt;&lt;br /&gt;Since rootkits running in user-mode can be found and removed, rootkit designers changed their thinking and developed kernel-mode rootkits:&lt;/p&gt;  &lt;ul class="unIndentedList"&gt;&lt;li&gt;Kernel-mode means the rootkit is installed at the same level as the operating system and rootkit detection software.&lt;/li&gt;&lt;li&gt;This allows the rootkit to manipulate the operating system to a point where the operating system can no longer be trusted.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Instability is the one downfall of a kernel-mode rootkit, typically leading to unexplained crashes or blue screens. At that point, it might be a good idea to try GMER. It's one of a few trusted rootkit removal tools that has a chance against kernel-mode rootkits like Rustock.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;8: Firmware rootkits&lt;/b&gt;&lt;br /&gt;Firmware rootkits are the next step up in sophistication, with rootkit developers figuring out how to store rootkit malcode in firmware. The altered firmware could be anything from microprocessor code to PCI expansion card firmware.&lt;/p&gt;  &lt;p&gt;This means that:&lt;/p&gt; &lt;ul class="unIndentedList"&gt;&lt;li&gt; When the computer is shut down the rootkit writes the current malcode to the specified firmware.&lt;/li&gt;&lt;li&gt; Restart the computer and the rootkit reinstalls itself.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Even if a removal program finds and eliminates the firmware rootkit, the next time the computer starts, the firmware rootkit is right back in business.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;9: Malicious mobile code&lt;/b&gt;&lt;br /&gt;In relative anonymity, malicious mobile code is fast becoming the most effective way to get malware installed on a computer. First, let's define mobile code as software that's:&lt;/p&gt; &lt;ul class="unIndentedList"&gt;&lt;li&gt; Obtained from remote servers.&lt;/li&gt;&lt;li&gt; Transferred across a network.&lt;/li&gt;&lt;li&gt; Downloaded and executed on a local system.&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Examples of mobile code include JavaScript, VBScript, ActiveX controls, and Flash animations. The primary idea behind mobile code is active content, which is easy to recognize. It's the dynamic page content that makes Web browsing an interactive experience.&lt;/p&gt;  &lt;p&gt;What makes mobile code malicious? Installing it without the owner's permission or misleading the user as to what the software does. To make matters worse, it's usually the first step of a combined attack, similar to the penetration tool used by trojan horse malware. After which the attacker can install additional malware.&lt;/p&gt;  &lt;p&gt;The best way to combat malicious mobile code is to make sure that the operating system and all ancillary software is up to date.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;10: Blended threat&lt;/b&gt;&lt;br /&gt;Malware is considered a blended threat when it seeks to maximize damage and propagate efficiently by combining several pieces of single-intentioned malcode. That said, blended threats deserve special mention as security experts grudgingly admit they're the best at what they do.&lt;/p&gt;  &lt;p&gt;A blended threat typically includes the following abilities:&lt;/p&gt; &lt;ul class="unIndentedList"&gt;&lt;li&gt; Exploit several known vulnerabilities or even create vulnerabilities.&lt;/li&gt;&lt;li&gt; Incorporate alternate methods for replicating.&lt;/li&gt;&lt;li&gt; Automate code execution, which eliminates user interaction.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Blended threat malware for example may send an HTML e-mail message containing an embedded Trojan horse along with a PDF attachment containing a different type of Trojan horse. Some of the more famous blended threats are Nimda, CodeRed, and Bugbear. Removing blended threat malware from a computer may take several different pieces of antimalware as well as using malware scanners installed on a LiveCD.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Final thoughts&lt;/b&gt;&lt;br /&gt;Malware: is it even possible to reduce the harmful effect it causes? Here are a few final thoughts on that subject:&lt;/p&gt; &lt;ul class="unIndentedList"&gt;&lt;li&gt;Malware isn't going away any time soon. Especially when it became evident that money, lots of money can be made from its use.&lt;/li&gt;&lt;li&gt;Since all antimalware applications are reactionary, they are destined to fail.&lt;/li&gt;&lt;li&gt;Developers who create operating system and application software need to show zero tolerance for software vulnerabilities.&lt;/li&gt;&lt;li&gt;Everyone who uses computers needs to take more ownership in learning how to react to the ever-changing malware environment in.&lt;/li&gt;&lt;li&gt;It cannot be stressed enough, please make sure to keep operating system and application software up to date&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Scam Antivirus App Spreads Malware</title><link>http://atvidea.blogspot.com/2009/08/scam-antivirus-app-spreads-malware.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Sun, 16 Aug 2009 19:52:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-7191618493294003749</guid><description>Web users have been warned about a new scam that posts fake product reviews in a bid to encourage people to buy a rogue security application called Anti-virus-1.   &lt;p&gt;The app is one of a number of &lt;a href="http://www.pcworld.com/article/159316/fake_infection_warnings_can_be_real_trouble.html?tk=rel_news"&gt;bogus security products &lt;/a&gt;which promise to provide protection against the latest online threats, but instead have been &lt;a href="http://www.pcworld.com/article/158734/spotting_a_pc_infection.html?tk=rel_news"&gt;designed to spread malware &lt;/a&gt;or hold users' PCs to ransom.&lt;/p&gt;   &lt;p&gt;But if you use the internet to research Anti-virus-1, it's possible you'll find a number of glowing reviews, because the tool is posting fake articles online which appear to be endorsed by a number of the web's top tech sites - including PC Advisor.&lt;/p&gt;   &lt;p&gt;In reality, the likelihood of you coming across a Anti-virus-1 review is slim. According to Lawrence Abrams, owner of technology site BleepingComputer.com, fake reviews will only be seen by those who install the rogue security app.&lt;/p&gt;   &lt;p&gt;He said that when he installed Anti-virus-1 - which also goes by the name Antivirus2010 - it added a series of entries into the Windows hosts file which direct users to what appear to be the websites of a number of UK and US tech sites.&lt;/p&gt;   &lt;p&gt;"By adding these entries into your HOSTS file, it will make it so that if you go to any of the websites listed, instead of going to the legitimate site, you will instead be redirected to a site under the control of the developers of Anti-virus-1 and not realise you are doing so," said Abrams on his site.&lt;/p&gt;   &lt;p&gt;That means those with Anti-virus-1 running on their PC may be directed to bogus reviews such as the one in the screenshot below.&lt;/p&gt;   &lt;p&gt;The software has never been tested by PC Advisor, and the fake review is not hosted on the PC Advisor site. Other sites apparently targeted by the scam include PC Magazine and TechRadar.&lt;/p&gt;   &lt;p&gt;Abrams warned that, once installed, Anti-virus-1 also issues fake security alerts, screen savers showing a blue screen crash caused by spyware and Internet Explorer hijacks. He's provided tips on how to remove Anti-virus-1/Antivirus 2010 on his website - although we've yet to test the procedure.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Conficker virus activates in a bid to aid cybercriminals</title><link>http://atvidea.blogspot.com/2009/08/conficker-virus-activates-in-bid-to-aid.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Sun, 16 Aug 2009 19:42:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-9156031968222725213</guid><description>&lt;p&gt; The Conficker virus, which has infected millions of computers around the  world, is finally activating itself in a bid to become a money-making  machine for cybercriminals. &lt;/p&gt; &lt;p&gt; Infected machines have started to update themselves and download a fake  anti-virus program aimed at tricking users into paying out for useless  security software, security researchers said. &lt;/p&gt; &lt;p&gt; The virus may also be destined to be used by its cybercriminal creators to  send millions of spam emails and steal passwords from infected computers by  creating a "botnet" of "zombie" machines. &lt;/p&gt; &lt;p&gt; Ivan Macalintal, a Trend Micro advanced threats researcher, said Conficker  began showing activity on Tuesday, nearly a week after the expected April 1  activation date that had computer security experts on alert around the world.&lt;br /&gt;&lt;/p&gt;&lt;p&gt; Infected machines were contacting each other to download new malicious  software, he said. &lt;/p&gt; &lt;p&gt; "As expected, the P2P communications of the Downad/Conficker botnet may have  just been used to serve an update," Macalintal wrote in a post on the  TrendLabs Malware blog. "The Conficker/Downad P2P communications is now  running in full swing!" &lt;/p&gt; &lt;p&gt; Other researchers at Kaspersky Labs found that Conficker was downloading a  fake $49.95 security scanner called Spyware Protect 2009, which may mean  millions of Conficker-infected machines will start getting pop-up messages  advertising the product. &lt;/p&gt; &lt;p&gt; The latest version of Conficker is also downloading another, separate worm  called Waledac onto the infected systems. Waledac is a known botnet linked  to data theft and email spam campaigns. &lt;/p&gt; &lt;p&gt; Paul Ferguson at internet security company Trend Micro noted: "Having followed  the activities of Eastern European online cyber crime for several years,  there is one thing we are certain about — these criminals are motivated by  one thing: money. &lt;/p&gt; &lt;p&gt; "How was Downad/Conficker helping them meet their goals? It wasn’t. A very  large botnet of compromised computers doesn’t make money if it justs 'sits  there' doing nothing. So now we see that the Downad/Conficker botnet has  awakened, and perhaps their desire to monetising their efforts is becoming  more clear." &lt;/p&gt; &lt;p&gt; Waledac usually spreads via a malicious web link or an e-mail, typically a  fake greeting card. Once it infects a numer of machines they can be  remotedly controlled to send scam emails advertising medical products or  phishing messages. &lt;/p&gt; &lt;p&gt; The Conficker virus started spreading late last year. At first it was a  relatively simple worm but its creators issued updates turning it into a  more sophisticated and resilient virus that has found new ways to spread. It  has also gained the ability to shut down a computer's defences &lt;/p&gt; &lt;p&gt; Conficker infects machines by exploiting a weakness in Windows, the software  that runs on most computers. At its peak it had compromised about 12 million  PCs, although that may have fallen to about two million thanks to new  security measures.  &lt;/p&gt; &lt;p&gt; Once the worm is on a computer, that PC becomes part of a “botnet” – a network  of computers that can be controlled by the virus's creator.  &lt;/p&gt; &lt;p&gt; In the past year the virus has spread to computers in schools, hospitals and  government departments. It has got into the defence forces of Britain,  Germany and France, grounding the French Navy's fighter jets for a time.  &lt;/p&gt; &lt;p&gt; A task force assembled by Microsoft has been working to stamp out the worm and  the company has placed a bounty of $250,000 on the heads of those  responsible for the threat. &lt;/p&gt; &lt;p&gt; The worm, a self-replicating program, takes advantage of networks or computers  that have not kept up to date with Windows security patches. Microsoft has  modified its free Malicious Software Removal Tool to detect and get rid of  Conficker.  &lt;/p&gt; &lt;p&gt; Among the ways one can tell if their machine is infected is that the worm will  block efforts to connect with websites of security firms such as Trend Micro  or Symantec where there are online tools for removing the virus.  &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>New Service Provides Malware, Virus Protection for Websites</title><link>http://atvidea.blogspot.com/2009/08/new-service-provides-malware-virus.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Sun, 16 Aug 2009 19:34:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-4368323060267862819</guid><description>ChattahBox)—Websites are forced to navigate an ever-increasing battlefield of unseen enemies, namely damaging malware, botnets, trojans and viruses that have the potential to land websites on malware blacklists. &lt;p&gt;Website owners finding themselves victims of malware attacks oftentimes receive a further hit, resulting in loss of reputation and business when the sites become blacklisted and are labeled as unsafe.&lt;span id="more-7434"&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;A new malware monitoring service, created by two former Google workers, named Dasient offers website owners a way to protect their sites from attack and landing on blacklists.&lt;/p&gt; &lt;p&gt;Co-founders Neil Daswani and Shariq Rizvi both come from years of working in the trenches at Google defending the company’s networks against malware and click fraud.&lt;/p&gt; &lt;p&gt;Daswani and Rizvi believe the time is ripe for a malware service like theirs, as cyber attacks become more sophisticated, leaving most website owners ill equipped to deal with the problems. Some of the more recent attacks against browsers and Web applications, include the use of SQL injections and cross-site scripting that lead to drive-by downloads&lt;/p&gt; &lt;p&gt;A new worm, named Gumblar that is believed to be more damaging than Conficker, steals FTP credentials so attackers can compromise &lt;a itxtdid="7090532" target="_blank" href="http://chattahbox.com/technology/2009/06/16/new-service-provides-malware-virus-protection-for-websites/#" style="border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; font-weight: normal ! important; font-size: 100% ! important; text-decoration: none ! important; padding-bottom: 0px ! important; color: rgb(43, 101, 176) ! important; background-color: transparent ! important; background-image: none; padding-top: 0pt; padding-right: 0pt; padding-left: 0pt;" classname="iAs" class="iAs"&gt;Web &lt;nobr style="font-weight: normal; font-size: 100%;" id="itxt_nobr_5_0"&gt;sites&lt;img style="border: 0pt none ; margin: 0pt; padding: 0pt; display: inline; height: 10px; width: 10px; position: relative; top: 1px; left: 1px; float: none;" name="itxt-icon-0" src="http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif" /&gt;&lt;/nobr&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The new Dasient service is set to launch a public beta version of its free blacklist alert service and fee-based monitoring service, which would start at a fee of at $50 a month.&lt;/p&gt; &lt;p&gt;The free service will identify the parts of a site that are infected with malware, identify the suspect code and recommend actions to take. The fee-based service will automatically quarantines the malicious code, while still allowing the site, and even the hosting page to remain accessible.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Macro Virus</title><link>http://atvidea.blogspot.com/2009/08/macro-virus.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Fri, 14 Aug 2009 20:13:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-5817760557069410528</guid><description>&lt;p&gt; A macro virus is a computer infection written in macro language, which is commonly built into word processing applications.  In general, macros is a series of commands and executions that help automate specific tasks.  Regardless of how they are created, they must be executed by a system able to interpret stored commands.  Some macro systems are actually self-contained utilities while others are built into more advanced applications that allow users to easily repeat a sequence of commands or enable a programmer to customize the application to suite the user's needs.   &lt;/p&gt; &lt;div style="padding: 4px; float: left;"&gt; &lt;script type="text/javascript"&gt; &lt;!-- google_ad_client = "pub-5253809430940410"; /* SpamLaws UPPER 300x250 */ google_ad_slot = "9565114904"; google_ad_width = 300; google_ad_height = 250; //--&gt; &lt;/script&gt; &lt;script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt; &lt;/script&gt;&lt;script&gt;google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);&lt;/script&gt;&lt;ins style="border: medium none ; margin: 0pt; padding: 0pt; display: inline-table; height: 250px; position: relative; visibility: visible; width: 300px;"&gt;&lt;ins style="border: medium none ; margin: 0pt; padding: 0pt; display: block; height: 250px; position: relative; visibility: visible; width: 300px;"&gt;&lt;iframe allowtransparency="true" hspace="0" id="google_ads_frame3" marginheight="0" marginwidth="0" name="google_ads_frame" src="http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&amp;amp;dt=1250255544873&amp;amp;lmt=1250255537&amp;amp;prev_slotnames=8319948044%2C1020003104&amp;amp;output=html&amp;amp;slotname=9565114904&amp;amp;correlator=1250255544681&amp;amp;url=http%3A%2F%2Fwww.spamlaws.com%2Fmacro-virus.html&amp;amp;ref=http%3A%2F%2Fwww.google.co.id%2Fsearch%3Fq%3Dmacro%2Bvirus%26hl%3Den%26client%3Dfirefox-a%26rls%3Dorg.mozilla%3Aen-US%3Aofficial%26hs%3DNmw%26start%3D10%26sa%3DN&amp;amp;frm=0&amp;amp;ga_vid=457598041.1250255545&amp;amp;ga_sid=1250255545&amp;amp;ga_hid=565851155&amp;amp;flash=10.0.32&amp;amp;w=300&amp;amp;h=250&amp;amp;u_h=768&amp;amp;u_w=1366&amp;amp;u_ah=738&amp;amp;u_aw=1366&amp;amp;u_cd=32&amp;amp;u_tz=420&amp;amp;u_his=1&amp;amp;u_java=true&amp;amp;u_nplug=8&amp;amp;u_nmime=47&amp;amp;ifi=3&amp;amp;dtd=5&amp;amp;xpc=BgAIUTs1mP&amp;amp;p=http%3A//www.spamlaws.com" style="left: 0pt; position: absolute; top: 0pt;" vspace="0" scrolling="no" width="300" frameborder="0" height="250"&gt;&lt;/iframe&gt;&lt;/ins&gt;&lt;/ins&gt; &lt;/div&gt;&lt;p&gt; What has made some programs vulnerable to the macro virus is a feature that allows macros to be stored in the documents that are edited, processed and saved by the application.  This means that a virus can be easily attached to a document without the user's knowledge and executed upon opening the file.  This provides a mechanism that enables the infection to spread throughout the system.   &lt;/p&gt; &lt;h2&gt;&lt;strong&gt;How it Functions&lt;/strong&gt;&lt;/h2&gt; &lt;p&gt; A macro virus may be distributed via email, floppy disk, network sharing, a modem and compromised sites on the internet.  Since most macros automatically start when a documented is opened and closed, a macros virus seeks to replace the original with it's malicious code.  From their, the infection tags the replacement code with the same name and functions when the command is executed which happens when a user accesses the file.   &lt;/p&gt; &lt;p&gt; Once opened, the macro virus begins to embed itself within other documents and templates.  It also makes preparations to infect any files that will eventually be created.  Depending on what resources it is able to access, a macro virus can damage other areas of the operating system.  This occurs as the infected documents are shared amongst other users and devices.   &lt;/p&gt; &lt;p&gt; One of the most popular variations of this infection is the Melissa Virus, first detected in 1999.  It spread via email attachment and infected any recipient who opened it.  This virus manipulated the victim's address book and distributed itself to numerous email contacts, enabling it to replicate at an alarming rate.   &lt;/p&gt; &lt;p&gt; A macro virus has the ability to infect nearly any system running word processing software.  This is because it seeks to corrupt that application opposed to the operating system.  The virus has been known to attack computers running Mac OS X, Windows and other platforms that are compatible with Microsoft Word.   &lt;/p&gt; &lt;h2&gt;&lt;strong&gt;Prevention &lt;/strong&gt;&lt;/h2&gt; &lt;p&gt; Because of the wide spread of macro viruses, it is important to remain cautious of the emails you receive.  Many of the messages waiting in your inbox are attached with financial scams and malicious programs.  By downloading an attachment from these unsolicited messages, a macro virus can be easily installed onto your computer, and from there, the madness begins.   &lt;/p&gt; &lt;p&gt; The best defense against a macro virus is a reliable &lt;a href="http://www.spamlaws.com/anti-virus-software-reviews.html" title="anti-virus program"&gt;anti-virus program&lt;/a&gt;.  A good scanner will check every file and directory in your system and even scan emails and attachments before you even open them.  This small step is one that can save you a lot of time, money and the frustrations associated with internet threats.    &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Macro Virus Protection in the Microsoft Office Line</title><link>http://atvidea.blogspot.com/2009/08/macro-virus-protection-in-microsoft.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Fri, 14 Aug 2009 20:03:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-7619479756377224407</guid><description>&lt;span class="body"&gt;&lt;table border="0" width="100%" cellspacing="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;p class="text"&gt; The Microsoft Office programs are the most well known and widely-used programs in the world. They are also the most vulnerable targets for macro virus infection. One could easily blame Microsoft for not doing anything to prevent the virus threat; however, to do so would be to overlook the efforts that the software giant has made to diminish these threats. This is the first of two articles that will review some of the macro viruses that have targeted MS Office products. This series will also analyze some of the efforts made by Microsoft to contain the macro virus situation and attempt to point out what they did right and what they did wrong. This article will look at some of the earlier Microsoft products, such as Word 2.0, Word 97, Office 97 and Office 97 Service Release 1.  &lt;/p&gt;&lt;p class="title"&gt; &lt;b&gt; Word 2.0 &lt;/b&gt;  &lt;/p&gt;&lt;p class="text"&gt; The first Microsoft Office product that was sophisticated enough for macro virus creation was Word 2.0, which came with the first version of WordBASIC. Fortunately, virus writers did not realize this potential until the appearance of the first Word 6 macro viruses in 1995. Then a couple of Word 2 proof-of-concept viruses, Polite and WiederOffnen were written; however, by then Word 2 was going obsolete, so these viruses went mostly unnoticed.  &lt;/p&gt;&lt;p class="text"&gt; In the summer of 1995, Concept started its spread all over the world, changing the game once and for all. As Microsoft had an undisputable role in the spread of this particular virus, they soon (i.e. within a year) came up with solutions. First they issued the infamous &lt;a target="nonlocal" href="http://support.microsoft.com/directory/article.asp?ID=KB;EN-US;Q158499"&gt;ScanProt macro virus protection utility macros&lt;/a&gt; (there were at least 4 versions of them.) They shouldn't have - these utilities provided protection only against Concept, ignoring the fact that by then there were about a dozen of Word macro viruses back then. In fact, this protection macro created a dangerous false sense of security: users thought that using ScanProt would protect them from all macro viruses, while it was only effective against Concept (although, in all fairness to Microsoft, this particular virus was the most widespread back then.)   &lt;/p&gt;&lt;p class="text"&gt; Users who tried to install SCANPROT to protect themselves at the first sign of macro virus infection overlooked this fact. This action usually did not affect the virus, except that some of its macros may have been overwritten by SCANPROT's AutoOpen or AutoClose macro. The result was that some viruses, such as Colors and Muck, remained viable even with some of their macros being overwritten by SCANPROT. This mating effect resulted in dozens of new virus variants.  &lt;/p&gt;&lt;p class="title"&gt; &lt;b&gt; MS Word 7.0a &lt;/b&gt;  &lt;/p&gt;&lt;p class="text"&gt; Realizing the serious threat that macro viruses posed, Microsoft released a patched version Word 7.0a relatively quickly (although they never cared to update Word 6.0.) This version included a macro virus warning box (shown below). The only problem is that, contrary to what the message box stated, it was not a macro virus warning box, it was not even a macro warning box; rather, it was a customization warning box. In fact, there were several problems with this implementation:  &lt;/p&gt;&lt;ol&gt;&lt;span class="text"&gt; &lt;li&gt; The user was warned even if the opened document contained only personalized menu items or command bar buttons. The reason for this is not clear; however, the fact that the macros, command bar and menu bar customizations are stored together in the same structure within the Word document, could point out to laziness in coding and design. &lt;/li&gt; &lt;li&gt; The warning came up even if the document contained innocent macro programs. Several companies used utility macros to improve productivity, as these macros also fired the warning, the users soon became annoyed and disabled the warning. &lt;/li&gt; &lt;li&gt; It was possible to turn off this warning feature outside Word, by simply changing the value of a single registry key. &lt;/li&gt; &lt;/span&gt;&lt;/ol&gt;   &lt;p align="center"&gt; &lt;img src="http://www.securityfocus.com/virus/images/ms_office_1.jpg" border="0" /&gt;  &lt;/p&gt;&lt;pre&gt;        Figure one: the Microsoft Macro Virus Warning Box&lt;br /&gt;&lt;/pre&gt;  &lt;p class="title"&gt; &lt;b&gt; MS Office 97 &lt;/b&gt;  &lt;/p&gt;&lt;p class="text"&gt; Except for one "leftover", the original release of Office 97 didn't provide additional protection measures against macro viruses. The "leftover" came out accidentally, when some of the virus scanners found WWINTL32.DLL, part of the standard Office 97 installation, infected with macro virus - which is clearly a nonsense. So what happened? The transition from Word 7.0 to Word 97 was a huge step as far as macro programming was concerned. The WordBASIC interpreter, used in the older version was replaced with VBA, which was already in use in Excel 5, in order to establish a unified macro development environment in all Office applications.   &lt;/p&gt;&lt;p class="text"&gt; With this development, the entire development environment, including the macro code storage mechanism and the programming language itself, changed. In order to provide some compatibility for the WordBASIC macro utilities, Word 97 introduced internal macro conversion that converted the WordBASIC code to VBA code. This was a great opportunity to prevent Word 6 viruses from upconversion. Otherwise Word itself would have just generated new virus variants. So Microsoft built in a simple filter that tried to determine whether the macro to be converted belonged to a virus or not. If the macro was found to belong to a known virus, it was removed from the upconverted document without any warning or information.   &lt;/p&gt;&lt;p class="text"&gt; Unfortunately, there were several shortcomings of this method, including:  &lt;/p&gt;&lt;ul&gt;&lt;span class="text"&gt; &lt;li&gt; It used simple pattern matching signature scanning; &lt;/li&gt; &lt;li&gt; It worked only on a per-macro basis. As a result, from an upconverted Concept sample the AutoOpen, AAAZAO and AAAZFS macros were removed, while the Payload macro was upconverted happily; &lt;/li&gt; &lt;li&gt; It only provided detection for only a limited number of viruses (the static database linked into a DLL provided no possibility for further updates); and, &lt;/li&gt; &lt;li&gt; The virus signatures were stored in unencrypted format. As a result, some scanners, which were not careful enough to search for macro signatures only in places where they could normally occur, could pick up these signatures and raise false virus alerts. &lt;/li&gt; &lt;/span&gt;&lt;/ul&gt;  &lt;p class="text"&gt; Nevertheless, this was good enough to prevent the vast majority of existing Word 6 viruses to spread under Word 97. Well, almost. It turned out that at the very early beta versions this upcoversion virus check was not implemented, so a couple of popular Word 6 viruses could upconvert after all.  All in all these did not make much impact.  &lt;/p&gt;&lt;p class="text"&gt; There was another change in Office 97 that, as a side effect, prevented Word 6 viruses that use execute-only (encrypted macro) from spreading. Word 6/7 provided a (very, very weak) macro-level protection in the form of execute-only macros. In Office 97, only the entire project could be protected with a password. What should happen, when someone wants to copy macros from a protected project to an unprotected project? (This is exactly the case when a virus with protected macros attempts to copy macros to the unprotected global template.) Either the protected project should be converted to unprotected, in which case VBA developers will lose protection on their copyrighted utility products, or the global template should be converted to protected, in which case users will be angry for not being able to modify their macros. The solution is very simple. It is not possible to copy macros from a protected project. Therefore, even if a Word 6 virus using execute-only macros was upconverted to a Word 97 virus, it would have a protected VBA project, and it wouldn't be able to infect further documents.  &lt;/p&gt;&lt;p class="title"&gt; &lt;b&gt; MS Office 97 Service Release 1 &lt;/b&gt;  &lt;/p&gt;&lt;p class="text"&gt; An unheralded improvement came with Service Release 1, which indicated a major change in Microsoft's attitude. Instead of external patches and blocks, they went to the heart of the problem: the VBA object model itself.  &lt;/p&gt;&lt;p class="text"&gt; Before procedure further, let me clarify what VBA is. It consists of at least the following major components:  &lt;/p&gt;&lt;ul&gt;&lt;span class="text"&gt; &lt;li&gt; Programming language and development environment &lt;/li&gt; &lt;li&gt; Several automation objects and framework for processing application events &lt;/li&gt; &lt;li&gt; Storage mechanism for VBA code &lt;/li&gt; &lt;/span&gt;&lt;/ul&gt;  &lt;p class="text"&gt; It is important to state that VBA itself provides the VBIDE object model, which contains the infamous VBProject object with several methods for injecting code into macro storages. It is not implemented in the VBA licensee application; it is an intrinsic VBA feature. However, it can be optionally hidden from Automation. This is the key factor in an application's susceptibility to macro viruses. If a VBA application exposes this interface then it is an easy target for macro viruses. If hides it, then it is safe. Currently only WordPerfect chose to be on the safe side, which is reflected in the number of known WordPerfect VBA macro viruses. Others are all potentially vulnerable: MSOffice, Visio and AutoCAD 2000 have already been infected.  &lt;/p&gt;&lt;p class="text"&gt; VBA makes it easy and comfortable for applications to define application and document level events that can be handled in the macro. As these events are defined, driven by practical reasons (e.g. it is reasonable to implement an action hook when the current document is closed), most of them are implemented in each VBA licensee application although the actual names could be somewhat different. These events allow VBA viruses to activate on specific actions, e.g. when the application is closed (Application_Quit) or the document containing the VBA code is being closed (Document_BeforeClose). It is important to understand that the application object model and the VBE object model are two separate object models.  &lt;/p&gt;&lt;p class="text"&gt; The VBE object model provides several methods for manipulating VBA code. Office 97 SR-1 disabled only one of these methods, the use of the OrganizerCopy and the WORDBASIC.MacroCopy (which was the upconverted version of WordBASIC's MacroCopy) method to copy macrocode from the normal template into the active document. The opposite way was left open, so that the self-installing utility macros would still work after this security improvement. Up to that point all of the known Office 97 macro viruses used the OrganizerCopy method to spread, so this limitation effectively stopped them. These old-style viruses were able to infect the global template. They could even execute any destructive or annoying payload they had, but they could not infect further documents. Only the following error message was displayed (not showing any sign that a virus was acting). &lt;/p&gt;  &lt;p align="center"&gt; &lt;img src="http://www.securityfocus.com/virus/images/ms_office_2.jpg" border="0" /&gt; &lt;br /&gt; &lt;/p&gt;&lt;p class="text"&gt; This solution was better than the previous ones for several reasons: &lt;/p&gt;&lt;ol&gt;&lt;span class="text"&gt; &lt;li&gt; It prevented viruses and only viruses from running. Self-installing utility macros kept working with this patch installed, while viruses were effectively stopped &lt;/li&gt; &lt;li&gt; It was not possible to switch it off. &lt;/li&gt; &lt;li&gt; It restricts the vulnerable VBA object model, and nothing else &lt;/li&gt; &lt;/span&gt;&lt;/ol&gt;  &lt;p class="text"&gt; However, it did not stop the virus writers, who soon found alternative methods to insert virus code into VBA projects. As effective as it was, the restriction introduced in SR1 was not an ultimate solution. For some reason, it still allowed a couple other methods for manipulating VB project code, including importing text files or test strings into a module. Both tricks were soon discovered and intensively employed by virus writers in WM97.Strangedays or members of the WM97.Class family.  &lt;/p&gt;&lt;p class="title"&gt; &lt;b&gt; In the Next Installment? &lt;/b&gt;  &lt;/p&gt;&lt;p class="text"&gt; This concludes our look at the macro viruses that affected earlier Microsoft Word and Office products. In the next installment of this series, we will examine MS Office 2000, the new version of Microsoft Office, codenamed Office XP, and Outlook. &lt;br /&gt;&lt;/p&gt;&lt;p class="text"&gt; To read &lt;b&gt;Macro Virus Protection in the Microsoft Office Line, Part Two&lt;/b&gt;, click &lt;a target="nonlocal" href="http://www.securityfocus.com/infocus/1484"&gt;here&lt;/a&gt;. &lt;/p&gt;&lt;br /&gt;      &lt;/td&gt;    &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;      &lt;/span&gt;&lt;br /&gt;&lt;br /&gt; &lt;div class="authorbio"&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What is MACRO Virus</title><link>http://atvidea.blogspot.com/2009/08/what-is-macro-virus.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Fri, 14 Aug 2009 19:59:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-253640645393402777</guid><description>A macro virus is a computer &lt;a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html" class="inline"&gt;virus&lt;/a&gt; that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an &lt;term&gt;e-mail virus&lt;/term&gt;.  A well-known example in March, 1999 was the &lt;a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213491,00.html" class="inline"&gt;Melissa virus&lt;/a&gt; virus.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Removal Tools</title><link>http://atvidea.blogspot.com/2009/08/removal-tools.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Thu, 13 Aug 2009 14:10:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-6339891630277872329</guid><description>&lt;div class="cbMrgnTopLG"&gt;         &lt;div class=" cbMrgnBtmLG"&gt; Malicious Code has become increasingly complex and infections involve more system elements than ever before. Symantec Security Response has developed tools to automatically conduct what would often amount to extensive and tedious manual removal tasks. If your system has become infected, the tools listed below should aid you in repairing the damage.&lt;br /&gt;&lt;br /&gt;Symantec now offers a &lt;a href="http://www.symantec.com/norton/support/premium_services/premium_virus.jsp"&gt;Spyware &amp;amp; Virus Removal&lt;/a&gt; service.  Sit back and watch while a Symantec expert scans and clears your PC of spyware and viruses.  &lt;strong&gt;This is a fee based service&lt;/strong&gt;.   &lt;/div&gt; &lt;/div&gt;                &lt;div class=" cbMrgnBtmMD"&gt;      &lt;/div&gt;&lt;div style="clear: both;"&gt; &lt;/div&gt;           &lt;table style="border: 1px solid rgb(204, 204, 204); font-size: 1em; border-collapse: collapse; border-spacing: 0px; width: 100%;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th style="border-bottom: 1px solid rgb(51, 51, 51); padding: 5px; color: rgb(153, 153, 153); text-align: left;" width="70px"&gt;      &lt;b&gt;&lt;img src="http://www.symantec.com/images/masthead/chevronOR3.gif" style="top: 20px; position: absolute;" /&gt;  &lt;span style="margin-left: 8px;"&gt;Date&lt;/span&gt;&lt;/b&gt;&lt;/th&gt;&lt;th style="border-bottom: 1px solid rgb(51, 51, 51); padding: 5px; text-align: left;"&gt;&lt;b&gt;&lt;a href="http://www.symantec.com/business/security_response/removaltools.jsp?sortby=byname"&gt; &lt;span style="margin-left: 8px;"&gt;Name&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/th&gt;&lt;/tr&gt;     &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/16/09&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-041607-1924-99"&gt;Symantec Trojan.Ransomlock Key Generator Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/15/09&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-041517-5230-99"&gt;Trojan.Initbar Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/24/09&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-032402-1233-99"&gt;Trojan.Xrupter Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/20/09&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022016-4444-99"&gt;W32.Virut Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/01/09&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-020110-4815-99"&gt;Trojan.Bankpatch Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/13/09&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99"&gt;W32.Downadup Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/22/08&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2008-072215-0522-99"&gt;Trojan.Brisv.A!inf Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/11/07&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-011109-2557-99"&gt;Backdoor.Haxdoor.S/Trojan.Schoeberl.E Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/04/07&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-010416-4413-99"&gt;W32.Spybot.ANDM Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/29/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-112910-5729-99"&gt;W32.Spybot.ACYR Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/19/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-101916-4325-99"&gt;W32.Rajump Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/17/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-101715-5901-99"&gt;W32.Pasobir Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/04/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-100413-1305-99"&gt;Symantec Support Tool ActiveX Control Cleanup Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;09/23/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-092316-4153-99"&gt;Trojan.Linkoptimizer Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;09/14/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-091414-3913-99"&gt;W32.Bacalid Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/23/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-032315-4136-99"&gt;W32.Antinny Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/23/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-032312-2648-99"&gt;Trojan.Abwiz Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/23/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-032311-0904-99"&gt;Trojan.Exponny Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/23/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-032311-0638-99"&gt;Trojan.Sientok Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/17/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-031714-1649-99"&gt;W32.Davs Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/02/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-020215-2339-99"&gt;W32.Kiman Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/17/06&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2006-011712-3235-99"&gt;W32.Blackmal@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/02/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-120211-0059-99"&gt;W32.Secefa Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/10/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-111016-4134-99"&gt;Backdoor.Ryknos Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/03/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-110313-3626-99"&gt;Trojan.Lodear Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/20/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-102011-2304-99"&gt;Symantec Mobile Threats Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;09/22/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-092212-0315-99"&gt;W32.Pexmor@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/29/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-082923-3815-99"&gt;W32.Bobax@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/17/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-081710-5913-99"&gt;W32.Esbot Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/15/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-081514-1503-99"&gt;W32.Zotob Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/19/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-071915-1125-99"&gt;W32.Reatle@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/16/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-051616-4333-99"&gt;Trojan.Jasbom Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/29/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-042913-5937-99"&gt;Trojan.Vundo.B Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/13/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-041314-0809-99"&gt;W32.Mytob.AR@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/18/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-031816-0538-99"&gt;W32.Serflog Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/08/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-030810-3319-99"&gt;W32.Kelvir Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/07/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-030710-2610-99"&gt;W32.Serflog.A Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/28/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-022812-5045-99"&gt;W32.Mytob@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/03/05&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2005-020314-4918-99"&gt;W32.Bropia Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/17/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-121710-2614-99"&gt;W32.Envid@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/22/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-112210-3747-99"&gt;Trojan.Vundo Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/17/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-111709-3635-99"&gt;W32.Bofra@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/04/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-100409-4805-99"&gt;Adware.JustFindIt Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/10/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-081016-3824-99"&gt;Backdoor.Agent.B Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/04/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-080415-2028-99"&gt;W32.Evaman.C Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/14/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-061413-1012-99"&gt;W32.Erkez.B@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/02/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-060210-0238-99"&gt;W32.Korgo Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/20/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-052014-2525-99"&gt;W32.Donk.Q Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/06/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-050614-0532-99"&gt;Tool to reset shell\open\command registry keys&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/01/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-050114-1706-99"&gt;W32.Sasser Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/21/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-042114-1512-99"&gt;W32.Opasa@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/20/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-042009-2349-99"&gt;W32.Erkez@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/07/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-040713-0824-99"&gt;W32.Blackmal.B@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/02/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-040212-0747-99"&gt;W32.Gaobot.UJ Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/14/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-031414-1418-99"&gt;W32.Beagle.MO@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/18/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-021816-1759-99"&gt;W32.Netsky@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/30/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-013016-1823-99"&gt;W32.HLLW.Anig Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/27/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-012710-0202-99"&gt;W32.Mydoom@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/19/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-011916-0524-99"&gt;W32.Beagle@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/13/04&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2004-011316-4140-99"&gt;W32.Gaobot Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/29/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-102909-2446-99"&gt;W32.Sober Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/03/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-100312-1206-99"&gt;Trojan.Qhosts Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;09/19/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-091915-0601-99"&gt;W32.Swen.A@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/19/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-081915-0030-99"&gt;W32.Sobig.F@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/19/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-081913-3900-99"&gt;W32.Dumaru Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/18/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-081819-3333-99"&gt;W32.Welchia.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/11/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-081119-5051-99"&gt;W32.Blaster.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/08/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-080817-0712-99"&gt;Backdoor.Winshell.50 Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/01/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-080112-3312-99"&gt;W32.Mimail Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/27/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-062719-1340-99"&gt;W32.Mumu.B.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/25/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-062517-3319-99"&gt;W32.Sobig.E@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/16/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-061617-5117-99"&gt;W32.ExploreZip.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/06/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-060620-2209-99"&gt;W32.Femot.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/05/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-060518-0958-99"&gt;W32.Bugbear.B@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/04/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-060415-4145-99"&gt;Bat.Mumu.A.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;06/01/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-060109-2554-99"&gt;W32.Sobig.C Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/18/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-051817-4401-99"&gt;W32.Sobig.B Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/12/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-051214-3111-99"&gt;W32.HLLW.Fizzer Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/14/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-041421-4256-99"&gt;W32.HLLW.Nebiwo Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/24/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-022414-1011-99"&gt;W32.HLLW.Lovgate Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/25/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-012520-2612-99"&gt;W32.SQLExp.