<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-344008834008071745</id><updated>2024-10-04T18:55:49.061-07:00</updated><category term="Viruses - Trojans - Worms"/><title type='text'>Problems..Problems..Problems...</title><subtitle type='html'>Its mostly on daily basis that one or another faces some sort of computer related problem. Sometimes its related to software installation, sometimes a virus/trojan/bug problem, hardware problems... The list is endless..&#xa;&#xa;&lt;br&gt;So this section wil help you to sort out all your computer problems..&lt;/br&gt; &#xa;&#xa;&lt;br&gt;&lt;b&gt;&lt;i&gt;P.S. Please provide your complete computer configuration to help you to get your problem sorted accurately!!!&lt;/i&gt;&lt;/b&gt;&lt;/br&gt;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://comp-probs.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/344008834008071745/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://comp-probs.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Raùl C</name><uri>http://www.blogger.com/profile/04053824902563126440</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>2</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-344008834008071745.post-2442863996499915473</id><published>2009-04-16T09:03:00.000-07:00</published><updated>2008-05-31T23:36:51.243-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Viruses - Trojans - Worms"/><title type='text'>Viruses, Trojans &amp; Worms</title><content type='html'>&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Someone Once Said:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&quot;&lt;strong&gt;&lt;em&gt;The Average Virus writer is above 14 years &amp;amp; below the age of 23 &amp;amp; the virus writers of some evil viruses suffer from social loneliness.&quot; Well, I do agree with the age thing, but not the social thing. Most virus creators do not create viruses with the aim of creating havoc or destroying computers. Just out of interest they create a virus &amp;amp; then send it to their friends, &amp;amp; like most email viruses of today, they spread like anything&lt;/em&gt;&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Viruses:&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;A virus is basically an executable file that is designed such that it is able to infect documents, has the ability to survive by replicating itself and is also able to avoid detection&lt;/em&gt;. Usually to avoid detection, a virus disguises itself as a legitimate program that a user would normally not suspect it to be a virus. Viruses are designed to corrupt or delete data on the hard-disk, i.e. is on the FAT.Viruses can be classified into the following categories:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Boot Sector Virus (MBR):&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;These viruses can be created without much difficulty &amp;amp; infect either the master boot record of the hard disk or floppy disk. The boot record program responsible for the booting of the operating system is replaced by the virus. The virus either copies the Master Boot Program to another part of the HDD or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in its drive.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;Common Boot Sector Viruses: Michelangelo, Stone, etc...&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How does a boot virus strike??&lt;/span&gt;&lt;br /&gt;&lt;/em&gt;&lt;br /&gt;• &lt;em&gt;The user copies an infected file to HDD or a FDD.&lt;br /&gt;• When the infected file is executed, the virus is loaded into the memory.&lt;br /&gt;• The virus copies the boot record program to another sector &amp;amp; puts a pointer to it on the boot sector.&lt;br /&gt;• The virus then makes a copy of itself in the disk boot sector.&lt;br /&gt;• The next time the computer boots from the disk the virus loads itself into the RAM or memory &amp;amp; starts infecting other files.MBR is the first sector of the HDD that contains the boot record &amp;amp; also the additional details like partition table, etc. If The MBR is corrupted, then OS will not be launched.&lt;br /&gt;&lt;br /&gt;&lt;/em&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;File or Program Viruses:&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Some program are viruses in disguise &amp;amp; when executed they load the virus in the memory along with the program &amp;amp; perform predefined steps &amp;amp; infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV &amp;amp; .SYS. Some file viruses just replicate while others destroy the program being used at that time. Such viruses start replicating as soon as they are loaded into the memory. As file viruses also destroy the program currently being used, after removing the virus or disinfecting the system, the program that got corrupted too has to be repaired or reinstalled.