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/14/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-011422-2932-99"&gt;W32.Sobig.A@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/09/03&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2003-010919-5133-99"&gt;W32.Lirva Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/25/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-112522-1902-99"&gt;W32.HLLW.Winevar/W32.Funlove.4099 Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/15/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-111518-1429-99"&gt;W32.Brid.A@mm/W32.Funlove.4099 Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/01/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-100117-4923-99"&gt;W32.Bugbear@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;09/30/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-093020-3622-99"&gt;W32.Opaserv.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/01/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-080121-2943-99"&gt;W32.Magistr Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/16/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-071614-0543-99"&gt;W32.Frethem Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/03/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-070315-2942-99"&gt;W32.Yaha Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;05/10/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-051009-2117-99"&gt;Backdoor.Autoupder Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/18/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-041812-3406-99"&gt;W32.Klez Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/15/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-041517-4254-99"&gt;W2k.Stream Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/15/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-041507-4157-99"&gt;Wscript.Kakworm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;04/01/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-040116-4121-99"&gt;W32.Gibe@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/28/02&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2002-032812-2733-99"&gt;W32.Mylife Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/04/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-120415-2940-99"&gt;W32.Goner.A@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;11/28/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-112807-0949-99"&gt;W32.Badtrans.B@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;10/30/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-103004-2955-99"&gt;W32.Nimda.E@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;09/19/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-091923-0344-99"&gt;W32.Nimda.A@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;08/09/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-080908-4231-99"&gt;CodeRed Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/31/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-073120-4354-99"&gt;VBS.Potok@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/20/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-072013-2927-99"&gt;W32.Sircam.Worm@mm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;07/16/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-071615-4256-99"&gt;VBS.Haptime Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;03/09/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-030908-1521-99"&gt;DOS FunLove.4099 Fix Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;02/20/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-022013-1529-99"&gt;W32 HybrisF Fix Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/11/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-011112-1848-99"&gt;W95.CIH Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;01/06/01&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2001-010620-1613-99"&gt;W95.HybrisF Fix Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/22/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122210-3437-99"&gt;Fix W32.Funlove.4099 Tool (Cleanflc.exe)&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/22/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122210-2208-99"&gt;VBS.Stages.A Fix&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/22/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122209-4441-99"&gt;VBS.LoveLetter Fix&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/22/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122209-2910-99"&gt;PrettyPark.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/21/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122115-5344-99"&gt;Happy99.Worm Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/21/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122109-3148-99"&gt;W32.Navidad Fix&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/20/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122016-0154-99"&gt;W32.Kriz Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/20/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122013-2020-99"&gt;Kak.Worm.B Fix&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/20/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-122012-4433-99"&gt;W32.HLLW.QAZ.A Fix&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(235, 235, 235);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/19/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-121913-3849-99"&gt;BuddyList Removal Tool&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr style="background-color: rgb(255, 255, 255);"&gt; &lt;td style="padding: 5px;" width="70px"&gt;12/15/00&lt;/td&gt;&lt;td style="padding: 5px;"&gt;&lt;a href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2000-121512-3214-99"&gt;W95.MTX Fix Tool&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Norton AntiVirus 2003 Stay Lightweight For Regular Computer</title><link>http://atvidea.blogspot.com/2009/08/norton-antivirus-2003-stay-lightweight.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Thu, 13 Aug 2009 14:03:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-2316445398258919271</guid><description>Every 1 unit of computer programs have certain common or are in the computer, the Office is always there, a music player such as WinAmp, WinZip, Image Viewer such as ACDSee, and others. Perhaps one of the AntiVirus is always to keep the computer from the day the virus was increasing. AntiVirus is important, therefore, on every computer must have at least one AntiVirus program, for example, Norton AntiVirus 2003. Kanapa I profilkan Norton AntiVirus 2003? AntiVirus 2003 specification for light than the usual computer-usual course, the program can automatically identify the virus, when the UFD (USB Flash Disk) or floppy disks, CD-R is input into the computer. Same as how the latest version of Norton AntiVirus can detect the latest viruses, as long as your routine to update the address http://www.symantec.com/. Run automatically or can I get LiveUpdate.Biasanya update it from the cafe where I play, I take it, so no need to download, lumayan sparingly for money. I really had to install Norton AntiVirus version 2004 and 2005, but very slow on my computer, so I still use Norton AntiVirus 2003, which remains light at low-specification computers. That we are always sure to update virus definition terbaru.Sering time you can not remove the new virus even if you have to update the latest virus definitions, most of the viruses that made the country or local children. Most you have to wait several days or weeks to be able to remove the virus locally. AntiVirus usually a fast response when the virus is a new local Norman AntiVirus, but I do not like to use it because its use is less, meaning no amenities as well as Norton AntiVirus, although the number of additional ringan.Untuk virus from the date of 21 October 2004 to 6 november 2005 a number of 1030 virus, including viruses that attack SymbianOS Handphone such as Cabir, Commwarior. Remember the virus is always mengincar your computer. Therefore, the required computer in AntiVirus definitions update Anda.SaranSelalu latest week once every 1 or 2 weeks or once a maximum of 1 months. To keep your computer protected from the virus can membandel.Kelebihan: It can automatically detect the many facilities that membantu.Kekurangan: To update the virus definitions like the latest local late.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tips Ringan Melindungi Komputer dari Virus</title><link>http://atvidea.blogspot.com/2009/08/tips-ringan-melindungi-komputer-dari.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Thu, 13 Aug 2009 13:58:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-8025566363326026525</guid><description>You often use computers to surf in the virtual world (aka the Internet)? Well of course your computer is vulnerable from a virus, because the virus can come without invite, bisanya free ngerusak file only (the name is also bound virus ngerusak ya ... haha). To protect your computer from viruses, you can use a reliable anti-virus, (which of course is up to date) because if its not antivirus up to date anti-virus so it can not work with the maximum and not able to detect the virus with a new variannya, as was also you also use a firewall such as zone alarm and lain2 defense to improve your computer. If the above software you have installed does not have one you also protect the computer from the virus in a way hide file2. Exe is usually included in the system. Well There is the step of step file2. Exe is in the computer for you, directly aja ya:&lt;br /&gt;&lt;br /&gt;First you open the start and select search &lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt;New windows appear after you select all files and folder and type *. exe under c directory you select and click search &lt;br /&gt;&lt;br /&gt;Ago the results found after block all the file and right click select properties Select &lt;br /&gt;&lt;br /&gt;Check the hidden options and select ok (this function to hide the file berextensi. Exe) &lt;br /&gt;Then open windows explorer in the tools menu select folder options select view hidden files ago on the folder and select a check or do not show hidden files and folder (not its function to show files that dihidden) after that click ok&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;Now with the above virus difficult to damage the system on the computer for you, return it again to select show hidden files and folders on the tools (in windows explorer).</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Security 101: Look back to advance</title><link>http://atvidea.blogspot.com/2009/08/security-101-look-back-to-advance.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Wed, 12 Aug 2009 19:31:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-3921006655169563230</guid><description>&lt;p&gt;&lt;b&gt;The security landscape may be rapidly evolving, but the clue to standing a better chance in the fight against threats could be in looking back, not forward.&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;Chia Wing Fei, F-Secure's senior security response manager, pointed out in an e-mail interview, today's threats ring of themes such as &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62054017,00.htm" title="Viruses now penetrating deeper -- Wednesday, May 13, 2009"&gt;stealth, sophistication&lt;/a&gt; and &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62053053,00.htm" title="Researcher: Conficker is all about money -- Friday, Apr. 10, 2009"&gt;financial gain&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;Eric Chong, regional marketing director at Trend Micro, said in an e-mail that cybercriminals have evolved their modus operandi not only in coming up with variants to penetrate existing security measures, but also by mirroring attacks "with the way users think about and use technology in day to day communication". For instance, attacks around a decade ago were via e-mail attachments; today, attackers have moved to shared devices and social networking platforms on the Web.&lt;/p&gt;  &lt;p&gt;Yet, according to Paul Ducklin, Asia-Pacific head of technology at Sophos, "modern cybercriminals aren't as novel and inventive as we sometimes credit them with being".&lt;/p&gt;&lt;p&gt;People, he noted in an e-mail, fail to learn from the past and end up falling victim to newer threats. "Modern threats like Conficker succeed by exploiting the same sort of holes, for example &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62052730,00.htm" title="Conficker woes call for strong passwords -- Tuesday, Mar. 31, 2009"&gt;unpatched computers and poor passwords&lt;/a&gt;, as the earliest network malware," he pointed out.&lt;/p&gt;  &lt;p&gt;Alwin Ow, Symantec's senior director of systems engineering in Asia-Pacific and Japan, concurred. "So far this year, Symantec has observed that older attack techniques have resurfaced and are part of the methods used in several recent and highly publicized threats such as &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62054271,00.htm" title="Deja vu: New scams hit Facebook and Twitter -- Friday, May 22, 2009"&gt;Koobface&lt;/a&gt;, &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62053678,00.htm" title="Report: Conficker in attack mode -- Wednesday, Apr. 29, 2009"&gt;Conficker&lt;/a&gt; and &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62055947,00.htm" title="Botnet worm in DOS attacks wipe data on infected PCs -- Monday, Jul. 13, 2009"&gt;Trojan.Dozer&lt;/a&gt;."&lt;/p&gt;  &lt;p&gt;In an attempt to get a better hold of current and potential attacks, ZDNet Asia finds out from Trend Micro five cyberthreats perceived to be the most dangerous in the last decade, and why.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;1. Conficker or Downadup&lt;/b&gt;&lt;br /&gt;Termed as Downad by Trend Micro, the first variant of the &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62048654,00.htm" title="Internet worm exploits Windows vulnerability -- Thursday, Nov. 27, 2008"&gt;worm appeared in November 2008&lt;/a&gt;, targeting the MS08-067 vulnerability. It spawned several other variants, with each new one an improvement over the last. New propagation avenues were added, including USB drives. The worm has successfully generated 50,000 domains, of which it has connected to 500, noted Chong.&lt;/p&gt;  &lt;p&gt;Symantec's Ow added however, the first Conficker variant did not quite achieve the level of disruption it was capable of. The estimated infection was 500,000 "due to an aggressive infection routine and a sophisticated exploitation algorithm, which makes use of geolocation and OS fingerprinting", he explained.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;2. Koobface&lt;/b&gt;&lt;br /&gt;The Koobface worm first appeared in August 2008, &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,62051782,00.htm" title="Facebook fights new Koobface worm, another rogue app -- Tuesday, Mar. 03, 2009"&gt;targeting social networking sites such as Facebook&lt;/a&gt; by infecting user profiles. Koobface possessed a dynamic update capability, allowing it to spread to other social networking sites and perform more malicious routines.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;3. Zbot&lt;/b&gt;&lt;br /&gt;The Trojan variants infect machines via e-mail or Web exploits. Underground research and documented cases reveal Zbot to be a thriving business where infected computers give up their owners' personal information--including credit card data--to remote servers run by cybercriminals.&lt;/p&gt;  &lt;p&gt;Zbot variants are especially damaging due to their ever-changing social engineering techniques, according to Trend Micro.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;4. Slammer&lt;/b&gt;&lt;br /&gt;The worm is notorious for drastically &lt;a href="http://www.zdnetasia.com/news/security/0,39044215,39111300,00.htm" title="Slammer--the first 'Warhol' worm? -- Wednesday, Feb. 05, 2003"&gt;slowing down general Internet traffic in 2003&lt;/a&gt; despite being a solitary packet worm in memory, attacking without a file system component. It exploits a patched buffer overflow bug in MS SQL Server and Desktop Engine, and its trickling effects are still observed in current times.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;5. I Love You&lt;/b&gt;&lt;br /&gt;The Loveletter virus, also known as Love Bug, plagued inboxes in 2000 and infected some 10 percent of computers worldwide, with each system harboring an average of 600 infected files. It had a &lt;a href="http://www.zdnetasia.com/news/hardware/0,39042972,10036856,00.htm" title="Lessons of " love="" virus="" still="" sinking="" in="" may="" 2001=""&gt;destructive payload&lt;/a&gt;, overwriting files with multimedia file extensions.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Anti-Virus Firms Investigating Sexy-View Smartphone Worm</title><link>http://atvidea.blogspot.com/2009/08/anti-virus-firms-investigating-sexy.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Wed, 12 Aug 2009 19:30:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-2526426200731931987</guid><description>&lt;p&gt;In yet another example of how mobile malware is gaining momentum, a new variant of the Wily worm is making the rounds. It's spreading through text messages and researchers warn it may be a smartphone botnet in the making.&lt;/p&gt; &lt;p&gt;The attack spreads by appearing as a legit Symbian phone application, only users get dialed into a Trojan that pilfers subscriber, phone, and network information, and transmits that data to a Website. And, in keeping with the tradition of old-school mass-mailer Outlook worms, it spams SMS messages to the contact's in the user's phone. Nice.&lt;/p&gt; &lt;p&gt;And this bugger appears to be a signed app, so users are much more likely to get infected with only once click needed to authorize installation. And, as Gartner security analyst John Pescatore points out today in his post &lt;em&gt;&lt;a href="http://blogs.gartner.com/john_pescatore/2009/07/16/book-review-thursday-the-myth-of-the-responsible-user/"&gt;Myth of The Responsible User&lt;/a&gt;&lt;/em&gt;, we can't really rely on users to always do the right thing. &lt;/p&gt; &lt;p&gt;It seems this "Sexy View/Sexy Space" does something of an update, or attempts to update, upon network connection. And it's that characteristic that has researchers thinking it may be a botnet.&lt;/p&gt; &lt;p&gt;From today's &lt;em&gt;&lt;a href="http://www.darkreading.com/security/antivirus/showArticle.jhtml;jsessionid=KXFWBJNZ2V4SEQSNDLPCKHSCJUNN2JVN?articleID=218501042"&gt;Dark Reading&lt;/a&gt;&lt;/em&gt;:&lt;/p&gt; &lt;blockquote&gt;The so-called Sexy View/Sexy Space malware has researchers split over whether to officially call it a botnet. While Trend Micro says it's indeed a smartphone botnet, F-Secure is less convinced. "It's almost a stretch to call it a botnet, or at least a botnet in the sense that we normally think of them," says Patrik Runald, chief security advisor for F-Secure, which reported the first version of the worm to Symbian in February. &lt;p&gt;While the worm is able to update the SMS template it uses while spreading, it doesn't have other bot features, he says. "When we think of botnets, we think of a malicious program that calls home for further instructions," such as updating malware, attacking a Website, sending email, or installing an application, he says. "Sexy View does one of those features, which is the ability to update the SMS template it uses when spreading...But Sexy View doesn't have any of the other features we normally take for granted in a bot. So although it can be called a botnet, it's a very simple one with very limited, for now at least, functionality."&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;If you combine the capability of a worm like this with comprimised, and widely followed Twitter or Facebook accounts, we're off to the races.&lt;/p&gt; &lt;p&gt;I mean, really, who can refuse a Sexy View?&lt;/p&gt; &lt;p&gt;If you'd like to follow my mobile security and technology observations, you can find me (malware-free) on &lt;a href="http://www.twitter.com/georgevhulme"&gt;Twitter&lt;/a&gt;.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Conficker Worm Support Desk is Available 24/7 via Toll-free Number 1-800 237-3901</title><link>http://atvidea.blogspot.com/2009/08/conficker-worm-support-desk-is.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Wed, 12 Aug 2009 19:28:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-9168575008101861299</guid><description>&lt;span class="mainbodyfont"&gt;&lt;span class="mainbodyfont"&gt;&lt;b&gt;  &lt;span style="font-family:Arial, Helvetica, sans-serif;font-size:85%;"&gt;August 11, 2009 ( PowerHomeBiz.com )  &lt;/span&gt;&lt;/b&gt;&lt;span style="font-family:Arial, Helvetica, sans-serif;font-size:85%;"&gt;  &lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;span style="font-family:arial, helvetica;font-size:85%;"&gt;-   iYogi, a global direct to consumer and small business remote &lt;a id="KonaLink0" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.powerhomebiz.com/News/082009/conficker-worm.htm#"&gt;&lt;span style="color: blue ! important; font-family: arial,helvetica; font-weight: 400; font-size: 13px; position: static;color:blue;" &gt;&lt;span class="kLink" style="border-bottom: 1px solid blue; color: blue ! important; font-family: arial,helvetica; font-weight: 400; font-size: 13px; position: static; background-color: transparent;"&gt;Best &lt;/span&gt;&lt;span class="kLink" style="border-bottom: 1px solid blue; color: blue ! important; font-family: arial,helvetica; font-weight: 400; font-size: 13px; position: static; background-color: transparent;"&gt;Computer&lt;/span&gt;&lt;/span&gt;&lt;span style="position: relative;" id="preLoadWrap0"&gt;&lt;div style="position: absolute; z-index: 4000; top: -32px; left: -18px; display: none;" id="preLoadLayer0"&gt;&lt;img style="border: 0px none ;" src="http://kona.kontera.com/javascript/lib/imgs/grey_loader.gif" /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/a&gt;   Technical Support technical support provider has setup a dedicated support   desk for securing and protecting consumers against the Conficker (Conficker.c)   worm also known as Downadup or April Fools Worm. This fast spreading   computer worm has already said to have impacted millions of computers, and   expected to spread more aggressively in the coming days.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;table align="left" border="0" cellpadding="15" cellspacing="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td align="center"&gt;&lt;ins style="border: medium none ; margin: 0pt; padding: 0pt; display: inline-table; height: 250px; position: relative; visibility: visible; width: 300px;"&gt;&lt;ins style="border: medium none ; margin: 0pt; padding: 0pt; display: block; height: 250px; position: relative; visibility: visible; width: 300px;"&gt;&lt;iframe allowtransparency="true" hspace="0" id="google_ads_frame2" marginheight="0" marginwidth="0" name="google_ads_frame" src="http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-3139933968771251&amp;amp;dt=1250080041838&amp;amp;lmt=1250080017&amp;amp;prev_fmts=160x90_0ads_al&amp;amp;output=html&amp;amp;slotname=3597825307&amp;amp;correlator=1250080039085&amp;amp;url=http%3A%2F%2Fwww.powerhomebiz.com%2FNews%2F082009%2Fconficker-worm.htm&amp;amp;ref=http%3A%2F%2Fnews.google.com%2Fnews%3Fq%3Dvirus%2Bworm%26oe%3Dutf-8%26rls%3Dorg.mozilla%3Aen-US%3Aofficial%26client%3Dfirefox-a%26um%3D1%26ie%3DUTF-8%26hl%3Den%26ei%3DfbSCSrXUOdqXkAWx06XSCg%26sa%3DX%26oi%3Dnews_group%26ct%3Dtitle%26resnum%3D1&amp;amp;frm=0&amp;amp;ga_vid=450514065.1250080039&amp;amp;ga_sid=1250080039&amp;amp;ga_hid=347180889&amp;amp;flash=10.0.32&amp;amp;w=300&amp;amp;h=250&amp;amp;u_h=864&amp;amp;u_w=1152&amp;amp;u_ah=834&amp;amp;u_aw=1152&amp;amp;u_cd=32&amp;amp;u_tz=420&amp;amp;u_his=1&amp;amp;u_nplug=4&amp;amp;u_nmime=11&amp;amp;ifi=2&amp;amp;dtd=68&amp;amp;xpc=QLeBdyiNCq&amp;amp;p=http%3A//www.powerhomebiz.com" style="left: 0pt; position: absolute; top: 0pt;" vspace="0" frameborder="0" height="250" scrolling="no" width="300"&gt;&lt;/iframe&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;br /&gt;&lt;/td&gt;  &lt;/tr&gt;  &lt;/tbody&gt;&lt;/table&gt;     &lt;span style="font-family:Arial, Helvetica, sans-serif;font-size:85%;"&gt;  &lt;p&gt; &lt;/p&gt;   &lt;p&gt;iYogi's dedicated support desk has proactively reached its existing    base of 65,000 subscribers and helping other individuals and small    businesses that have been infected or would like to take the precaution    to protect themselves. &lt;/p&gt;    &lt;p&gt;iYogi's security experts can be reached instantly via Toll Free Number   1-800-237-3901 to sign-up for a subscription service that provides unlimited   access to technical support and virus removal, Virus and Spyware spyware   removal along with a free, anti-virus and anti-spyware software to protect,   secure and manage the &lt;a id="KonaLink1" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.powerhomebiz.com/News/082009/conficker-worm.htm#"&gt;&lt;span style="color: blue ! important; font-family: Arial,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;" &gt;&lt;span class="kLink" style="color: blue ! important; font-family: Arial,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;"&gt;computer&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and all connected devices. &lt;/p&gt;    &lt;p&gt;As the industry braces for the impact of the worm on April 1st, our   Microsoft Certified experts will help diagnose if your machine is infected,   update settings and definitions for your security software and install   Windows Operating System update to reduce the threat from the Conficker   worm. Our computer support service includes a free subscription to   anti-virus and anti-spyware software, in the scenario where the customer   does not have a subscription said Vishal Dhar, President Marketing for iYogi.  &lt;/p&gt;    &lt;p&gt;Conficker worm is said to take advantage of the vulnerabilities in the   Windows Operating System environment and embeds itself into the computer and   spreads across the &lt;a id="KonaLink2" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.powerhomebiz.com/News/082009/conficker-worm.htm#"&gt;&lt;span style="color: blue ! important; font-family: Arial,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;" &gt;&lt;span class="kLink" style="color: blue ! important; font-family: Arial,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;"&gt;network&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. The worm restricts the computer from accessing   security updates and believed to have the capability to destroy and steal   data. Experts claim that the worm can also download additional code onto a   machine that is infected and is continuously evolving into variations,   thereby making attempts to fix it through automation more difficult. &lt;/p&gt;  &lt;p&gt;Potential indicators that Conficker Worm may have infected your &lt;a id="KonaLink3" target="undefined" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://www.powerhomebiz.com/News/082009/conficker-worm.htm#"&gt;&lt;span style="color: blue ! important; font-family: Arial,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;color:blue;" &gt;&lt;span class="kLink" style="color: blue ! important; font-family: Arial,Helvetica,sans-serif; font-weight: 400; font-size: 13px; position: static;"&gt;PC&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;   includes restricted access to Microsoft.com and websites of security vendors   like Symantec, McAfee, etc. and prevents the user from shutting down their   machines. &lt;/p&gt;    &lt;p&gt;About iYogi &lt;/p&gt;  &lt;p&gt;iYogi delivers live, comprehensive, 24/7 technical support services   directly to consumers and small businesses and is the first, global,   technical support brand based out of India. Providing an annual unlimited   subscription to technical support, iYogi now boasts of more than 65,000   customers. The company employs 600 professionals servicing customers in the   U.S., U.K., Canada, Australia and fast expanding to 12 new geographies   across the globe. &lt;/p&gt;    &lt;p&gt;iYogi's resolution rate of 87 percent and customer satisfaction rate of   95 % are amongst the highest published benchmarks in the industry. &lt;/p&gt;    &lt;p&gt;For further information, please visit - &lt;a href="http://www.iyogi.net/" target="_new" rel="nofollow"&gt;  http://www.iyogi.net&lt;/a&gt;  &lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Smart Meter Worm Could Spread Like A Virus</title><link>http://atvidea.blogspot.com/2009/08/smart-meter-worm-could-spread-like.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Tue, 11 Aug 2009 21:07:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-1545621461407865005</guid><description>For a utility that’s in the process of installing smart meters, there are probably few things more terrifying than the simulation of a smart meter worm that &lt;a href="http://www.ioactive.com/"&gt;IOActive’s&lt;/a&gt; Mike Davis showed off at the annual security conference Black Hat on Thursday. During Davis’ presentation, he showed how he and his team at the security consulting firm created a simulation in which over a period of 24 hours about 15,000 out of 22,000 homes had their smart meters taken over by a worm that could render the device under the control of the worm’s designers.  &lt;p&gt;Davis showed off a time-condensed version of the simulation using an overlay on Google Earth. At the beginning of the simulation there were 22,000 green pins on the image of the satellite map to signify actual plotted address in a metropolitan area; after the introduction of the smart meter worm, the majority of the pins quickly turned a shade of red, rapidly spreading from the point where the worm was introduced. The image was reminiscent of the introduction of infectious diseases and Davis said in a real world scenario the rate of the spread of the worm could be slower or faster considering a variety of technical conditions. &lt;span id="more-38203"&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;Davis said the reason that the he could so easily hack and spread the worm in the simulation was because there was a fundamental design flaw in the specific meter model itself, though Davis wouldn’t name any individual manufacturers. Among other things, the meter he took over didn’t have the proper data encryption and didn’t know the difference between the meter next to it in the network or a device that was intended to wirelessly upgrade its software. “The guys that built this meter had a short term view of how it would work,” Davis said.&lt;/p&gt;  &lt;p&gt;The manufacturer used in the simulation didn’t take kindly to being told their security wasn’t up to snuff. Davis explained to the audience how when he told the manufacturer about the capabilities of the worm simulation, the first response from the meter maker was: “that’s impossible, our meters can’t spread something like that.” When Davis told them he had personally done this in his company’s security lab, the next response from the meter maker was: “how can you even access our meters,” to which Davis says he explained he bought it on eBay.&lt;/p&gt;  &lt;p&gt;Given Davis’ research has already &lt;a href="http://earth2tech.com/2009/07/28/smart-grid-spotlight-on-security/"&gt;gotten a lot of press (and negative reactions from some in the utility and energy industry) over the past month&lt;/a&gt;, Davis was cautious during his presentation. Over the past couple of months he seemed to have gone through a range of emotions, from the hacker-style joy of successfully being able to take over a system (he showed a photo of him and a colleague drinking champagne at 4AM the morning he “&lt;a href="http://en.wikipedia.org/wiki/Pwn"&gt;pwned&lt;/a&gt;” the meter) to an admitted sensitivity over wanting to explain to the utility and energy industry that the point of his exercise was to get them to take security seriously and patch the vulnerabilities. “Nobody [in that industry] likes me,” he said at one point in response to a question about whether or not he would do more research on parts of the smart grid network that were more under control of the utilities.&lt;/p&gt;  &lt;p&gt;But while the specific meter company didn’t respond well to Davis’ simulation, there are greater lessons for the industry. Davis explained in his presentation that once a worm started to spread in the manner of his simulation, “it’s hard to see how a vendor could react quickly enough.” The only effective response he could think of he said, was to have a kill switch that would just shut down the meter, to stop the spread. Members of the utility industry seemed to agree and queried Davis after his talk about their company’s own experiences with meter security. In addition meters should be designed to be recoverable from such an attack, and be as secure as the mechanical meters of the first generation of dumb meters, Davis said.&lt;/p&gt;  &lt;p&gt;Davis was also concerned with what someone could do with a large amount of meters under their control and reminded the audience that he didn’t research how the worm could be used as a weapon. After the presentation members of the audience discussed how turning on and off a large amount of meters — say, 50,000 meters and 3 MW worth of electricity — could cause problems for the stability of that section of the grid.&lt;/p&gt;  &lt;p&gt;At the end of the day the allocation of the smart grid stimulus funds has caused a rush to roll out smart meters and Davis is concerned that the speed in deployment could cause companies to be neglectful of proper security. There’s an attitude of “we’ll fix this later,” he explained. But as Davis’ worm simulation showed: no company wants the attention and financial and reputation problems, of a meter security incident.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>W32/Lovsan.worm.a</title><link>http://atvidea.blogspot.com/2009/08/w32lovsanworma.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Tue, 11 Aug 2009 21:03:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-70544514735024675</guid><description>&lt;h4 class="tabsection-title"&gt;Overview -&lt;/h4&gt;&lt;p&gt;This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.&lt;/p&gt;&lt;h4&gt;Aliases&lt;/h4&gt; &lt;ul&gt;&lt;li&gt;Lovesan&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;Lovsan.H (F-Secure)&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;msblast.exe&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;tftp&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;W32.Blaster.Worm (Symantec)&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;W32/Blaster.worm.a&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;W32/Blaster.worm.gen&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;W32/Blaster.worm.k&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;W32/Lovsan.worm &lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;W32/Lovsan.worm.gen &lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;Win32.Poza (CA)&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;Worm/Lovsan.G (Central Command)&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;WORM_MSBLAST.A (Trend)&lt;/li&gt;&lt;/ul&gt; &lt;ul&gt;&lt;li&gt;WORM_MSBLAST.H (Trend)&lt;/li&gt;&lt;/ul&gt;  &lt;h3 class="access-aid"&gt;Characteristics&lt;/h3&gt; &lt;h4 class="tabsection-title"&gt;Characteristics -&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;-- Update 21 April 2004 --&lt;/strong&gt; &lt;br /&gt;A new variant was discovered and was proactively detected as &lt;a href="http://vil.nai.com/vil/content/v_100516.htm"&gt;Exploit-DcomRpc&lt;/a&gt;  with the 4289 DAT files when scanning compressed executables (default setting)&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;strong&gt;eschlp.exe&lt;/strong&gt;  (66,048 bytes) &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Detection for this variant as W32/Blaster.worm.k had been added to 4352 DATs and above. It propagates in the same way as previous variants. A backdoor dropped by this variant was detected as &lt;a href="http://vil.nai.com/vil/content/v_121073.htm"&gt;W32/Blaster.worm!backdoor&lt;/a&gt;  using the 4352 DATs and above.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;-- Update 11 March 2004 --&lt;br /&gt;&lt;/strong&gt; The risk assessment of this threat was lowered to Low-Profiled due to a decrease in prevalence.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;-- Update 25 August 2003 --&lt;/strong&gt; &lt;br /&gt;The risk assessment of this threat was lowered to Medium due to a decrease in prevalence.&lt;/p&gt; &lt;p&gt;&lt;b&gt;-- Update 15 August 2003 --&lt;/b&gt; &lt;br /&gt;Microsoft has removed the DNS entry for &lt;b&gt;windowsupdate.com&lt;/b&gt; to prevent the Denial of Service attack against this domain. This does not prevent users from using Windows Update to patch their systems, as this is not the address used when clicking on the Windows Update link. &lt;/p&gt; &lt;p&gt;&lt;b&gt;-- Update 13 August 2003 --&lt;/b&gt; &lt;br /&gt;Two new variants were discovered and are detected exactly with the 4285 DAT files. &lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;b&gt;teekids.exe&lt;/b&gt;  (5,360 bytes) [detected as W32/Lovsan.worm.b] &lt;/li&gt;&lt;li&gt;&lt;b&gt;penis32.exe&lt;/b&gt;  (7,200 bytes) [detected as Exploit-DcomRpc] &lt;/li&gt;&lt;/ul&gt; These are functionally similar to the original W32/Lovsan.worm.&lt;br /&gt;&lt;b&gt;--&lt;/b&gt;  &lt;p&gt;This threat was proactively detected as a variant of &lt;a href="http://vil.nai.com/vil/content/v_100516.htm"&gt;Exploit-DcomRpc&lt;/a&gt; with the 4283 DAT files and 4.1.60+ scan engine. This detection requires the scanning of compressed executables to be enabled (VirusScan 7 provides the ability to disable this option, however it is enabled by default). &lt;/p&gt; &lt;p&gt;This threat exploits the &lt;a href="http://vil.nai.com/vil/content/v_100499.htm"&gt;MS03-026&lt;/a&gt; vulnerability. The purpose of the virus is to spread to as many machines as possible. By exploiting an unplugged hole in Windows, the virus is able to execute without requiring any action on the part of the user. The worm also creates a remote access point, allowing an attacker to run system commands at their choosing. &lt;/p&gt; &lt;p&gt;When run, it scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability on the found systems to create a remote shell on TCP port 4444. It then instructs the system to download the worm to the %WinDir%\system32 directory and execute it. (The target system is issued a TFTP command to downloads the worm from the infected host system [TFTP UDP port 69]. &lt;/p&gt; &lt;p&gt;Once run, the worm creates the registry key (may be either of the following): &lt;/p&gt; &lt;ul&gt;&lt;li&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\&lt;br /&gt;Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill &lt;/li&gt;&lt;/ul&gt; This will appear in regedit as: &lt;ul&gt;&lt;li&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\&lt;br /&gt;Run "windows auto update" = msblast.exe &lt;/li&gt;&lt;/ul&gt; Although Win9x/ME/NT/2K/XP can carry the virus. Automatic execution and infection only occurs on Win2K/XP. &lt;h3 class="access-aid"&gt;Symptoms&lt;/h3&gt; &lt;h4 class="tabsection-title"&gt;Symptoms - &lt;/h4&gt;&lt;p&gt;- Presence of unusual TFTP* files&lt;br /&gt;- Presence of the file &lt;b&gt;msblast.exe&lt;/b&gt;  in the WINDOWS SYSTEM32 directory&lt;br /&gt;- Error messages about the RPC service failing (causes system to reboot)&lt;br /&gt;- The worm randomly opens 20 sequential TCP ports for listening. This is a constantly revolving range (ie. 2500-2520, 2501-2521, 2502-2522). The purpose of this action is unknown&lt;/p&gt; &lt;h3 class="access-aid"&gt;Method of Infection&lt;/h3&gt; &lt;h4 class="tabsection-title"&gt;Method of Infection - &lt;/h4&gt; &lt;p&gt;This worm spreads by exploiting a recent vulnerability in Microsoft Windows. The worm scans the local class C subnet, or other random subnets, on port 135. Discovered systems are targeted. Exploit code is sent to those systems, instructing them to download and execute the file MSBLAST.EXE from a remote system via TFTP. &lt;/p&gt;&lt;p&gt;When W32/Lovsan.worm attempts to infect a machine on port 135 it sends a carefully crafted packet designed to cause the buffer overflow. The code execution path after a buffer overflow is specific to files and their locations in memory on a target machine. &lt;/p&gt; &lt;p&gt;Normally that means that an exploit would only target a single OS - for example, Windows XP or Windows 2000, as the location of certain files in memory on each platform is usually slightly different. W32/Lovsan.worm actually semi-randomly tries the Windows 2000 exploit (with 20% probability) and the Windows XP exploit (with 80% probability) in turn - if it "guesses" correctly then it will infect your machine, if it "guesses" incorrectly then it will crash your machine! &lt;/p&gt; &lt;p&gt;The author didn't code anything for Windows NT 4, so therefore it will only crash this platform! &lt;/p&gt; &lt;p&gt;The worm contains a payload to initiate a Denial of Service attack against &lt;b&gt;windowsupdate.com&lt;/b&gt; after August 16. The worm only checks the local system date upon execution. If an infected system is left on and the date rolls over to Aug 16, the payload will not kick off until the system is restarted. &lt;/p&gt; &lt;p&gt;This payload involves sending 40 byte SYN packets to windowsupdate.com on TCP port 80 for the purpose of preventing users from patching their systems via Windows Update. The source IP address is spoofed on each packet, using a random local CLASS B IP. &lt;/p&gt; &lt;p&gt;Computers that have up-to-date antivirus software will detect the worm executable (msblast.exe) upon download and prevent that machine from becoming a host for W32/Lovsan. &lt;/p&gt; &lt;p&gt;However, unless the system has been (MS03-026) patched, it is susceptible to the buffer overflow attack from an infected host machine. An infected machine (running msblast.exe) will send out malformed packets across the local subnet to the RPC service running on port 135. When these packets are received by any unpatched system, it will create a buffer overflow and crash the RPC service on that system. All this can occur without the worm actually being on the machine. This means that the remote shell will still get created on TCP port 4444, and the system may unexpectedly crash upon receiving malformed exploit code. &lt;/p&gt; &lt;p&gt;Other symptoms may include: &lt;/p&gt; &lt;ul&gt;&lt;li&gt;inability to cut/paste &lt;/li&gt;&lt;li&gt;inability to move icons &lt;/li&gt;&lt;li&gt;Add/Remove Programs list empty &lt;/li&gt;&lt;li&gt;dll errors in most Microsoft Office programs &lt;/li&gt;&lt;li&gt;generally slow, or unresponsive system performance &lt;/li&gt;&lt;/ul&gt; By applying the MS03-026 patch to the machine, it will prevent the RPC service from failing, in-turn solving these symptoms. &lt;b&gt;It is very important that the machine is rebooted after the patch has been installed.&lt;/b&gt; The machine can then be updated to the latest dats/engine/config and an on-demand scan run to pick up msblast.exe, IF it exists. All of these symptoms are related to the RPC vulnerability and not necessarily due to W32/Lovsan running locally. Msblast.exe may not be present at all. &lt;h3 class="access-aid"&gt;Removal - &lt;/h3&gt; &lt;h4 class="tabsection-title"&gt;Removal - &lt;/h4&gt; &lt;p&gt;&lt;b&gt;Microsoft Patches&lt;/b&gt;&lt;br /&gt;It is imperative that infected systems are patched prior to disinfecting a system. Some systems may be in a “crash loop” where each time the system is restarted, SVCHOST.EXE crashes and the user has 60 seconds before the system restarts. This action can continue to happen even after the virus is removed if the patch is not applied. It may be necessary to install/configure a firewall prior to downloading/installing this patch. Microsoft has outlined the necessary steps to address Windows issues when removing this virus. These actions should be taken prior to removing the virus (see below).&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.microsoft.com/security/incident/blast.asp" target="_blank"&gt;What You Should Know About the Blaster Worm&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;&lt;b&gt;Virus Removal&lt;/b&gt; :&lt;br /&gt;Use the &lt;a href="http://www.networkassociates.com/us/downloads/updates/"&gt;curent DAT file&lt;/a&gt; for detection an removal. The 4283 DAT files will detect this threat as a variant of Exploit-DcomRpc. Infected systems must be patched prior to removal of the virus (see below).&lt;/p&gt; &lt;!--&lt;p&gt;Alternatively, the following EXTRA.DAT packages are available.&lt;br /&gt;&lt;b&gt;&lt;a href="http://download.nai.com/products/mcafee-avert/100547.zip"&gt;EXTRA.DAT&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;a href="http://download.nai.com/products/mcafee-avert/sdat100547b.exe"&gt;SUPER EXTRA.DAT&lt;/a&gt;&lt;/b&gt;--&gt;&lt;p&gt;Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).&lt;/p&gt; &lt;p&gt;&lt;b&gt;&lt;a href="http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm" target="_blank"&gt;Additional Windows ME/XP removal considerations&lt;/a&gt; &lt;/b&gt; &lt;/p&gt; &lt;p&gt;&lt;b&gt;Stand alone remover&lt;/b&gt;&lt;br /&gt;&lt;a href="http://vil.nai.com/vil/stinger"&gt;Stinger&lt;/a&gt;  has been updated to include detection/removal of this threat.&lt;/p&gt; &lt;p&gt;&lt;b&gt;Sniffer Customers:&lt;/b&gt;  A new &lt;a href="http://download.nai.com/products/mcafee-avert/sniffer/rpcexploitsnifferfilters.zip"&gt;filter&lt;/a&gt; has been developed that will look for any traffic exploiting the RPC Exploit, plus traffic on port 4444 (Lovsan) and traffic on 707 (Nachi) (Sniffer Distributed 4.3 and Sniffer Portable 4.7.5).&lt;/p&gt; &lt;p&gt;&lt;b&gt;Manual Removal Instructions&lt;/b&gt;&lt;br /&gt;To remove this virus "by hand", follow these steps:&lt;/p&gt; &lt;ol&gt;&lt;li&gt;&lt;a href="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-039.asp"&gt;Apply the MS03-039 patch&lt;/a&gt;  (includes &lt;a href="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-026.asp"&gt;MS03-026&lt;/a&gt;  patch)&lt;/li&gt;&lt;li&gt;&lt;a href="http://vil.nai.com/vil/systemhelpdocs/endtask.htm" target="_blank"&gt;Terminate the process&lt;/a&gt;  &lt;b&gt;msblast.exe&lt;/b&gt; &lt;/li&gt;&lt;li&gt;Delete the &lt;b&gt;msblast.exe&lt;/b&gt;  file from your WINDOWS SYSTEM32 directory (typically c:\windows\system32 or c:\winnt\system32)&lt;/li&gt;&lt;li&gt;&lt;a href="http://vil.nai.com/vil/SystemHelpDocs/Regedit.htm" target="_blank"&gt;Edit the registry&lt;/a&gt; &lt;ul&gt;&lt;li&gt;Delete the "windows auto update" value from &lt;ul&gt;&lt;li&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\&lt;br /&gt;Windows\CurrentVersion\Run&lt;/li&gt;&lt;/ul&gt; &lt;/li&gt;&lt;/ul&gt; &lt;/li&gt;&lt;/ol&gt; &lt;b&gt;Threatscan users&lt;/b&gt;&lt;br /&gt;&lt;span&gt;The latest ThreatScan signature (2003-08-12) includes detection of the W32/Lovsan.worm virus.This signature is available for ThreatScan v2.0, v2.1, and v2.5.&lt;/span&gt;   &lt;p&gt;&lt;span&gt;To update your ThreatScan installations with the latest signatures perform the following tasks:&lt;/span&gt;  &lt;/p&gt; &lt;ol type="1"&gt;&lt;li&gt;&lt;span&gt;From within ePO open the “Policies” tab.&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span&gt;Select “McAfee ThreatScan” and then select “Scan Options”&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span&gt;In the pane below click the “Launch AutoUpdater” button.&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span&gt;Using the default settings proceed through the dialogs that appear. Upon successful completion of the update a message will appear stating that; update 2003-08-12 has completed successfully.&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span&gt;From within ePO create a new “AutoUpdate on Agent(s)” task.&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span&gt;Go into the settings for this task and ensure that the host field is set to &lt;i&gt;&lt;u&gt;ftp.nai.com &lt;ftp:&gt; &lt;/ftp:&gt;&lt;/u&gt; &lt;/i&gt; , the path is set to &lt;i&gt;/pub/security/tsc20/updates/winnt/&lt;/i&gt;  and that the user and password fields are both set to &lt;i&gt;ftp&lt;/i&gt;  .Note that “tsc20” in the above path is used for ThreatScan 2.0 and 2.1.The correct path for ThreatScan 2.5 is “tsc25”.