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;Some common File Viruses: Sunday, Cascade, etc&lt;/em&gt;&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Multipartite Viruses:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;These viruses are the hybrid variety; they can be best defined as the cross between both Boot Viruses &amp;amp; File Viruses. They not only infect files but also infect the boot sector. They are more destructive are more difficult to remove. First of all, they infect program files &amp;amp; when the infected program is launched or run, the multipartite viruses start infecting the boot sector too.Now, the interesting thing about these viruses is the fact that they do not stop, once the boot sector is infected. After the boot sector is infected, when the system is booted, they load into the memory &amp;amp; start infecting other program files.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;Some common examples: Invader, Flip, etc.&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Stealth Viruses:&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;These viruses are stealthy in nature &amp;amp; use various methods to hide themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection &amp;amp; hide from virus scanners. Some can also redirect the disk head to read another sector instead of the sector in which they reside. Some of these viruses like Whale conceal the increase in the length of the infected file &amp;amp; display the original length by reducing the size by the same amount as that of the increase, so as to avoid detection from the scanners.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Polymorphic Virus:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;They are the most difficult viruses to detect. They have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus, anti-viruses which look for specific virus codes are not able to detect such viruses.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How does a polymorphic virus strike?&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;a. The user copies an infected file to the disk.&lt;br /&gt;b. When the infected file is run, it loads the virus into the memory or the RAM.&lt;br /&gt;c. The new virus looks for a host &amp;amp; starts infecting other files on the disk.&lt;br /&gt;d. The virus makes copies of itself on the disk.&lt;br /&gt;e. The mutation engines on the new viruses generate a new unique encrypted code, which is developed due to a new unique algorithm.Thus it avoids being getting detected from checksum scanners.&lt;br /&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;What is a Viral Signature?&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Basically, the signature can be defined as the specific fingerprint of a particular virus. It is a string of bytes taken from the code of the virus. Antiviral softwares maintain a database of known virus signatures &amp;amp; look for a match each time they scan for viruses. As we see a new virus almost everyday, this database of virus signatures has to be updated regularly.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Macro Viruses:&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Macros allows a particular task that is performed by a user quite often to be repeated again &amp;amp; again by just clicking a play button. They are a set of automated instructions or tasks, which make work more efficient &amp;amp; fast for the users. Now beneath every MS Office Application, there is a VB Engine, which runs behind the scenes &amp;amp; can be used for advanced VB Coding.So macro viruses are viruses that consist of evil or viral macro VBA code that can create havoc in the computer it is executed. These viruses spread very quickly &amp;amp; some have random activation, as in their code can be included many of VB’s event handlers.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Macro viruses are not platform specific, i.e. a macro virus to infect a system, the document with the embedded evil macro has to open&lt;/em&gt;.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How Viruses infect the systems?&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;We discussed that stealth viruses &amp;amp; polymorphic viruses are difficult to detect… the question arises why? Let’s take the example of what most antivirus softwares do to detect a virus.Now, most antiviruses use a technique called as check-summing. You must know that an executable file cannot change (like a data file) unless the program is upgraded. So, the check-summer in the antivirus observes all the executable file size with the check-sum. So, as stealth virus reduces the size by the same amount as the increase, antiviruses, that use only check-summing methods are not able to detect them.&lt;br /&gt;&lt;br /&gt;Polymorphic viruses on their part have the ability to mutate &amp;amp; change their known viral signatures &amp;amp; hide from signature based antiviruses, which compare the signature of executable files to the database of known viral signatures &amp;amp; thus cannot detect new viruses.&lt;br /&gt;Thus check-summers can’t detect the stealth viruses whereas signature based virus scanners can’t detect the polymorphic viruses.