&lt;/span&gt;  &lt;/li&gt;&lt;li&gt;&lt;span&gt;Launch this task against all agent machines. &lt;/span&gt; &lt;/li&gt;&lt;li&gt;&lt;span&gt;When the task(s) complete information will be available in the “Task Status Details” report.&lt;/span&gt;  &lt;/li&gt;&lt;/ol&gt; &lt;span&gt;&lt;p&gt;&lt;span&gt;To create and execute a new task with the new Hot Fix functionality do the following:&lt;/span&gt; &lt;/p&gt; &lt;ol&gt;&lt;li&gt;&lt;span&gt;Create a new ThreatScan task.&lt;/span&gt; &lt;/li&gt;&lt;li&gt;&lt;span&gt;Edit the settings of this task.&lt;/span&gt; &lt;/li&gt;&lt;li&gt;&lt;span&gt;Edit the “Task option”, “Host IP Range” to include all desired machines to scan.&lt;/span&gt; &lt;/li&gt;&lt;li&gt;&lt;span&gt;Select the “Remote Infection Detection” category and “Windows Virus Checks” template.&lt;br /&gt;-or-&lt;br /&gt;&lt;/span&gt; &lt;span&gt;Select the “Other” category and “Scan All Vulnerabilities” template.&lt;/span&gt; &lt;/li&gt;&lt;li&gt;&lt;span&gt;Launch the scan.&lt;/span&gt; &lt;/li&gt;&lt;/ol&gt; &lt;/span&gt;  &lt;h3 class="access-aid"&gt;Variants&lt;/h3&gt; &lt;h4 class="tabsection-title"&gt;Variants - &lt;/h4&gt; &lt;ul&gt;&lt;li&gt;W32/Lovsan.worm.g&lt;/li&gt;&lt;li&gt;W32/Lovsan.worm.k&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Virus alert about the Win32/Conficker worm</title><link>http://atvidea.blogspot.com/2009/08/virus-alert-about-win32conficker-worm.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Tue, 11 Aug 2009 20:47:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-8194385622170640948</guid><description>The information in this Knowledge Base article is intended for business environments that have system administrators who can implement the details in this article. There is no reason to use this article if your antivirus program is cleaning the virus correctly and if your systems are fully updated. To confirm that the system is clean of the Conficker virus, perform a quick scan from the following Web page: &lt;div class="indent"&gt;&lt;a href="http://safety.live.com/"&gt;http://safety.live.com&lt;/a&gt;&lt;span class="pLink"&gt;             (http://safety.live.com)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;     For detailed information about the Conficker virus, visit the following Microsoft Web page:   &lt;div class="indent"&gt;&lt;span class="ll"&gt;&lt;a href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fConficker"&gt;http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fConficker&lt;/a&gt;&lt;/span&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Win32%2fConficker)&lt;/span&gt;&lt;span class="kb_space"&gt;&lt;br /&gt;&lt;/span&gt;If your computer is infected with this worm, you may not experience any symptoms, or you may experience any of the following symptoms: &lt;ul&gt;&lt;li&gt;Account lockout policies are being tripped. &lt;/li&gt;&lt;li&gt;Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender, and Error Reporting Services are disabled. &lt;/li&gt;&lt;li&gt;Domain controllers respond slowly to client requests. &lt;/li&gt;&lt;li&gt;The network is congested. &lt;/li&gt;&lt;li&gt;Various security-related Web sites cannot be accessed. &lt;/li&gt;&lt;li&gt;Various security-related tools will not run. For a list of known tools, visit the following Microsoft Web page, and then click the &lt;strong class="uiterm"&gt;Analysis&lt;/strong&gt; tab for information about Win32/Conficker.D. For more information, visit the following Microsoft Web page: &lt;div class="indent"&gt;&lt;span class="ll"&gt;&lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm%3aWin32%2fConficker.D"&gt;http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm%3aWin32%2fConficker.D&lt;/a&gt;&lt;/span&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/security/portal/Entry.aspx?Name=Worm%3aWin32%2fConficker.D)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;  For more information about Win32/Conficker, visit the following Microsoft Malware Protection Center Web page: &lt;div class="indent"&gt;&lt;span class="ll"&gt;&lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker"&gt;http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker&lt;/a&gt;&lt;/span&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker)&lt;/span&gt;&lt;span class="kb_space"&gt;&lt;br /&gt;&lt;/span&gt;Win32/Conficker has multiple propagation methods. These include the following: &lt;ul&gt;&lt;li&gt;Exploitation of the vulnerability that is patched by security update 958644 (MS08-067)&lt;/li&gt;&lt;li&gt;The use of network shares&lt;/li&gt;&lt;li&gt;The use of AutoPlay functionality&lt;/li&gt;&lt;/ul&gt; Therefore, you must be careful when you clean a network so that the threat is not reintroduced to systems that have previously been cleaned.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; The Win32/Conficker.D variant does not spread to removable drives or shared folders over a network. Win32/Conficker.D is installed by previous variants of Win32/Conficker.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Use strong administrator passwords that are unique for all computers.&lt;/li&gt;&lt;li&gt;Do not log on to computers by using Domain Admin credentials or credentials that have access to all computers.&lt;/li&gt;&lt;li&gt;Make sure all systems have the latest security updates applied.&lt;/li&gt;&lt;li&gt;Disable the Autoplay features. For more information, see step 3 of the "Create a Group Policy object" section.&lt;/li&gt;&lt;li&gt;Remove excessive rights to shares. This includes removing write permissions to the root of any share.&lt;/li&gt;&lt;li&gt;&lt;h3 id="tocHeadRef"&gt;Stop Win32/Conficker from spreading by using Group Policy settings&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Important&lt;/b&gt; Make sure that you document any current settings before you make any of the changes that are suggested in this article. &lt;/li&gt;&lt;li&gt;This procedure does not remove the Conficker malware from the system. This procedure only stops the spread of the malware. You should use an antivirus product to remove the Conficker malware from the system. Or, follow the steps in the "&lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#Manualsteps"&gt;Manual steps to remove the Win32/Conficker virus&lt;/a&gt;&lt;/span&gt;" section of this Knowledge Base article to manually remove the malware from the system.        &lt;/li&gt;&lt;li&gt;You may be unable to correctly install applications, service packs, or other updates while the permission changes that are recommended in the following steps are in place. This includes, but is not limited to, applying updates by using Windows Update, Microsoft Windows Server Update Services (WSUS) server, and System Center Configuration Manager (SCCM), as these products rely on components of Automatic Updates. Make sure that you change the permissions back to default settings after you clean the system.&lt;/li&gt;&lt;li&gt; For information about the default permissions for the SVCHOST registry key and the Tasks Folder that are mentioned in the "Create a Group Policy object" section, see the &lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#DPTable"&gt;Default permissions table&lt;/a&gt;&lt;/span&gt; at the end of this article&lt;/li&gt;&lt;li&gt;&lt;h3 id="tocHeadRef"&gt;Create a Group Policy object&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt; Create a new Group Policy object (GPO) that applies to all computers in a specific organizational unit (OU), site, or domain, as required in your environment.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;/li&gt;&lt;li&gt;Set the policy to remove write permissions to the following registry subkey: &lt;div class="indent"&gt; HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Svchost &lt;/div&gt; This prevents the randomly named malware service from being created in the netsvcs registry value.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Open the Group Policy Management Console (GPMC). &lt;/li&gt;&lt;li type="a"&gt;Create a new GPO. Give it any name that you want. &lt;/li&gt;&lt;li type="a"&gt;Open the new GPO, and then move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Windows Settings\Security Settings\Registry&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Right-click &lt;strong class="uiterm"&gt;Registry&lt;/strong&gt;, and then click &lt;strong class="uiterm"&gt;Add Key&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Select Registry Key&lt;/strong&gt; dialog box, expand &lt;strong class="uiterm"&gt;Machine&lt;/strong&gt;, and then move to the following folder: &lt;div class="indent"&gt; Software\Microsoft\Windows NT\CurrentVersion\Svchost&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the dialog box that opens, click to clear the &lt;strong class="uiterm"&gt;Full Control&lt;/strong&gt; check box for both &lt;strong class="uiterm"&gt;Administrators&lt;/strong&gt; and &lt;strong class="uiterm"&gt;System&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Add Object&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Replace existing permissions on all subkeys with inheritable permissions&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Set the policy to remove write permissions to the %windir%\Tasks folder. This prevents the Conficker malware from creating the Scheduled Tasks that can reinfect the system.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;In the same GPO that you created earlier, move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Windows Settings\Security Settings\File System&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Right-click &lt;strong class="uiterm"&gt;File System&lt;/strong&gt;, and then click &lt;strong class="uiterm"&gt;Add File&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Add a file or folder&lt;/strong&gt; dialog box, browse to the %windir%\Tasks folder. Make sure that &lt;strong class="uiterm"&gt;Tasks&lt;/strong&gt; is highlighted and listed in the &lt;strong class="uiterm"&gt;Folder&lt;/strong&gt; dialog box. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the dialog box that opens, click to clear the check boxes for &lt;strong class="uiterm"&gt;Full Control&lt;/strong&gt;, &lt;strong class="uiterm"&gt;Modify&lt;/strong&gt;, and &lt;strong class="uiterm"&gt;Write&lt;/strong&gt; for both &lt;strong class="uiterm"&gt;Administrators&lt;/strong&gt; and &lt;strong class="uiterm"&gt;System&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Add Object&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Replace existing permissions on all subkeys with inheritable permissions&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Set AutoPlay (Autorun) features to disabled. This keeps the Conficker malware from spreading by using the AutoPlay features that are built into Windows.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; Depending on the version of Windows that you are using, there are different updates that you must have installed to correctly disable the Autorun functionality: &lt;ul&gt;&lt;li&gt;To disable the Autorun functionality in Windows Vista or in Windows Server 2008, you must have security update &lt;a href="http://support.microsoft.com/kb/950582"&gt;950582&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/950582)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt; installed (described in security bulletin MS08-038). &lt;/li&gt;&lt;li&gt;To disable the Autorun functionality in Windows XP, in Windows Server 2003, or in Windows 2000, you must have security update &lt;a href="http://support.microsoft.com/kb/950582"&gt;950582&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/950582)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;, update &lt;a href="http://support.microsoft.com/kb/967715"&gt;967715&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/967715)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;, or update &lt;a href="http://support.microsoft.com/kb/953252"&gt;953252&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/953252)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt; installed.&lt;/li&gt;&lt;/ul&gt;      To set AutoPlay (Autorun) features to disabled, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;In the same GPO that you created earlier, move to one of the following folders: &lt;ul&gt;&lt;li&gt;For a Windows Server 2003 domain, move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Administrative Templates\System&lt;/div&gt;&lt;/li&gt;&lt;li&gt;For a Windows 2008 domain, move to the following folder:  &lt;div class="indent"&gt; Computer Configuration\Administrative Templates\Windows Components\Autoplay Policies&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li type="a"&gt;Open the &lt;strong class="uiterm"&gt;Turn off Autoplay&lt;/strong&gt; policy. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Turn off Autoplay&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Enabled&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the drop-down menu, click &lt;strong class="uiterm"&gt;All drives&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Close the Group Policy Management Console. &lt;/li&gt;&lt;li&gt;Link the newly created GPO to the location that you want it to apply to. &lt;/li&gt;&lt;li&gt;Allow for enough time for Group Policy settings to update to all computers. Generally, Group Policy replication takes five minutes to replicate to each domain controller, and then 90 minutes to replicate to the rest of the systems. A couple hours should be enough. However, more time may be required, depending on the environment. &lt;/li&gt;&lt;li&gt; After the Group Policy settings have propagated, clean the systems of malware.&lt;br /&gt;&lt;br /&gt;To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Run full antivirus scans on all computers. &lt;/li&gt;&lt;li type="a"&gt;If your antivirus software does not detect Conficker, you can use the Malicious Software Removal Tool (MSRT) to clean the malware. For more information, visit the following Microsoft Web page: &lt;div class="indent"&gt;&lt;a href="http://www.microsoft.com/security/malwareremove/default.mspx"&gt;http://www.microsoft.com/security/malwareremove/default.mspx&lt;/a&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/security/malwareremove/default.mspx)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;b&gt;Note&lt;/b&gt; You may have to follow some manual steps to clean up all the effects of the malware. We recommend that you review the steps that are listed in the "&lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#Manualsteps"&gt;Manual steps to remove the Win32/Conficker virus&lt;/a&gt;&lt;/span&gt;" section of this article to clean up all the effects of the malware. &lt;/li&gt;&lt;li type="a"&gt;&lt;h3 id="tocHeadRef"&gt;Run the Malicious Software Removal tool&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt; The Microsoft Malware Protection Center has updated the Malicious Software Removal tool (MSRT). This is a stand-alone binary that is useful in the removal of prevalent malicious software, and it can help remove the Win32/Conficker malware family.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; The MSRT does not prevent reinfection because it is not a real-time antivirus program.  &lt;br /&gt;&lt;br /&gt;You can download the MSRT from either of the following Microsoft Web sites: &lt;div class="indent"&gt;&lt;a href="http://www.update.microsoft.com/"&gt;http://www.update.microsoft.com&lt;/a&gt;&lt;span class="pLink"&gt;             (http://www.update.microsoft.com)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href="http://support.microsoft.com/kb/890830"&gt;http://support.microsoft.com/kb/890830&lt;/a&gt;&lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/890830)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;For more information about specific deployment details for the MSRT, click the following article number to view the article in the Microsoft Knowledge Base: &lt;div class="indent"&gt;&lt;a class="KBlink" href="http://support.microsoft.com/kb/891716/"&gt;891716&lt;/a&gt;                              &lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/891716/                         )         &lt;/span&gt; Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment &lt;/div&gt;&lt;b&gt;Note&lt;/b&gt; The Stand-Alone System Sweeper tool will also remove this infection. This tool is available as a component of the Microsoft Desktop Optimization Pack 6.0 or through Customer Service and Support. To obtain the Microsoft Desktop Optimization Pack, visit the following Microsoft Web site: &lt;div class="indent"&gt;&lt;a href="http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx"&gt;http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx&lt;/a&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;If Windows Live OneCare or Microsoft Forefront Client Security is running on the system, these programs also block the threat before it is installed. &lt;/li&gt;&lt;li type="a"&gt;&lt;h3 id="tocHeadRef"&gt; Manual steps to remove the Win32/Conficker virus&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/li&gt;&lt;li&gt;These manual steps are not required any longer and should only be used if you have no antivirus software to remove the Conficker virus.&lt;/li&gt;&lt;li&gt;Depending on the Win32/Conficker variant that the computer is infected with, some of these values referred to in this section may not have been changed by the virus.&lt;/li&gt;&lt;/ol&gt;     The following detailed steps can help you manually remove Conficker from a system: &lt;/li&gt;&lt;li&gt;Log on to the system by using a local account.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Important&lt;/b&gt; Do not log on to the system by using a Domain account, if it is possible. Especially, do not log on by using a Domain Admin account. The malware impersonates the logged on user and accesses network resources by using the logged on user credentials. This behavior allows for the malware to spread. &lt;/li&gt;&lt;li&gt; Stop the Server service. This removes the Admin shares from the system so that the malware cannot spread by using this method.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; The Server service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on production servers because this step will affect network resource availability. As soon as the environment is cleaned up, the Server service can be re-enabled.&lt;br /&gt;&lt;br /&gt;To stop the Server service, use the Services Microsoft Management Console (MMC). To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Depending on your system, do the following: &lt;ul&gt;&lt;li&gt;In Windows Vista and Windows Server 2008, click &lt;strong class="uiterm"&gt;Start&lt;/strong&gt;, type &lt;span class="userInput"&gt;services.msc&lt;/span&gt; in the &lt;strong class="uiterm"&gt;Start Search&lt;/strong&gt; box, and then click &lt;b&gt;services.msc&lt;/b&gt; in the &lt;b&gt;Programs&lt;/b&gt; list. &lt;/li&gt;&lt;li&gt; In Windows 2000, Windows XP, and Windows Server 2003, click &lt;strong class="uiterm"&gt;Start&lt;/strong&gt;, click &lt;strong class="uiterm"&gt;Run&lt;/strong&gt;, type &lt;span class="userInput"&gt;services.msc&lt;/span&gt;, and then click &lt;b&gt;OK&lt;/b&gt;. &lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li type="a"&gt;Double-click &lt;b&gt;Server&lt;/b&gt;. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;Stop&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Select &lt;strong class="uiterm"&gt;Disabled&lt;/strong&gt; in the &lt;strong class="uiterm"&gt;Startup type&lt;/strong&gt; box. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;Apply&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Remove all AT-created scheduled tasks. To do this, type &lt;span class="userInput"&gt;AT /Delete /Yes&lt;/span&gt; at a command prompt. &lt;/li&gt;&lt;li&gt; Stop the Task Scheduler service. &lt;ul&gt;&lt;li&gt;To stop the Task Scheduler service in Windows 2000, Windows XP, and Windows Server 2003, use the Services Microsoft Management Console (MMC) or the SC.exe utility. &lt;/li&gt;&lt;li&gt; To stop the Task Scheduler service in Windows Vista or in Windows Server 2008, follow these steps.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Important&lt;/b&gt; This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base: &lt;div class="indent"&gt;&lt;a class="KBlink" href="http://support.microsoft.com/kb/322756/"&gt;322756&lt;/a&gt;                              &lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/322756/                         )         &lt;/span&gt; How to back up and restore the registry in Windows &lt;/div&gt;&lt;ol&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;Start&lt;/strong&gt;, type &lt;span class="userInput"&gt;regedit&lt;/span&gt; in the &lt;strong class="uiterm"&gt;Start Search&lt;/strong&gt; box, and then click &lt;strong class="uiterm"&gt;regedit.exe&lt;/strong&gt; in the &lt;strong class="uiterm"&gt;Programs&lt;/strong&gt; list. &lt;/li&gt;&lt;li type="a"&gt;Locate and then click the following registry subkey: &lt;div class="indent"&gt; HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule &lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;In the details pane, right-click the &lt;strong class="uiterm"&gt;Start&lt;/strong&gt; DWORD entry, and then click &lt;strong class="uiterm"&gt;Modify&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Value data&lt;/strong&gt; box, type &lt;span class="userInput"&gt;4&lt;/span&gt;, and then click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;Exit Registry Editor, and then restart the computer. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; The Task Scheduler service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on Windows Vista and Windows Server 2008 because this step will affect various built-in Scheduled Tasks. As soon as the environment is cleaned up, re-enable the Server service. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Download and manually install security update 958644 (MS08-067). For more information, visit the following Microsoft Web site: &lt;div class="indent"&gt;&lt;a href="http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx"&gt;http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx&lt;/a&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;b&gt;Note&lt;/b&gt; This site may be blocked because of the malware infection. In this scenario, you must download the update from an uninfected computer, and then transfer the update file to the infected system. We recommend that you burn the update to a CD because the burned CD is not writable. Therefore, it cannot be infected. If a recordable CD drive is not available, a removable USB memory drive may be the only way to copy the update to the infected system. If you use a removable drive, be aware that the malware can infect the drive with an Autorun.inf file. After you copy the update to the removable drive, make sure that you change the drive to read-only mode, if the option is available for your device. If read-only mode is available, it is typically enabled by using a physical switch on the device. Then, after you copy the update file to the infected computer, check the removable drive to see whether an Autorun.inf file was written to the drive. If it was, rename the Autorun.inf file to something like Autorun.bad so that it cannot run when the removable drive is connected to a computer.&lt;/li&gt;&lt;li&gt;Reset any Local Admin and Domain Admin passwords to use a new strong password. For more information, visit the following Microsoft Web site: &lt;div class="indent"&gt;&lt;a href="http://technet.microsoft.com/en-us/library/cc875814.aspx"&gt;http://technet.microsoft.com/en-us/library/cc875814.aspx&lt;/a&gt;&lt;span class="pLink"&gt;             (http://technet.microsoft.com/en-us/library/cc875814.aspx)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;In Registry Editor, locate and then click the following registry subkey: &lt;div class="indent"&gt; HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost &lt;/div&gt;&lt;/li&gt;&lt;li&gt;In the details pane, right-click the &lt;strong class="uiterm"&gt;netsvcs&lt;/strong&gt; entry, and then click &lt;strong class="uiterm"&gt;Modify&lt;/strong&gt;. &lt;/li&gt;&lt;li&gt;If the computer is infected with the Win32/Conficker virus, a random service name will be listed.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Note&lt;/b&gt; With Win32/Conficker.B, the service name was random letters and was at the bottom of the list. With later variants, the service name may be anywhere in the list and may seem to be more legitimate. If the random service name is not at the bottom, compare your system with the "Services table" in this procedure to determine which service name may have been added by Win32/Conficker. To verify, compare the list in the "Services table" with a similar system that is known not to be infected.&lt;br /&gt;&lt;br /&gt;Note the name of the malware service. You will need this information later in this procedure. &lt;/li&gt;&lt;li&gt;Delete the line that contains the reference to the malware service. Make sure that you leave a blank line feed under the last legitimate entry that is listed, and then click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Notes about the Services table&lt;/b&gt;&lt;ul&gt;&lt;li&gt;All the entries in the Services table are valid entries, except for the items that are highlighted in bold.&lt;/li&gt;&lt;li&gt;The items that are highlighted in bold are examples of what the Win32/Conficker virus may add to the netsvcs value in the SVCHOST registry key.&lt;/li&gt;&lt;li&gt;This may not be a complete list of services, depending on what is installed on the system.&lt;/li&gt;&lt;li&gt;The Services table is from a default installation of Windows. &lt;/li&gt;&lt;li&gt;The entry that the Win32/Conficker virus adds to the list is an obfuscation technique. The highlighted, malicious entry that is supposed to resemble the first letter is a lowercase "L." However, it is actually an uppercase "I." Because of the font that is used by the operating system, the uppercase "I" seems to be a lowercase "L."&lt;/li&gt;&lt;/ul&gt;&lt;h4 id="tocHeadRef"&gt;Services table&lt;/h4&gt;&lt;script type="text/javascript"&gt;             loadTOCNode(3, 'summary');         &lt;/script&gt;&lt;div nwidth="490" style="width: 490px;" owidth="785" class="kb_outertablewrapper kb_outertablewrapper_closed"&gt;&lt;div class="kb_tabletop_open"&gt;&lt;span class="kb_collapsetext_close"&gt;&lt;span class="kb_collapsetext_background"&gt;&lt;/span&gt;Collapse this table&lt;/span&gt;&lt;span class="kb_expandtext_open"&gt;&lt;span class="kb_expandtext_background"&gt;&lt;/span&gt;Expand this table&lt;/span&gt;&lt;/div&gt;&lt;div class="kb_tablewrapper"&gt;&lt;table class="table" cellspacing="1"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th&gt;Windows Server 2008&lt;/th&gt;&lt;th&gt;Windows Vista&lt;/th&gt;&lt;th&gt;Windows Server 2003&lt;/th&gt;&lt;th&gt;Windows XP&lt;/th&gt;&lt;th&gt;Windows 2000&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;AeLookupSvc&lt;/td&gt;&lt;td&gt;AeLookupSvc&lt;/td&gt;&lt;td&gt;AppMgmt&lt;/td&gt;&lt;td&gt;6to4&lt;/td&gt;&lt;td&gt;EventSystem&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;wercplsupport&lt;/td&gt;&lt;td&gt;wercplsupport&lt;/td&gt;&lt;td&gt;AudioSrv&lt;/td&gt;&lt;td&gt;AppMgmt&lt;/td&gt;&lt;td&gt;Ias&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Themes&lt;/td&gt;&lt;td&gt;Themes&lt;/td&gt;&lt;td&gt;Browser&lt;/td&gt;&lt;td&gt;AudioSrv&lt;/td&gt;&lt;td&gt;Iprip&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;CertPropSvc&lt;/td&gt;&lt;td&gt;CertPropSvc&lt;/td&gt;&lt;td&gt;CryptSvc&lt;/td&gt;&lt;td&gt;Browser&lt;/td&gt;&lt;td&gt;Irmon&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;SCPolicySvc&lt;/td&gt;&lt;td&gt;SCPolicySvc&lt;/td&gt;&lt;td&gt;DMServer&lt;/td&gt;&lt;td&gt;CryptSvc&lt;/td&gt;&lt;td&gt;Netman&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;lanmanserver&lt;/td&gt;&lt;td&gt;lanmanserver&lt;/td&gt;&lt;td&gt;EventSystem&lt;/td&gt;&lt;td&gt;DMServer&lt;/td&gt;&lt;td&gt;Nwsapagent&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;gpsvc&lt;/td&gt;&lt;td&gt;gpsvc&lt;/td&gt;&lt;td&gt;HidServ&lt;/td&gt;&lt;td&gt;DHCP&lt;/td&gt;&lt;td&gt;Rasauto&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;IKEEXT&lt;/td&gt;&lt;td&gt;IKEEXT&lt;/td&gt;&lt;td&gt;Ias&lt;/td&gt;&lt;td&gt;ERSvc&lt;/td&gt;&lt;td&gt;&lt;b&gt;Iaslogon&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;AudioSrv&lt;/td&gt;&lt;td&gt;AudioSrv&lt;/td&gt;&lt;td&gt;Iprip&lt;/td&gt;&lt;td&gt;EventSystem&lt;/td&gt;&lt;td&gt;Rasman&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;FastUserSwitchingCompatibility&lt;/td&gt;&lt;td&gt;FastUserSwitchingCompatibility&lt;/td&gt;&lt;td&gt;Irmon&lt;/td&gt;&lt;td&gt;FastUserSwitchingCompatibility&lt;/td&gt;&lt;td&gt;Remoteaccess&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Ias&lt;/td&gt;&lt;td&gt;Ias&lt;/td&gt;&lt;td&gt;LanmanServer&lt;/td&gt;&lt;td&gt;HidServ&lt;/td&gt;&lt;td&gt;SENS&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Irmon&lt;/td&gt;&lt;td&gt;Irmon&lt;/td&gt;&lt;td&gt;LanmanWorkstation&lt;/td&gt;&lt;td&gt;Ias&lt;/td&gt;&lt;td&gt;Sharedaccess&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Nla&lt;/td&gt;&lt;td&gt;Nla&lt;/td&gt;&lt;td&gt;Messenger&lt;/td&gt;&lt;td&gt;Iprip&lt;/td&gt;&lt;td&gt;Ntmssvc&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Ntmssvc&lt;/td&gt;&lt;td&gt;Ntmssvc&lt;/td&gt;&lt;td&gt;Netman&lt;/td&gt;&lt;td&gt;Irmon&lt;/td&gt;&lt;td&gt;wzcsvc&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;NWCWorkstation&lt;/td&gt;&lt;td&gt;NWCWorkstation&lt;/td&gt;&lt;td&gt;Nla&lt;/td&gt;&lt;td&gt;LanmanServer&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Nwsapagent&lt;/td&gt;&lt;td&gt;Nwsapagent&lt;/td&gt;&lt;td&gt;Ntmssvc&lt;/td&gt;&lt;td&gt;LanmanWorkstation&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Rasauto&lt;/td&gt;&lt;td&gt;Rasauto&lt;/td&gt;&lt;td&gt;NWCWorkstation&lt;/td&gt;&lt;td&gt;Messenger&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Rasman&lt;/td&gt;&lt;td&gt;Rasman&lt;/td&gt;&lt;td&gt;Nwsapagent&lt;/td&gt;&lt;td&gt;Netman&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;b&gt;Iaslogon&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Iaslogon&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Iaslogon&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Iaslogon&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Remoteaccess&lt;/td&gt;&lt;td&gt;Remoteaccess&lt;/td&gt;&lt;td&gt;Rasauto&lt;/td&gt;&lt;td&gt;Nla&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;SENS&lt;/td&gt;&lt;td&gt;SENS&lt;/td&gt;&lt;td&gt;Rasman&lt;/td&gt;&lt;td&gt;Ntmssvc&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Sharedaccess&lt;/td&gt;&lt;td&gt;Sharedaccess&lt;/td&gt;&lt;td&gt;Remoteaccess&lt;/td&gt;&lt;td&gt;NWCWorkstation&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;SRService&lt;/td&gt;&lt;td&gt;SRService&lt;/td&gt;&lt;td&gt;Sacsvr&lt;/td&gt;&lt;td&gt;Nwsapagent&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Tapisrv&lt;/td&gt;&lt;td&gt;Tapisrv&lt;/td&gt;&lt;td&gt;Schedule&lt;/td&gt;&lt;td&gt;Rasauto&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Wmi&lt;/td&gt;&lt;td&gt;Wmi&lt;/td&gt;&lt;td&gt;Seclogon&lt;/td&gt;&lt;td&gt;Rasman&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;WmdmPmSp&lt;/td&gt;&lt;td&gt;WmdmPmSp&lt;/td&gt;&lt;td&gt;SENS&lt;/td&gt;&lt;td&gt;Remoteaccess&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;TermService&lt;/td&gt;&lt;td&gt;TermService&lt;/td&gt;&lt;td&gt;Sharedaccess&lt;/td&gt;&lt;td&gt;Schedule&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;wuauserv&lt;/td&gt;&lt;td&gt;wuauserv&lt;/td&gt;&lt;td&gt;Themes&lt;/td&gt;&lt;td&gt;Seclogon&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;BITS&lt;/td&gt;&lt;td&gt;BITS&lt;/td&gt;&lt;td&gt;TrkWks&lt;/td&gt;&lt;td&gt;SENS&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ShellHWDetection&lt;/td&gt;&lt;td&gt;ShellHWDetection&lt;/td&gt;&lt;td&gt;TrkSvr&lt;/td&gt;&lt;td&gt;Sharedaccess&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;LogonHours&lt;/td&gt;&lt;td&gt;LogonHours&lt;/td&gt;&lt;td&gt;W32Time&lt;/td&gt;&lt;td&gt;SRService&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;PCAudit&lt;/td&gt;&lt;td&gt;PCAudit&lt;/td&gt;&lt;td&gt;WZCSVC&lt;/td&gt;&lt;td&gt;Tapisrv&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;helpsvc&lt;/td&gt;&lt;td&gt;helpsvc&lt;/td&gt;&lt;td&gt;Wmi&lt;/td&gt;&lt;td&gt;Themes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;uploadmgr&lt;/td&gt;&lt;td&gt;uploadmgr&lt;/td&gt;&lt;td&gt;WmdmPmSp&lt;/td&gt;&lt;td&gt;TrkWks&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;iphlpsvc&lt;/td&gt;&lt;td&gt;iphlpsvc&lt;/td&gt;&lt;td&gt;winmgmt&lt;/td&gt;&lt;td&gt;W32Time&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;seclogon&lt;/td&gt;&lt;td&gt;seclogon&lt;/td&gt;&lt;td&gt;wuauserv&lt;/td&gt;&lt;td&gt;WZCSVC&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;AppInfo&lt;/td&gt;&lt;td&gt;AppInfo&lt;/td&gt;&lt;td&gt;BITS&lt;/td&gt;&lt;td&gt;Wmi&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;msiscsi&lt;/td&gt;&lt;td&gt;msiscsi&lt;/td&gt;&lt;td&gt;ShellHWDetection&lt;/td&gt;&lt;td&gt;WmdmPmSp&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;MMCSS&lt;/td&gt;&lt;td&gt;MMCSS&lt;/td&gt;&lt;td&gt;uploadmgr&lt;/td&gt;&lt;td&gt;winmgmt&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;browser&lt;/td&gt;&lt;td&gt;ProfSvc&lt;/td&gt;&lt;td&gt;WmdmPmSN&lt;/td&gt;&lt;td&gt;TermService&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;winmgmt&lt;/td&gt;&lt;td&gt;EapHost&lt;/td&gt;&lt;td&gt;xmlprov&lt;/td&gt;&lt;td&gt;wuauserv&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;SessionEnv&lt;/td&gt;&lt;td&gt;winmgmt&lt;/td&gt;&lt;td&gt;AeLookupSvc&lt;/td&gt;&lt;td&gt;BITS&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;ProfSvc&lt;/td&gt;&lt;td&gt;schedule&lt;/td&gt;&lt;td&gt;helpsvc&lt;/td&gt;&lt;td&gt;ShellHWDetection&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;EapHost&lt;/td&gt;&lt;td&gt;SessionEnv&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;helpsvc&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;hkmsvc&lt;/td&gt;&lt;td&gt;browser&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;xmlprov&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;schedule&lt;/td&gt;&lt;td&gt;hkmsvc&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;wscsvc&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;AppMgmt&lt;/td&gt;&lt;td&gt;AppMgmt&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;WmdmPmSN&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;sacsvr&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;hkmsvc&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;In a previous procedure, you noted the name of the malware service. In our example, the name of the malware entry was "Iaslogon." Using this information, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;In Registry Editor, locate and then click the following registry subkey, where &lt;var&gt;BadServiceName&lt;/var&gt; is the name of the malware service: &lt;div class="indent"&gt;&lt;strong class="uiterm"&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\&lt;var&gt;BadServiceName&lt;/var&gt;&lt;/strong&gt;&lt;/div&gt; For example, locate and then click the following registry subkey: &lt;div class="indent"&gt;&lt;strong class="uiterm"&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Iaslogon&lt;/strong&gt;&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Right-click the subkey in the navigation pane for the malware service name, and then click &lt;strong class="uiterm"&gt;Permissions&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Permissions Entry for SvcHost&lt;/strong&gt; dialog box, click &lt;strong class="uiterm"&gt;Advanced&lt;/strong&gt;. &lt;/li&gt;&lt;li type="a"&gt;In the &lt;strong class="uiterm"&gt;Advanced Security Settings&lt;/strong&gt; dialog box, click to select both of the following check boxes: &lt;div class="indent"&gt;&lt;strong class="uiterm"&gt;Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong class="uiterm"&gt;Replace permission entries on all child objects with entries shown here that apply to child objects.&lt;/strong&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Press F5 to update Registry Editor. In the details pane, you can now see and edit the malware DLL that loads as "ServiceDll." To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Double-click the ServiceDll entry. &lt;/li&gt;&lt;li type="a"&gt;Note the path of the referenced DLL. You will need this information later in this procedure. For example, the path of the referenced DLL may resemble the following: &lt;div class="kb_intextwrapper"&gt;&lt;div class="kb_intextbody"&gt;&lt;pre class="in_text"&gt; %SystemRoot%\System32\doieuln.dll&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt; Rename the reference to resemble the following: &lt;div class="kb_intextwrapper"&gt;&lt;div class="kb_intextbody"&gt;&lt;pre class="in_text"&gt; %SystemRoot%\System32\doieuln.old&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt; Remove the malware service entry from the &lt;strong class="uiterm"&gt;Run&lt;/strong&gt; subkey in the registry. &lt;ol&gt;&lt;li type="a"&gt;In Registry Editor, locate and then click the following registry subkeys: &lt;div class="indent"&gt; HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run&lt;br /&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run&lt;/div&gt;&lt;/li&gt;&lt;li type="a"&gt;In both subkeys, locate any entry that begins with "rundll32.exe" and also references the malware DLL that loads as "ServiceDll" that you identified in step 12b. Delete the entry. &lt;/li&gt;&lt;li type="a"&gt;Exit Registry Editor, and then restart the computer. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Check for Autorun.inf files on any drives on the system. Use Notepad to open each file, and then verify that it is a valid Autorun.inf file. The following is an example of a typical valid Autorun.inf file. &lt;div class="kb_codebody"&gt;&lt;div class="kb_codecontent"&gt;&lt;code&gt;&lt;/code&gt;&lt;pre class="code"&gt;[autorun]&lt;br /&gt;&lt;br /&gt;shellexecute=Servers\splash.hta *DVD*&lt;br /&gt;&lt;br /&gt;icon=Servers\autorun.ico&lt;br /&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt; A valid Autorun.inf is typically 1 to 2 kilobytes (KB). &lt;/li&gt;&lt;li&gt;Delete any Autorun.inf files that do not seem to be valid. &lt;/li&gt;&lt;li&gt;Restart the computer. &lt;/li&gt;&lt;li&gt;Make hidden files visible. To do this, type the following command at a command prompt: &lt;div class="indent"&gt;&lt;span class="userInput"&gt;reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 0x1 /f&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;Set &lt;strong class="uiterm"&gt;Show hidden files and folders&lt;/strong&gt;  so that you can see the file. To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;In step 12b, you noted the path of the referenced .dll file for the malware. For example, you noted a path that resembles the following: &lt;div class="indent"&gt; %systemroot%\System32\doieuln.dll&lt;/div&gt; In Windows Explorer, open the %systemroot%\System32 directory or the directory that contains the malware.&lt;/li&gt;&lt;li type="a"&gt; Click &lt;strong class="uiterm"&gt; Tools&lt;/strong&gt;, and then click &lt;strong class="uiterm"&gt;Folder Options&lt;/strong&gt;.&lt;/li&gt;&lt;li type="a"&gt; Click the &lt;strong class="uiterm"&gt;View&lt;/strong&gt; tab.&lt;/li&gt;&lt;li type="a"&gt;Select the &lt;strong class="uiterm"&gt;Show hidden files and folders&lt;/strong&gt; check box.&lt;/li&gt;&lt;li type="a"&gt; Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Select the .dll file.&lt;/li&gt;&lt;li&gt; Edit the permissions on the file to add Full Control for Everyone. To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Right-click the .dll file, and then click &lt;b&gt;Properties&lt;/b&gt;. &lt;/li&gt;&lt;li type="a"&gt; Click the &lt;strong class="uiterm"&gt;Security&lt;/strong&gt; tab. &lt;/li&gt;&lt;li type="a"&gt; Click &lt;strong class="uiterm"&gt;Everyone&lt;/strong&gt;, and then click to select the &lt;strong class="uiterm"&gt;Full Control&lt;/strong&gt; check box in the &lt;strong class="uiterm"&gt;Allow&lt;/strong&gt; column. &lt;/li&gt;&lt;li type="a"&gt;Click &lt;strong class="uiterm"&gt;OK&lt;/strong&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;Delete the referenced .dll file for the malware. For example, delete the %systemroot%\System32\doieuln.dll file. &lt;/li&gt;&lt;li&gt;Enable the BITS, Automatic Updates, Error Reporting, and Windows Defender services by using the Services Microsoft Management Console (MMC). &lt;/li&gt;&lt;li&gt;Turn off Autorun to help reduce the effect of any reinfection. To do this, follow these steps: &lt;ol&gt;&lt;li type="a"&gt;Depending on your system, install one of the following updates: &lt;ul&gt;&lt;li&gt;If you are running Windows 2000, Windows XP, or Windows Server 2003, install update 967715.   For more information, click the following article number to view the article in the Microsoft Knowledge Base:  &lt;div class="indent"&gt;&lt;a class="KBlink" href="http://support.microsoft.com/kb/967715/"&gt;967715&lt;/a&gt;                              &lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/967715/                         )         &lt;/span&gt;   How to disable the Autorun functionality in Windows  &lt;/div&gt;&lt;/li&gt;&lt;li&gt;If you are running Windows Vista or Windows Server 2008, install security update 950582.  For more information, click the following article number to view the article in the Microsoft Knowledge Base: &lt;div class="indent"&gt;&lt;a class="KBlink" href="http://support.microsoft.com/kb/950582/"&gt;950582&lt;/a&gt;                              &lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/950582/                         )         &lt;/span&gt; MS08-038: Vulnerability in Windows Explorer could allow remote code execution &lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Note&lt;/b&gt; Update 967715 and security update 950582 are not related to this malware issue. These updates must be installed to enable the registry function in step 23b.&lt;/li&gt;&lt;li type="a"&gt;Type the following command at a command prompt: &lt;div class="indent"&gt;&lt;span class="userInput"&gt; reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 0xff /f &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/li&gt;&lt;li&gt;If the system is running Windows Defender, re-enable the Windows Defender autostart location. To do this, type the following command at the command prompt: &lt;div class="indent"&gt;&lt;span class="userInput"&gt; reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Defender" /t REG_EXPAND_SZ /d "%ProgramFiles%\Windows Defender\MSASCui.exe –hide" /f&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt; For Windows Vista and later operating systems, the malware changes the global setting for TCP Receive Window Autotuning to disabled. To change this setting back, type the following command at a command prompt: &lt;div class="indent"&gt;&lt;span class="userInput"&gt;netsh interface tcp set global autotuning=normal&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;  If, after you complete this procedure, the computer seems to be reinfected, either of the following conditions may be true: &lt;ul&gt;&lt;li&gt;One of the autostart locations was not removed. For example, either the AT job was not removed or an Autorun.inf file was not removed. &lt;/li&gt;&lt;li&gt;The security update for MS08-067 was installed incorrectly.&lt;/li&gt;&lt;/ul&gt; This malware may change other settings that are not addressed in this article. Please visit the following Microsoft Malware Protection Center Web page for the latest details about Win32/Conficker: &lt;div class="indent"&gt;&lt;span class="ll"&gt;&lt;a href="http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker"&gt;http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker&lt;/a&gt;&lt;/span&gt;&lt;span class="pLink"&gt;             (http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker)&lt;/span&gt;&lt;span class="kb_space"&gt;&lt;br /&gt;&lt;/span&gt;&lt;h3 id="tocHeadRef"&gt;Verify that the system is clean&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt; Verify that the following services are started: &lt;ul&gt;&lt;li&gt;Automatic Updates (wuauserv)&lt;/li&gt;&lt;li&gt;Background Intelligent Transfer Service (BITS)&lt;/li&gt;&lt;li&gt;Windows Defender (windefend) (if applicable)&lt;/li&gt;&lt;li&gt;Windows Error Reporting Service&lt;/li&gt;&lt;/ul&gt;  To do this, type the following commands at the command prompt. Press ENTER after each command:&lt;br /&gt;&lt;br /&gt;&lt;span class="userInput"&gt;Sc.exe query wuauserv&lt;/span&gt;&lt;br /&gt;&lt;span class="userInput"&gt;Sc.exe query bits&lt;/span&gt;&lt;br /&gt;&lt;span class="userInput"&gt;Sc.exe query windefend&lt;/span&gt;&lt;br /&gt;&lt;span class="userInput"&gt;Sc.exe query ersvc&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;After each command runs, you will receive a message that resembles the following: &lt;div class="message"&gt; SERVICE_NAME: wuauserv&lt;br /&gt;TYPE : 20 WIN32_SHARE_PROCESS&lt;br /&gt;STATE : 4 RUNNING&lt;br /&gt;(STOPPABLE,NOT_PAUSABLE,ACCEPTS_SHUTDOWN)&lt;br /&gt;WIN32_EXIT_CODE : 0 (0x0)&lt;br /&gt;SERVICE_EXIT_CODE : 0 (0x0)&lt;br /&gt;CHECKPOINT : 0x0&lt;br /&gt;WAIT_HINT : 0x0 &lt;/div&gt;In this example, "STATE : 4 RUNNING" indicates that the service is running.&lt;br /&gt;&lt;br /&gt;To verify the status of the SvcHost registry subkey, follow these steps: &lt;ol&gt;&lt;li&gt;In Registry Editor, locate and then click the following registry subkey: &lt;div class="indent"&gt; HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost &lt;/div&gt;&lt;/li&gt;&lt;li&gt;In the details pane, double-click &lt;strong class="uiterm"&gt;netsvcs&lt;/strong&gt;, and then review the service names that are listed. Scroll down to the bottom of the list. If the computer is reinfected with Conficker, a random service name will be listed. For example, in this procedure, the name of the malware service is "Iaslogon."&lt;/li&gt;&lt;/ol&gt;  If these steps do not resolve the issue, contact your antivirus software vendor.  For more information about this issue, click the following article number to view the article in the Microsoft Knowledge Base: &lt;div class="indent"&gt;&lt;a class="KBlink" href="http://support.microsoft.com/kb/49500/"&gt;49500&lt;/a&gt;                              &lt;span class="pLink"&gt;             (http://support.microsoft.com/kb/49500/                         )         &lt;/span&gt; List of antivirus software vendors &lt;/div&gt; If you do not have an antivirus software vendor, or your antivirus software vendor cannot help, contact Microsoft Consumer Support Services for more help.&lt;br /&gt;&lt;h3 id="tocHeadRef"&gt;After the environment is fully cleaned&lt;/h3&gt;&lt;script type="text/javascript"&gt;                 loadTOCNode(2, 'summary');             &lt;/script&gt; After the environment is fully cleaned, follow these steps: &lt;ol&gt;&lt;li&gt;Re-enable the Server service and the Task Scheduler service. &lt;/li&gt;&lt;li&gt;Restore the default permissions on the SVCHOST registry key and the Tasks folder. This should be reverted to the default settings by using Group Policy settings. If a policy is only removed, the default permissions may not be changed back. See the table of default permissions in the "&lt;span&gt;&lt;a href="http://support.microsoft.com/kb/962007#Mitigationsteps"&gt;Mitigation steps&lt;/a&gt;&lt;/span&gt;" section for more information.   &lt;/li&gt;&lt;li&gt;Update the computer by installing any missing security updates. To do this, use Windows Update, Microsoft Windows Server Update Services (WSUS) server, Systems Management Server (SMS), System Center Configuration Manager (SCCM), or your third-party update management product. If you use SMS or SCCM, you must first re-enable the Server service. Otherwise, SMS or SCCM may be unable to update the system. &lt;/li&gt;&lt;li&gt;If you have problems identifying systems that are infected with Conficker, the details provided in the following TechNet blog may help: &lt;div class="indent"&gt;&lt;span class="ll"&gt;&lt;a href="http://blogs.technet.com/kfalde/archive/2009/01/28/using-logparser-eventcomb-to-find-malware.aspx"&gt;http://blogs.technet.com/kfalde/archive/2009/01/28/using-logparser-eventcomb-to-find-malware.aspx&lt;/a&gt;&lt;/span&gt;&lt;span class="pLink"&gt;             (http://blogs.technet.com/kfalde/archive/2009/01/28/using-logparser-eventcomb-to-find-malware.aspx)         &lt;/span&gt;&lt;span class="kb_space"&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;The following table shows default permissions for each operating system. These permissions are in place before you apply the changes that we recommend in this article. These permissions may differ from the permissions that are set in your environment. Therefore, you must note your settings before you make any changes. You must do this so that you can restore your settings after you clean the system. &lt;div class="kb_tabletop_open"&gt;&lt;span class="kb_collapsetext_close"&gt;&lt;span class="kb_collapsetext_background"&gt;&lt;/span&gt;Collapse this table&lt;/span&gt;&lt;span class="kb_expandtext_open"&gt;&lt;span class="kb_expandtext_background"&gt;&lt;/span&gt;Expand this table&lt;/span&gt;&lt;/div&gt;&lt;table class="table" cellspacing="1"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th&gt;Operating system &lt;/th&gt;&lt;th&gt;Windows Server 2008&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;Windows Vista&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;Windows Server 2003&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;Windows XP&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;Windows 2000&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;b&gt;Setting&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Svchost Registry&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Tasks Folder&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Svchost Registry&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Tasks Folder&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Svchost Registry&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Tasks Folder&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Svchost Registry&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Tasks Folder&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Svchost Registry&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;b&gt;Tasks Folder&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;b&gt;Account&lt;/b&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Administrators (Local Group)&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;System&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;td&gt;Full Control&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Power Users (Local Group)&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Read&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Read&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Read&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Users (Local Group)&lt;/td&gt;&lt;td&gt;Special &lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Special&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Read&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Read&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Read&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This key and subkeys&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This key and subkeys&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Query Value&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Query Value&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Enumerate Subkeys&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Enumerate Subkeys&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Notify&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Notify&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Control&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Control&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Authenticated Users&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Special&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Special&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This folder only&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This folder only&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Traverse Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Traverse Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;List Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;List Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Extended Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Extended Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Create Files&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Create Files&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Permissions&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Permissions&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Backup Operators (Local Group)&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Special&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Special&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This folder only&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This folder only&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Traverse Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Traverse Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;List Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;List Folder&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Extended Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Extended Attributes&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Create Files&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Create Files&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Permissions&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Permissions&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Everyone&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;not applicable&lt;/td&gt;&lt;td&gt;Special&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Apply to: This folder, subfolder and files&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Traverse Folder&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;List Folder&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Attributes&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Read Extended Attributes&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Create Files&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Create Folders&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Write Attributes&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;Write Extended Attributes&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;h5&gt;APPLIES TO&lt;/h5&gt;&lt;ul&gt;&lt;li&gt;Windows Server 2008 Datacenter without Hyper-V&lt;/li&gt;&lt;li&gt;Windows Server 2008 Enterprise without Hyper-V&lt;/li&gt;&lt;li&gt;Windows Server 2008 for Itanium-Based Systems&lt;/li&gt;&lt;li&gt;Windows Server 2008 Standard without Hyper-V&lt;/li&gt;&lt;li&gt;Windows Server 2008 Datacenter&lt;/li&gt;&lt;li&gt;Windows Server 2008 Enterprise&lt;/li&gt;&lt;li&gt;Windows Server 2008 Standard&lt;/li&gt;&lt;li&gt;Windows Web Server 2008&lt;/li&gt;&lt;li&gt;Windows Vista Service Pack 1, when used with:&lt;/li&gt;&lt;ul class="kb_subList"&gt;&lt;li&gt;Windows Vista Business&lt;/li&gt;&lt;li&gt;Windows Vista Enterprise&lt;/li&gt;&lt;li&gt;Windows Vista Home Basic&lt;/li&gt;&lt;li&gt;Windows Vista Home Premium&lt;/li&gt;&lt;li&gt;Windows Vista Starter&lt;/li&gt;&lt;li&gt;Windows Vista Ultimate&lt;/li&gt;&lt;li&gt;Windows Vista Enterprise 64-bit Edition&lt;/li&gt;&lt;li&gt;Windows Vista Home Basic 64-bit Edition&lt;/li&gt;&lt;li&gt;Windows Vista Home Premium 64-bit Edition&lt;/li&gt;&lt;li&gt;Windows Vista Ultimate 64-bit Edition&lt;/li&gt;&lt;li&gt;Windows Vista Business 64-bit Edition&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Microsoft Windows Server 2003 Service Pack 1, when used with:&lt;/li&gt;&lt;ul class="kb_subList"&gt;&lt;li&gt;Microsoft Windows Server 2003, Standard Edition (32-bit x86)&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Web Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Microsoft Windows Server 2003, Datacenter x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Enterprise x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Standard x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows XP Professional x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003 Service Pack 2, when used with:&lt;/li&gt;&lt;ul class="kb_subList"&gt;&lt;li&gt;Microsoft Windows Server 2003, Standard Edition (32-bit x86)&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Web Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Datacenter x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Enterprise x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Standard x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows XP Professional x64 Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems&lt;/li&gt;&lt;li&gt;Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Microsoft Windows XP Service Pack 2, when used with:&lt;/li&gt;&lt;ul class="kb_subList"&gt;&lt;li&gt;Microsoft Windows XP Home Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows XP Professional&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Microsoft Windows XP Service Pack 3, when used with:&lt;/li&gt;&lt;ul class="kb_subList"&gt;&lt;li&gt;Microsoft Windows XP Home Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows XP Professional&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;Microsoft Windows 2000 Service Pack 4, when used with:&lt;/li&gt;&lt;ul class="kb_subList"&gt;&lt;li&gt;Microsoft Windows 2000 Advanced Server&lt;/li&gt;&lt;li&gt;Microsoft Windows 2000 Datacenter Server&lt;/li&gt;&lt;li&gt;Microsoft Windows 2000 Professional Edition&lt;/li&gt;&lt;li&gt;Microsoft Windows 2000 Server&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The Trojan War</title><link>http://atvidea.blogspot.com/2009/08/trojan-war.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Mon, 10 Aug 2009 20:49:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-4696310062622725544</guid><description>&lt;span style="font-size:+2;color:#000060;"&gt;The Apple of Discord&lt;/span&gt;  &lt;p&gt;The Trojan War has its roots in the marriage between Peleus and Thetis, a sea-goddess. Peleus and Thetis had not invited Eris, the goddess of discord, to their marriage and the outraged goddess stormed into the wedding banquet and threw a golden apple onto the table. The apple belonged to, Eris said, whomever was the fairest.&lt;/p&gt;  &lt;p&gt;Hera, Athena, and Aphrodite each reached for the apple. Zeus proclaimed that Paris, prince of Troy and thought to be the most beautiful man alive, would act as the judge.&lt;/p&gt;  &lt;p&gt;Hermes went to Paris, and Paris agreed to act as the judge. Hera promised him power, Athena promised him wealth, and Aphrodite promised the most beautiful woman in the world.&lt;/p&gt;  &lt;p&gt;Paris chose Aphrodite, and she promised him that Helen, wife of Menelaus, would be his wife. Paris then prepared to set off for Sparta to capture Helen. Twin prophets Cassandra and Helenus tried to persuade him against such action, as did his mother, Hecuba. But Paris would not listen and he set off for Sparta.&lt;/p&gt;  &lt;p&gt;In Sparta, Menelaus, husband of Helen, treated Paris as a royal guest. However, when Menelaus left Sparta to go to a funeral, Paris abducted Helen (who perhaps went willingly) and also carried off much of Menelaus' wealth.&lt;/p&gt;  &lt;p&gt;In Troy, Helen and Paris were married. This occured around 1200 B.C. (Wood, 16).&lt;/p&gt;  &lt;p&gt;&lt;a name="anchor199596"&gt;&lt;/a&gt;&lt;span style="font-size:+2;color:#000060;"&gt;Greek Armament&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;Menelaus, however, was outraged to find that Paris had taken Helen. Menelaus then called upon all of Helen's old suitors, as all of the suitors had made an oath long ago that they would all back Helen's husband to defend her honor.&lt;/p&gt;  &lt;p&gt;Many of the suitors did not wish to go to war. Odysseus pretended to be insane but this trick was uncovered by Palamedes. Achilles, though not one of the previous suitors, was sought after because the seer Calchas had stated that Troy would not be taken unless Achilles would fight.&lt;/p&gt;  &lt;p&gt;One of the most interesting stories is of Cinyras, king of Paphos, in Cyprus, who had been a suitor of Helen. He did not wish to go to war, but promised Agamemnon fifty ships for the Greek fleet. True to his word, Cinyras did send fifty ships. The first ship was commanded by his son. The other forty-nine, however, were toy clay ships, with tiny clay sailors. They dissembled soon after being placed in the ocean (Tripp, 584-584).&lt;/p&gt;  &lt;p&gt;The Greek fleet assembled, under Agamemnon's inspection, in Aulis. However, Agamemnon either killed one of Diana's sacred stags or made a careless boast. Either way, Diana was outraged and she calmed the seas so that the fleet could not take off.&lt;/p&gt;  &lt;p&gt;The seer Calchas proclaimed that Iphigenia, daughter of Agamemnon, must be sacrificed before the fleet could set sail. This was done, and the Greek ships set off in search of Troy.&lt;/p&gt;  &lt;p&gt;&lt;a name="anchor200602"&gt;&lt;/a&gt;&lt;span style="font-size:+2;color:#000060;"&gt;Finding Troy&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;Finding Troy proved difficult, however, and the Greek fleet at first landed in Mysia. According to Herodotus, the Greeks were under the impression that Helen had been taken by the Teuthranians (Teucrians), and though the Teuthranians denied such allegations, the Greeks layed siege to the city (Herodotus, Bk. II.118). The Greeks ultimately prevailed, but suffered heavy casualties at the hands of Telephus, king of the Teuthranians, and, at the end, were still without Helen. Telephus, in the course of the war, was wounded by Achilles.&lt;/p&gt;  &lt;p&gt;With no where else to turn, the Greeks returned home.&lt;/p&gt;  &lt;p&gt;The Trojan War might not have happened had not Telephus gone to Greece in the hopes of having his wound cured. Telephus had been told by an oracle that only the person who wounded him (in this case, Achilles) could cure him. Achilles assented and Telephus told the Greeks how to get to Troy.&lt;/p&gt;  &lt;p&gt;&lt;a name="anchor201765"&gt;&lt;/a&gt;&lt;span style="font-size:+2;color:#000060;"&gt;Embassy to Priam&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;Odysseus, known for his eloquence, and Menelaus were sent as ambassadors to Priam. They demanded Helen and the stolen treasure be returned. Priam refused, and Odysseus and Menelaus returned to the Greek ships with the announcement that war was inevitable.&lt;/p&gt;  &lt;p&gt;&lt;a name="anchor202941"&gt;&lt;/a&gt;&lt;span style="font-size:+2;color:#000060;"&gt;The War&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;The first nine years of the war consisted of both war in Troy and war against the neighboring regions. The Greeks realized that Troy was being supplied by its neighboring kingdoms, so Greeks were sent to defeat these areas.&lt;/p&gt;  &lt;p&gt;As well as destroying Trojan economy, these battles let the Greeks gather a large amount of resources and other spoils of war, including women (e.g., Briseis, Tecmessa and Chryseis).&lt;/p&gt;  &lt;p&gt;The Greeks won many important battles and the Trojan hero Hector fell, as did the Trojan ally Penthesilea. However, the Greeks could not break down the walls of Troy.&lt;/p&gt;  &lt;p&gt;Patroclus was killed and, soonafter, Achilles was felled by Paris.&lt;/p&gt;  &lt;p&gt;Helenus, son of Priam, had been captured by Odysseus. A prophet, Helenus told the Greeks that Troy would not fall unless:&lt;/p&gt;  &lt;p&gt;a) Pyrrhus, Achilles' son, fought in the war,&lt;br /&gt;b) The bow and arrows of Hercules were used by the Greeks against the Trojans,&lt;br /&gt;c) The remains of Pelops, the famous Eleian hero, were brought to Troy, and&lt;br /&gt;d) The Palladium, a statue of Athena, was stolen from Troy (Tripp, 587).&lt;/p&gt;  &lt;p&gt;Phoenix persuaded Pyrrhus to join the war. Philoctetes had the bow and arrows of Hercules, but had been left by the Greek fleet in Lemnos because he had been bitten by a snake and his wound had a horrendous smell. Philoctetes was bitter, but was finally persuaded to join the Greeks. The remains of Pelops were gotten, and Odysseus infiltrated Trojan defenses and stole the Palladium.&lt;/p&gt;  &lt;p&gt;&lt;a name="anchor204279"&gt;&lt;/a&gt;&lt;span style="font-size:+2;color:#000060;"&gt;The Trojan Horse&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;Still seeking to gain entrance into Troy, clever Odysseus (some say with the aid of Athena) ordered a large wooden horse to be built. Its insides were to be hollow so that soldiers could hide within it.&lt;/p&gt;  &lt;p&gt;Once the statue had been built by the artist Epeius, a number of the Greek warriors, along with Odysseus, climbed inside. The rest of the Greek fleet sailed away, so as to deceive the Trojans.&lt;/p&gt;  &lt;p&gt;One man, Sinon, was left behind. When the Trojans came to marvel at the huge creation, Sinon pretended to be angry with the Greeks, stating that they had deserted him. He assured the Trojans that the wooden horse was safe and would bring luck to the Trojans.&lt;/p&gt;  &lt;p&gt;Only two people, Laocoon and Cassandra, spoke out against the horse, but they were ignored. The Trojans celebrated what they thought was their victory, and dragged the wooden horse into Troy.&lt;/p&gt;  &lt;p&gt;That night, after most of Troy was asleep or in a drunken stupor, Sinon let the Greek warriors out from the horse, and they slaughtered the Trojans. Priam was killed as he huddled by Zeus' altar and Cassandra was pulled from the statue of Athena and raped.&lt;/p&gt;  &lt;center&gt;&lt;img src="http://www.stanford.edu/%7Eplomio/BurningofTroy.JPG" align="BOTTOM" border="0" /&gt;&lt;/center&gt;  &lt;p&gt;&lt;a name="anchor205683"&gt;&lt;/a&gt;&lt;span style="font-size:+2;color:#000060;"&gt;After the War&lt;/span&gt;&lt;/p&gt;  &lt;p&gt;After the war, Polyxena, daughter of Priam, was sacrificed at the tomb of Achilles and Astyanax, son of Hector, was also sacrificed, signifying the end of the war.&lt;/p&gt;  &lt;p&gt;Aeneas, a Trojan prince, managed to escape the destruction of Troy, and Virgil's &lt;i&gt;Aeneid&lt;/i&gt; tells of his flight from Troy. Many sources say that Aeneas was the only Trojan prince to survive, but this statement contradicts the common story that Andromache was married to Helenus, twin of Cassandra, after the war.&lt;/p&gt;  &lt;p&gt;Menelaus, who had been determined to kill his faithless wife, was soon taken by Helen's beauty and seductiveness that he allowed her to live.&lt;/p&gt;  &lt;p&gt;The surviving Trojan women were divided among the Greek men along with the other plunder. The Greeks then set sail for home, which, for some, proved as difficult and took as much time as the Trojan War itself (e.g., Odysseus and Menelaus).&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Trojan, Virus, and Worm Information</title><link>http://atvidea.blogspot.com/2009/08/trojan-virus-and-worm-information.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Mon, 10 Aug 2009 20:23:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-530390176505324718</guid><description>&lt;blockquote&gt;  &lt;b&gt;Trojans&lt;/b&gt;  &lt;p&gt;A Trojan refers to a program that appears as something you may think is safe, but hidden inside is usually something harmful, probably a worm or a virus. The lure of Trojans is that you may download a game or a picture, thinking it's harmless, but once you execute this file (run it), the worm or virus gets to work. Sometimes they will only do things to annoy you, but usually a worm or virus will cause damage to your system. &lt;/p&gt;&lt;/blockquote&gt;  &lt;a name="virus"&gt;&lt;/a&gt; &lt;blockquote&gt;  &lt;b&gt;Viruses&lt;/b&gt;  &lt;p&gt;Viruses are computer programs with the sole purpose of destroying data on our computers. The virus may only destroy unimportant files, or it may decide to erase all of your document files. A virus can cause an infected computer to do funny things on certain dates, as well as issue serious commands such as erasing our Registry file, thus disabling the operation and booting up of our computers. &lt;/p&gt;&lt;p&gt;Viruses are spread through executable files we either get from friends, download off the net, or install through a floppy disk. A virus will often come disguised under the cloak of a Trojan, which is the carrier for the virus. &lt;/p&gt;&lt;/blockquote&gt;  &lt;a name="worms"&gt;&lt;/a&gt; &lt;blockquote&gt;  &lt;b&gt;Worms&lt;/b&gt;  &lt;p&gt;Worms operate differently. Do you remember the Star Trek show called 'The Trouble with Tribbles'? (Star-Trek fans, if I've remembered the name wrong, please correct me). These little creatures just kept replicating themselves, each one multiplying themselves over and over. Worms act much the same way. &lt;/p&gt;&lt;p&gt;Worms generally come through our email client, but people can also get infected if they accept a Trojan File which has as the payload a worm. If you receive a worm program through your email, and then execute it, this program sends the worm file out to all that are listed in your email address book. If you work in a major corporation, this could means hundreds of people, and so the multiplying continues. &lt;/p&gt;&lt;/blockquote&gt;  &lt;p&gt;Recently we all witnessed the world-wide problems of the "Love bug". That is a perfect example of all of the above. (yes!) It's a Trojan because it came disguised as a 'Love Letter' when really it was carrying a harmful program. It is a virus because once executed, it infected files on your computer, turning them into new trojans. It's a worm because it propogated itself by sending itself out to everyone listed in your email address book or IRC client. &lt;/p&gt;&lt;p&gt;This is reality -- bad things are out there, disguised as good things....and we must use our computers safely and wisely.   &lt;/p&gt;&lt;p&gt; &lt;a name="defense"&gt;&lt;/a&gt; &lt;a name="besafe"&gt;&lt;/a&gt; &lt;table border="0" cellpadding="3" cellspacing="0"&gt;  &lt;tbody&gt;&lt;tr&gt;&lt;td bg width="500" style="color:#fcfdd9;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;The Best Defense&lt;/b&gt;&lt;/span&gt;   &lt;span style="font-size:78%;"&gt;&lt;a href="http://www.ircbeginner.com/opvinfo/trojan-virus.html#top"&gt;(top)&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt; &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Never click on links through IRC that come from someone you do not know  &lt;/li&gt;&lt;li&gt;Never accept files from anyone you don't know  &lt;/li&gt;&lt;li&gt;When downloading files off the Internet, be sure it's from a reputable site.  &lt;/li&gt;&lt;li&gt;Never run or even peek at files you receive through your email program from people you don't know. If you have any doubts at all, write the person back, and ask for verification that they sent you a file. Some of the more recent viruses will send mail (and file) to everyone listed in your email address book, then it deletes itself and you have no idea of what happened. Scary, huh? &lt;/li&gt;&lt;li&gt;Install a Virus Detection program -- you can find a free one called &lt;a href="http://www.antivirus.cai.com/"&gt;Inoculate&lt;/a&gt;. I use it, along with another one, and while no program is foolproof 100% of the time (due to the complexity of new viruses appearing everyday), it is a good program, and something you should consider. &lt;/li&gt;&lt;li&gt;Set yourself up a regular time to update the virus scans, and do it -- if we don't keep our computers up-to-date on the latest technologies, then we are leaving ourselves vulnerable. With over 200 new viruses being reported each month, tomorrow is not the time to update...but TODAY. &lt;/li&gt;&lt;li&gt;One more important step is to &lt;b&gt;backup your important files regularly&lt;/b&gt;. &lt;br /&gt;Better safe than sorry! &lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;If you'd like to read more about Trojans and Viruses, check &lt;a href="http://www.ircbeginner.com/opvinfo/urls-trojan-virus.html"&gt;here&lt;/a&gt; for more resource links.  For a comprehensive page with antivirus solutions as well as trojan scanners/cleaners, visit here:  &lt;a href="http://www.ircbeginner.com/virusinfo/virusinfo.html"&gt;Virus &amp;amp; Trojan Solutions&lt;/a&gt;  You may also wish to download a file that describes in more detail various viruses and trojans.  It's called &lt;a href="http://www.ircbeginner.com/files/virhelp.hlp"&gt;Virus Help&lt;/a&gt;.  Get it &lt;a href="http://www.ircbeginner.com/files/virhelp.hlp"&gt;here&lt;/a&gt;.   &lt;/p&gt;&lt;p&gt; &lt;a name="infection"&gt;&lt;/a&gt; &lt;table border="0" cellpadding="3" cellspacing="0"&gt;  &lt;tbody&gt;&lt;tr&gt;&lt;td bg width="500" style="color:#fcfdd9;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;Infection and What to Do&lt;/b&gt;&lt;/span&gt;   &lt;span style="font-size:78%;"&gt;&lt;a href="http://www.ircbeginner.com/opvinfo/trojan-virus.html#top"&gt;(top)&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt;  &lt;/p&gt;&lt;p&gt;If you have become infected and need to repair your computer, you have several choices: &lt;/p&gt;&lt;ol&gt;&lt;li&gt;One of your choices is to download a program called &lt;a href="http://www.moosoft.com/"&gt;The Cleaner&lt;/a&gt;. You can use the program free for 30 days (good deal!). After that time, registration is required at a cost of about $30 (US). This price includes free future updates of the program as well. &lt;p&gt; &lt;/p&gt;&lt;/li&gt;&lt;li&gt;Another option is to visit this website, &lt;a href="http://www.nohack.net/"&gt;http://www.nohack.net&lt;/a&gt;, for more information about being infected. Find the information describing your infection and follow their steps listed for removing harmful trojans, worms, and viruses. Some programs are not totally removable through these steps, and that's where The Cleaner can benefit you as it will remove all traces of infection. &lt;p&gt; &lt;/p&gt;&lt;/li&gt;&lt;li&gt;Trend Micro, the makers of PC-cillin (an antivirus program, and one that I use) offers free online assistance. You may wish to visit their site and let their system scan your computer. Visit &lt;a href="http://housecall.antivirus.com/"&gt;Trend Micro's Housecall&lt;/a&gt; for this free evaluation.  You can buy their product from this site, or you can find this antivirus program in many of the larger software outlets.  &lt;/li&gt;&lt;li&gt;Visit our new &lt;a href="http://www.ircbeginner.com/virusinfo/virusinfo.html"&gt;Virus, Trojan, and Security Solutions&lt;/a&gt; page for a comprehensive listing of sites and programs that can help anyone wanting to protect their computer.  &lt;/li&gt;&lt;/ol&gt;  &lt;p&gt; &lt;a name="emailhoax"&gt;&lt;/a&gt; &lt;table border="0" cellpadding="3" cellspacing="0"&gt;  &lt;tbody&gt;&lt;tr&gt;&lt;td bg width="500" style="color:#fcfdd9;"&gt;&lt;span style="font-size:100%;"&gt;&lt;b&gt;E-Mail Virus Hoaxes&lt;/b&gt;&lt;/span&gt;   &lt;span style="font-size:78%;"&gt;&lt;a href="http://www.ircbeginner.com/opvinfo/trojan-virus.html#top"&gt;(top)&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;  &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt; &lt;/p&gt;&lt;p&gt;There will always be newbies on the net, so there will always be a market for spreading the news about E-mail virus hoaxes. This is when someone forwards on a letter which often makes claims that if you receive a mail titled something similar to "Win a Holiday Cruise", and open it, your harddrive will be erased (or some other such dire warning). While we can never be too careful, we have to be cautious to not be too gullible as well :) If you have any doubts about whether or not a warning you receive may be true or false, visit &lt;a href="http://www.symantec.com/avcenter/hoax.html" target="mainwindow"&gt;Symantec's Antivirus Research Center Virus Hoax&lt;/a&gt; site.  They list (and describe) over 80 of the most prevalent virus hoaxes circulating worldwide.  &lt;/p&gt;This site isn't completed yet -- we will have much more information here soon describing in more detail viruses, worms, trojans, etc</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What is a Trojan Horse Virus?</title><link>http://atvidea.blogspot.com/2009/08/what-is-trojan-horse-virus.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Mon, 10 Aug 2009 20:20:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-2304535061343681931</guid><description>&lt;p&gt;A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application.&lt;/p&gt;  &lt;p&gt;A Trojan Horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer. &lt;/p&gt;  &lt;p&gt;A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to &lt;a itxtdid="8365554" target="_blank" href="http://www.tech-faq.com/trojan-horse-virus.shtml#" style="border-bottom: 1px solid rgb(62, 92, 118) ! important; font-weight: normal ! important; font-size: 100% ! important; text-decoration: none ! important; padding-bottom: 0px ! important; color: rgb(62, 92, 118) ! important; background-color: transparent ! important; background-image: none; padding-top: 0pt; padding-right: 0pt; padding-left: 0pt;" classname="iAs" class="iAs"&gt;Internet &lt;nobr style="font-weight: normal; font-size: 100%;" id="itxt_nobr_2_0"&gt;servers&lt;img style="border: 0pt none ; margin: 0pt; padding: 0pt; display: inline; height: 10px; width: 10px; position: relative; top: 1px; left: 1px; float: none;" name="itxt-icon-0" src="http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif" /&gt;&lt;/nobr&gt;&lt;/a&gt; designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash. &lt;/p&gt;   &lt;p&gt;A Trojan Horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. &lt;/p&gt;   &lt;p&gt;These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above. &lt;/p&gt;   &lt;p&gt;Another method used by malware developers to spread their Trojan Horse viruses is via chat software such as Yahoo Messenger and Skype. Another method used by this virus in order to infect other machines is through sending copies of itself to the people in the address book of a user whose computer has already been infected by the virus. &lt;/p&gt;     &lt;p&gt;The best way to prevent a Trojan Horse Virus from entering and infecting your computer is to never open email attachments or files that have been sent by unknown senders. However, not all files we can receive are guaranteed to be virus-free. With this, a good way of protecting your PC against malicious programs such as this harmful application is to install and update an antivirus program. &lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to remove a Trojan, Virus, Worm, or other Malware</title><link>http://atvidea.blogspot.com/2009/08/how-to-remove-trojan-virus-worm-or.html</link><author>noreply@blogger.com (at_videa)</author><pubDate>Mon, 10 Aug 2009 20:19:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3220738692330368368.post-2457117881794310774</guid><description>&lt;div align="center"&gt;If you use a computer, read the newspaper, or watch the news,     you will know about computer viruses or other malware. These are those      malicious programs that once they infect your machine will start causing     havoc on your     computer. What many people do not know     is that there are many different types of infections that are categorized     in the general category of Malware.   &lt;p align="left"&gt;&lt;em&gt;&lt;strong&gt;Malware&lt;/strong&gt; - Malware is programming or files      that are developed for the purpose of doing harm. Thus, malware includes computer      viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;This article will focus on those malware that are considered     viruses, trojans, worms, and viruses, though this information can be used     to remove the other types of malware as well. We will not go into specific     details about any one particular infection, but     rather     provide     a     broad overview     of     how these infections can be removed. For the most part these instructions     should allow you to remove a good deal of infections, but there are some     that need special steps to be removed and these won't be covered under this   tutorial. &lt;/p&gt;   &lt;p align="left"&gt;Before&lt;strong&gt; &lt;/strong&gt;we continue it is important to understand     the generic malware terms that you will be reading about.&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Adware - &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;A program that generates      popups on your computer or displays advertisements. It is important to note      that not all adware programs are necessarily considered malware. There are      many legitimate programs that are given for free that display ads in their      programs in order to generate revenue. As long as this information is provided      up front then they are generally not considered malware.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;em&gt;&lt;strong&gt;Backdoor -&lt;/strong&gt; A program that allows a remote      user to execute commands and tasks on your computer without your permission.      These types of programs are typically used to launch attacks on other computers,      distribute copyrighted software or media, or hack other computers.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Dialler -&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; A program that typically      dials a premium rate number that has per minute charges over and above the      typical call charge. These calls are with the intent of gaining access to      pornographic material.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Hijackers - &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;A program that attempts       to hijack certain Internet functions like redirecting your start page to       the hijacker's own start page, redirecting search queries to a undesired       search engine, or replace search results from popular search engines with       their       own information.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Spyware - &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;A program         that monitors your activity or information on your computer and sends       that information         to a remote computer without your knowledge.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Trojan &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;&lt;strong&gt;- &lt;/strong&gt;A program      that has been designed to appear innocent but has been intentionally designed      to cause some malicious activity or to provide a backdoor to your system.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Virus -&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;em&gt;Worm -&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; A program that when run,      has the ability to spread to other computers on its own using either mass-mailing      techniques to email addresses found on your computer or by using the Internet      to infect a remote computer using known security holes.&lt;/em&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;br /&gt;    &lt;a name="start" id="start"&gt;&lt;/a&gt;&lt;u&gt;How these infections start&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt; Just like any program, in order for the program to work, it     must be started. Malware programs are no different in this respect and must     be started in some fashion in order to do what they were designed to do.     For the most part these infections run by creating a configuration entry     in the &lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial74.html" title="Demystifying the Windows Registry"&gt;&lt;strong&gt;&lt;span style="color:#0000ff;"&gt;Windows     Registry&lt;/span&gt;&lt;/strong&gt; &lt;/a&gt;in order to make these programs start when your computer     starts.&lt;/p&gt;   &lt;p align="left"&gt;Unfortunately, though, in the &lt;a itxtdid="6666427" target="_blank" href="http://www.bleepingcomputer.com/tutorials/tutorial101.html#" style="border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; font-weight: normal ! important; font-size: 100% ! important; text-decoration: none ! important; padding-bottom: 0px ! important; color: rgb(43, 101, 176) ! important; background-color: transparent ! important; background-image: none; padding-top: 0pt; padding-right: 0pt; padding-left: 0pt;" classname="iAs" class="iAs"&gt;Windows operating &lt;nobr style="font-weight: normal; font-size: 100%;" id="itxt_nobr_6_0"&gt;system&lt;img style="border: 0pt none ; margin: 0pt; padding: 0pt; display: inline; height: 10px; width: 10px; position: relative; top: 1px; left: 1px; float: none;" name="itxt-icon-0" src="http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif" /&gt;&lt;/nobr&gt;&lt;/a&gt; there     are many different ways to make a program start which can make it difficult     for the average computer user to find manually. Luckily for us, though, there     are programs that allow us to cut through this confusion and     see     the     various     programs that are automatically starting when &lt;a itxtdid="8366294" target="_blank" href="http://www.bleepingcomputer.com/tutorials/tutorial101.html#" style="border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; font-weight: normal ! important; font-size: 100% ! important; text-decoration: none ! important; padding-bottom: 0px ! important; color: rgb(43, 101, 176) ! important; background-color: transparent ! important; background-image: none; padding-top: 0pt; padding-right: 0pt; padding-left: 0pt;" classname="iAs" class="iAs"&gt;&lt;nobr style="font-weight: normal; font-size: 100%;" id="itxt_nobr_6_1"&gt;windows&lt;img style="border: 0pt none ; margin: 0pt; padding: 0pt; display: inline; height: 10px; width: 10px; position: relative; top: 1px; left: 1px; float: none;" name="itxt-icon-0" src="http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif" /&gt;&lt;/nobr&gt;&lt;/a&gt; boots. The program     we recommend for this, because its free and detailed, is &lt;a href="http://www.sysinternals.com/Utilities/Autoruns.html" target="_blank" rel="nofollow"&gt;&lt;strong&gt;&lt;span style="color:#0000ff;"&gt;Autoruns&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;from     Sysinternals.&lt;br /&gt;   &lt;br /&gt;    When you run this program it will list all the various programs that start     when your computer is booted into Windows. For the most part, the majority     of these programs are safe and should be left alone     unless     you know   what you are doing or know you do not need them to run at startup.&lt;/p&gt;   &lt;p align="left"&gt;At this point, you should download &lt;strong&gt;&lt;a href="http://www.sysinternals.com/Utilities/Autoruns.html" target="_blank" rel="nofollow"&gt;&lt;span style="color:#0000ff;"&gt;Autoruns&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt; and     try it out. Just run the &lt;strong&gt;Autoruns.exe&lt;/strong&gt; and look at all the     programs that start automatically. Don't uncheck or delete anything at this     point. Just examine     the information to see an overview of the amount of programs that are starting     automatically. When you feel comfortable with what you are seeing, move on     to the next section.&lt;/p&gt;   &lt;p align="left"&gt;   &lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;u&gt;&lt;a name="remove"&gt;&lt;/a&gt;&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt;&lt;u&gt;How to remove these infections&lt;/u&gt;&lt;/strong&gt;&lt;br /&gt;  &lt;/p&gt;   &lt;p align="left"&gt;We have finally arrived at the section you came here for. You     are most likely reading this tutorial because you are infected with some     sort of malware and want to remove it. With this knowledge that you are infected,     it is also assumed that you examined the programs running on your computer     and found one that does not look right. You did further research by checking     that program against our&lt;span style="color:#0000ff;"&gt; &lt;a href="http://www.bleepingcomputer.com/startups/"&gt;&lt;strong&gt;Startup Database&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt; or     by searching in Google and have learned that it is an infection and you now     want to remove     it.&lt;/p&gt;   &lt;p align="left"&gt;If you have identified the particular program that is part     of the malware, and you want to remove it, please follow these steps.&lt;/p&gt; &lt;/div&gt; &lt;ol&gt;&lt;li&gt;     &lt;div align="left"&gt;Download and extract the &lt;a href="http://www.sysinternals.com/Utilities/Autoruns.html" target="_blank" rel="nofollow"&gt;&lt;strong&gt;&lt;span style="color:#0000ff;"&gt;Autoruns&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt; program by Sysinternals       to &lt;strong&gt;C:\Autoruns&lt;br /&gt;     &lt;br /&gt;    &lt;/strong&gt;&lt;/div&gt;   &lt;/li&gt;&lt;li&gt;Reboot into &lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial61.html"&gt;&lt;span style="color:#0000ff;"&gt;Safe         Mode&lt;/span&gt;&lt;/a&gt; &lt;/strong&gt; so that the malware is not started when you are doing         these steps. Many malware monitor the keys that allow them to start and         if they notice they have been removed, will automatically replace that         startup key. For this reason booting into safe mode allows us to get         past that defense in most cases.&lt;br /&gt;       &lt;br /&gt;  &lt;/li&gt;&lt;li&gt;Navigate to the &lt;strong&gt;C:\Autoruns&lt;/strong&gt; folder you created in Step     1 and double-click on &lt;strong&gt;autoruns.exe.&lt;br /&gt;   &lt;br /&gt;  &lt;/strong&gt;&lt;/li&gt;&lt;li&gt;When the program starts, click on the &lt;strong&gt;Options &lt;/strong&gt; menu and     enable the following options by clicking on them. This will place a checkmark     next     to each of these options.    &lt;br /&gt;   &lt;br /&gt;        &lt;ol&gt;&lt;li&gt;&lt;strong&gt;Include empty locations&lt;/strong&gt;&lt;br /&gt;       &lt;br /&gt;      &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Verify Code Signatures&lt;/strong&gt;&lt;br /&gt;       &lt;br /&gt;      &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Hide Signed Microsoft Entries&lt;br /&gt;        &lt;/strong&gt;&lt;br /&gt;      &lt;/li&gt;&lt;/ol&gt;   &lt;/li&gt;&lt;li&gt;Then press the &lt;strong&gt;F5 &lt;/strong&gt;key on your keyboard to refresh the     startups list using these new settings.&lt;br /&gt;   &lt;br /&gt;  &lt;/li&gt;&lt;li&gt;The program shows information about your startup entries in 8 different     tabs. For the most part, the filename you are looking for will be found under     the &lt;strong&gt;Logon&lt;/strong&gt; or the &lt;strong&gt;Services&lt;/strong&gt; tabs, but you     should check all the other tabs to make sure they are not loading elsewhere     as well. Click on each tab and look through the list for the filename that     you want to remove. The filename will     be found     under     the &lt;strong&gt;Image     Path&lt;/strong&gt; column.     There may be more than one entry associated with the same file as it is common     for malware     to create multiple startup entries.&lt;strong&gt;&lt;span style="color:#ff0000;"&gt; It is important     to note that many malware programs disguise themselves by using     the same     filenames as valid     Microsoft files. it is therefore important to know exactly which file, and     the folder they are in, that you want to remove&lt;/span&gt;&lt;/strong&gt;. You can     check our &lt;a href="http://www.bleepingcomputer.com/startups/"&gt;&lt;strong&gt;&lt;span style="color:#0000ff;"&gt;Startup     Database&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt; for that information     or ask for help in our &lt;a href="http://www.bleepingcomputer.com/forums/"&gt;computer help forums&lt;/a&gt;.&lt;br /&gt;   &lt;br /&gt;  &lt;/li&gt;&lt;li&gt;Once you find the entry that is associated with the malware, you want to     delete that entry so it will not start again on the next reboot. To do that     right click on the entry and select &lt;strong&gt;delete&lt;/strong&gt;. This startup     entry will now be removed from the Registry.&lt;br /&gt;   &lt;br /&gt;  &lt;/li&gt;&lt;li&gt;Now that we made it so it will not start on boot up, you should delete     the file using My Computer or Windows Explorer. If you can not see the file,     it may be hidden. To allow you to see hidden files you can follow the     steps for your &lt;a itxtdid="8365863" target="_blank" href="http://www.bleepingcomputer.com/tutorials/tutorial101.html#" style="border-bottom: 0.2em dotted rgb(43, 101, 176) ! important; font-weight: normal ! important; font-size: 100% ! important; text-decoration: none ! important; padding-bottom: 0px ! important; color: rgb(43, 101, 176) ! important; background-color: transparent ! important; background-image: none; padding-top: 0pt; padding-right: 0pt; padding-left: 0pt;" classname="iAs" class="iAs"&gt;operating &lt;nobr style="font-weight: normal; font-size: 100%;" id="itxt_nobr_34_0"&gt;system&lt;img style="border: 0pt none ; margin: 0pt; padding: 0pt; display: inline; height: 10px; width: 10px; position: relative; top: 1px; left: 1px; float: none;" name="itxt-icon-0" src="http://images.intellitxt.com/ast/adTypes/mag-glass_10x10.gif" /&gt;&lt;/nobr&gt;&lt;/a&gt; found in this tutorial:&lt;br /&gt;   &lt;br /&gt;    &lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial62.html"&gt;&lt;span style="color:#0000ff;"&gt;How to see hidden files in Windows    &lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;   &lt;br /&gt;  &lt;/li&gt;&lt;li&gt;When you are finished removing the malware entries from the Registry and     deleting the files, reboot into normal mode as you will now be clean from     the infection.&lt;/li&gt;&lt;/ol&gt; &lt;div align="left"&gt;   &lt;p&gt;&lt;br /&gt;  &lt;a name="protect" id="protect"&gt;&lt;/a&gt;&lt;strong&gt;&lt;u&gt;How to protect yourself in the future&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt; &lt;/div&gt; &lt;div align="center"&gt;   &lt;p align="left"&gt;In order to protect yourself from this happening again it is     important that take proper care and precautions when using your computer.     Make sure you have updated antivirus&lt;strong&gt; &lt;/strong&gt;and spyware removal     software running, all the latest updates to your operating system, a firewall,     and only open attachments or click on popups that you know are safe. These     precautions can be a tutorial unto itself, and luckily, we have one created     already:&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial82.html"&gt;&lt;span style="color:#0000ff;"&gt;Simple and easy ways to keep your computer safe and secure     on the Internet&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;  &lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt;Please read this tutorial and follow the steps listed in order      to be safe on the Internet.&lt;strong&gt; &lt;/strong&gt; Other tutorials that are important      to read in order to protect your computer are listed below.&lt;/p&gt;   &lt;p align="left"&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial41.html"&gt;&lt;strong&gt;&lt;span style="color:#0000ff;"&gt;Understanding      Spyware, Browser Hijackers, and Dialers&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial60.html"&gt;&lt;span style="color:#0000ff;"&gt;Understanding      and Using Firewalls&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial86.html"&gt;&lt;span style="color:#0000ff;"&gt;Safely      Connecting a Computer to the Internet&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial43.html"&gt;&lt;span style="color:#0000ff;"&gt;Using      Spybot - Search &amp;amp; Destroy to remove Spyware from Your Computer&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial48.html"&gt;&lt;span style="color:#0000ff;"&gt;Using      Ad-Aware SE to remove Spyware &amp;amp; Hijackers from Your Computer&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial49.html"&gt;&lt;span style="color:#0000ff;"&gt;Using      SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;   &lt;p align="left"&gt;&lt;strong&gt;&lt;a href="http://www.bleepingcomputer.com/tutorials/tutorial53.html"&gt;&lt;span style="color:#0000ff;"&gt;Using      IE-Spyad to enhance your privacy and Security&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    &lt;strong&gt;&lt;u&gt;&lt;br /&gt;   &lt;br /&gt;    &lt;/u&gt; &lt;u&gt;&lt;a name="conc"&gt;&lt;/a&gt;Conclusion&lt;/u&gt; &lt;/strong&gt;&lt;/p&gt;   &lt;/div&gt; &lt;div align="center"&gt;   &lt;p align="left"&gt;Now that you know how to remove a generic malware from your     computer, it should help you stay relatively clean from infection. Unfortunately     there are a lot of malware that makes it very difficult to remove and these     steps will not help you with those particular infections. In situations like     that where you need extra help, do not hesitate to ask for help in our &lt;a href="http://www.bleepingcomputer.com/forums/"&gt;computer help forums&lt;/a&gt;.     We also have a self-help section that contains detailed fixes on some of     the more common infections that may be able to help. This self-help section     can be found here:&lt;/p&gt;   &lt;p align="left"&gt;&lt;a href="http://www.bleepingcomputer.com/forums/forum55.html"&gt;&lt;strong&gt;&lt;span style="color:#0000ff;"&gt;Spyware &amp;amp; Malware   Self-Help and Reading Room&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>