&lt;br /&gt;&lt;br /&gt;In comes the heuristic scanner which does not scan for viruses using signature based techniques, but uses a smarter way. It scans the drive for typical viral codes &amp;amp; behavior. But such scanners have a downside too; sometimes they give false alarms &amp;amp; declare an uninfected file to be a virus.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Windows does not include an anti-virus program. However, it includes several features that make it difficult for viruses to infect your computer. It does this by using the following features&lt;/em&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;Blocking Direct Disk Access&lt;/em&gt;&lt;/strong&gt;:Write on ROM BIOS using the port INT25h &amp;amp; INT26h&lt;br /&gt;Recognizing MBR modifications:Deadlier Viruses try to modify or write to the MBR through INT13h chain.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;Identifying Unknown Device Drivers&lt;/em&gt;&lt;/strong&gt;:Windows maintains a list of all the real-mode device drivers that can be safely replaced with its own protected-mode drivers. Now, say, you add a new device driver, which uses the INT13h or INT21h chains. Then Windows checks to see if it is in the list of drivers that can be safely replaced. If not, then windows is programmed such that it would be able to access drives using only MS-DOS compatibility mode &amp;amp; not the normal protected mode.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Next : &lt;em&gt;&lt;a href=&quot;http://comp-probs.blogspot.com/2008/05/trojan-attacks.html&quot;&gt;Trojans&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://comp-probs.blogspot.com/feeds/2442863996499915473/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/344008834008071745/2442863996499915473' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/344008834008071745/posts/default/2442863996499915473'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/344008834008071745/posts/default/2442863996499915473'/><link rel='alternate' type='text/html' href='http://comp-probs.blogspot.com/2008/04/viruses-trojans-worms.html' title='Viruses, Trojans &amp; Worms'/><author><name>Raùl C</name><uri>http://www.blogger.com/profile/04053824902563126440</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-344008834008071745.post-6877851411160450902</id><published>2008-05-31T22:41:00.000-07:00</published><updated>2008-05-31T23:40:03.071-07:00</updated><title type='text'>Trojans</title><content type='html'>&lt;em&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Trojan Attacks: &lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;A Trojan is a malicious program that, when installed on a system, can be used for nefarious purposes by an attacker&lt;/em&gt;. Tools that allow remote administration or access to a vulnerable system, RATs, are called Trojans. That means after a system has been infected with a Trojan, an attacker can control nearly all the hardware &amp;amp; software on the system by remote. Today, Trojans are highly sophisticated &amp;amp; provide attackers with many different features for remote control. Once a Trojan has been introduced to a system, not only does all the data becomes vulnerable to threat but there is a good chance that the compromised system can be used to set up an attack on some third - party system.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Most Trojans consists of two parts &amp;amp; their operation is fairly simple to follow. Using them invokes very little technical skill. The two parts are:&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;The Server Part :&lt;br /&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;This part of the Trojan opens up a preset port on the target computer, which listens for any connections to be initiated by the attackers. Obviously, it has to be installed on the victim’s computer through trickery or disguise.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;&lt;em&gt;The Client Part :&lt;br /&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;This part gives the attacker complete control over the target system. It is installed on the attacker’s system to connect the server part of the Trojan, which has been installed on the victim’s system.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Trojans are very hazardous tools that enable an attacker to cause great damage to the target system. Some of the most common malicious attacks that can be carried out by the use of Trojans are: &lt;/p&gt;&lt;ol&gt;&lt;li&gt;Trojans are most often used for stealing sensitive intellectual property (IP) data from the target corporations &amp;amp; playing pranks on hapless individuals. By installing a Trojan on a system, the attackers are able to access, delete, upload or download files from it. IP theft is not only very expensive but it also can be used to damage the good name of a corporation. This is because installation of a Trojan gives access to nearly all hardware &amp;amp; software on the system, it becomes open to all kinds of pranks, some of which are:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;-&lt;/strong&gt; Increase or decrease the volume when you are listening to music.&lt;strong&gt;&lt;br /&gt;- &lt;/strong&gt;Moving the mouse towards the right when you are trying to move it to the left.&lt;br /&gt;&lt;strong&gt;-&lt;/strong&gt; When you type ABC, the attacker may type XYZ.&lt;br /&gt;&lt;strong&gt;-&lt;/strong&gt; Open and close your DVD drive tray at intervals.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Many Trojans have built in logging capabilities. Today, there are innumerable Trojans available that also work as key loggers that record all the keystrokes made by the victim on the infected system. This means that key loggers record all the keys (in a predefined log file) that have been pressed on the target system. Such Trojans are useful for the following operations:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;- &lt;/strong&gt;Accessing the contents of confidential emails &amp;amp; documents.&lt;br /&gt;&lt;strong&gt;- &lt;/strong&gt;Recording passwords, credit card numbers, account, IDs, etc.&lt;br /&gt;&lt;strong&gt;- &lt;/strong&gt;Pilfering software programming code.&lt;br /&gt;&lt;strong&gt;- &lt;/strong&gt;Finding out vital information regarding tender price &amp;amp; future business plans.&lt;br /&gt;&lt;br /&gt;Almost all Trojans have key logging facilities that can also record the name of the window where the particular data was typed. It is possible for an attacker to configure a Trojan so that automatically it will secretly email the log file to a preset email address, at regular intervals. It is even possible to configure an autodestruct feature into a Trojan, which will automatically get destroyed at a predefined data &amp;amp; time, leaving little evidence behind.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Nearly all Trojans can be used for malicious purposes. An attacker can easily run malicious commands on an infected system &amp;amp; delete important files or even re-format the entire HDD. Thus, Trojan can be used instead of viruses or worms.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;An attacker can program Trojans in such a way that they use resources of target system &amp;amp; network to carry out attacks on predefined victim systems. This means the attacker can put in a Trojan that has been programmed to attack the target system at a pre-fixed time &amp;amp; date. The attack is so planned that the victim believes that his own system or network has carried out the attack, which can involve many legal implications for the corporation. &lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;br /&gt;&lt;strong&gt;A Trojan attack can be executed by following the simple steps:&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;em&gt;The most difficult part of executing a Trojan attack is installing the server part of the Trojan victim system&lt;/em&gt;. Some of the more common ways to do this are:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;-&lt;/strong&gt; &lt;strong&gt;&lt;em&gt;Email&lt;/em&gt;&lt;/strong&gt;: Sending the Trojan server file as an attachment to email addressed to the victim. The problem with this method is that most often, the victim may not open the infected attachment.&lt;br /&gt;&lt;strong&gt;-&lt;/strong&gt; &lt;strong&gt;&lt;em&gt;Autorun CD-ROMs:&lt;/em&gt;&lt;/strong&gt; Burn the Trojan onto a CD-Rom and then use the Autorun facility of the CD to automatically execute the Trojan, the moment the CD is inserted into the tray.&lt;br /&gt;&lt;strong&gt;- &lt;em&gt;Instant Messengers: &lt;/em&gt;&lt;/strong&gt;It is also possible to send the Trojan server part disguised as a normal file over IRC or Instant Messenger. Attackers generally rename the Trojan so that it looks like a normal, legitimate file.&lt;br /&gt;&lt;strong&gt;-&lt;/strong&gt; &lt;strong&gt;&lt;em&gt;Physical Access:&lt;/em&gt;&lt;/strong&gt; Physical access to the victim system gives an opportunity to the attacker to install the Trojan server part manually.&lt;br /&gt;&lt;strong&gt;- &lt;/strong&gt;&lt;strong&gt;&lt;em&gt;EXE Binders:&lt;/em&gt;&lt;/strong&gt; These binders are devices that allow users to bind two .EXE files together into one file, in such a way that there is no effect of the working of either of the two files. So, the attacker binds or conceals the Trojan sever part inside a legitimate &lt;strong&gt;.EXE&lt;/strong&gt; file. The container file is usually chosen to be irresistible to the victim, such as greeting cards, small games, etc.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;The server part of the Trojan, once installed on the victim’s system, subsequently binds itself to a specific port on the victim system &amp;amp; listens for connections. Every Trojan listens for connections at a predefined specific port number, which is different for each Trojan.&lt;br /&gt;&lt;br /&gt;For example, the &lt;strong&gt;Netbus Trojan&lt;/strong&gt; listens for connections on the preset port &lt;strong&gt;12345.&lt;/strong&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Next, it is necessary for the attacker to locate the IP address of the target system on which server part of the Trojan has been installed. This step enables the attacker to connect to the infected system &amp;amp; control it by remote.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Then, the attacker uses the client part of the Trojan tool, which is installed on his system to connect to the server part of the Trojan installed on the victim system. The attacker connects to the preset port number that the Trojan uses. After establishing the connection, the victim’s system lies open to the attacker to inflict any kind of damage.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Most often, after the Trojan has been installed in the target system, the attackers will install a backdoor on it to ensure easy access whenever they want to enter. &lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Detection Of Trojans:&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Suspicious Open Ports:&lt;/strong&gt; By using nestat-n command.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Monitoring Outgoing Traffic:&lt;/strong&gt; What is more dangerous is that a Trojan covertly emails the logged passwords or recorded sensitive data to the attacker’s preset email address. Hence, by blocking all malicious outgoing emails, it is possible to guard against Trojans. The systems administrator should look for out illegal activity around the external mail servers, i.e. &lt;em&gt;SMTP or Port 25. (Telnet Feature)&lt;br /&gt;&lt;/em&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Detection Tools:&lt;/strong&gt; Lockdown 2000, Preview, etc…&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Start-up Files:&lt;/strong&gt; In Registry or start-up folder.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;System Files:&lt;/strong&gt; The two system file, i.e. &lt;em&gt;win.ini &amp;amp; system.ini&lt;/em&gt; have sections where all programs that are referenced get executed.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Batch Files:&lt;/strong&gt; These two batch files, autoexec.bat &amp;amp; winstart.bat, also get executed everytime Windows boots and can, therefore, contain either malicious commands or references to malicious programs.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;strong&gt;Counter-measures:&lt;br /&gt;&lt;br /&gt;&lt;/strong&gt;After a Trojan has been detected, the system administrator needs to remove it from the system. This can be done in the following manner:&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;There are many Trojan removal tools that can be downloaded &amp;amp; used to remove the most common Trojans. One should not only remove the Trojan, but also all the references to the Trojans from the start-up files.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Never accept or execute any file sent over email, chat, IRC, etc. However harmless or tempting the received file may seem, do not execute it. Also, do not experiment too much with Trojans because it is possible that the client part of the Trojan, installed on your system could turn out to be the server part, thus leaving your system open to attackers.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Because EXE allows an attacker to join two EXE files, the harmful Trojan files may be embedded inside a normal harmless .EXE file. This Trojan cannot be detected &amp;amp; only increases the file size by a certain number of bytes. Therefore, be careful &amp;amp; download software from the internet from the original developer’s website. Do not accept any .EXE files irrespective of whom you got it from.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;A more effective countermeasure against Trojan activity is installing firewall on your system to monitor &amp;amp; log all port traffic. This enables you to detect &amp;amp; trace Trojan-exploiting attempts. In addition, no matter how tempting, you should never execute any file sent to you over email, chat, IRC, &amp;amp; the like. Always download software from the Internet only from the original developer’s website.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Next: &lt;em&gt;Worms&lt;/em&gt;&lt;br /&gt;Back: &lt;em&gt;&lt;a href=&quot;http://comp-probs.blogspot.com/2008/04/viruses-trojans-worms.html&quot;&gt;Viruses&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://comp-probs.blogspot.com/feeds/6877851411160450902/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/344008834008071745/6877851411160450902' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/344008834008071745/posts/default/6877851411160450902'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/344008834008071745/posts/default/6877851411160450902'/><link rel='alternate' type='text/html' href='http://comp-probs.blogspot.com/2008/05/trojan-attacks.html' title='Trojans'/><author><name>Raùl C</name><uri>http://www.blogger.com/profile/04053824902563126440</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>