Most Deadly Computer Viruses of All Times

Wednesday, April 22, 2009

(8) Comments

Every Computer user has faced a computer virus attack in his/her lifetime. That’s why the first thing we do after installing an operating system is to install an Antivirus Program on our computer. Don’t we? So in this article we are not going to discuss about all antivirus programs and which one should you use. Instead of that,I am going to write of the most deadly computer virus of all times in the history of Computer Viruses.

Now Let’s Start our Journey of Viruses:-

Melissa:- The Virus created in 1999 by David L. Smith based on Microsoft Word macro. This Virus tempts its recipients to open a document with an e-mail message like "Here is that document you asked for" Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.

ILOVEYOU:- The virus with a sweet name but of nasty nature created by Onel de Guzman of the Philippines . This virus spread in the same way like Melissa .It copied itself several times and hid the copies in several folders, added new files to the registry keys, replaced several different kinds of files with copies of itself, sent itself through Internet Relay Chat clients as well as e-mail,it downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address. According to studies , It is assumed that this virus had caused damage of $10 billion.

The Klez Virus:- This Virus established new standards in the virus technology due to its advanced features . The virus infect a computer through an e-mail message and replicates itself and then sent itself to people in victim address book .Moreover it can also use a contact name from the victim address book in From field to send itself .so as to tempt recipient to open that email. This is called email spoofing.

Code Red:- This virus emerged in 2001 exploits the vulnerabilities of operating system mainly found in Windows 2000 and Windows NT . The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. This virus creates a backdoor in computer so that a remote user can access the infected computer and also can use it to commit crimes.

Nimda:- Nimda virus when spelled backwards become admin emerged in 2001 spread rapidly over the internet at that time . This virus create a backdoor and give the attacker same level of functions of the account which is currently logged in . If the victim is logged in account with limited functions, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.

Slammer Virus:- Slammer Virus also Known as Sapphire Virus emerged in 2003 was created to attack mainly web servers . It used a SQL program to attack several important systems like The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. The estimated damage caused by this virus was of $1 billion. It mainly effected South Korea By cutting it off internet

MyDoom Virus:- MyDoom Virus like another worm searched victim computers for e-mail addresses as part of its replication process. It also use search engine to found emails and used the email addresses found in the search results. Search engines like Google began to receive millions of search requests from corrupted computers. These attacks slowed down search engine services and even caused some to crash.

Leap-A/Oompa-A Virus:- This Virus is special because it’s the Mac Virus instead of being a PC Virus and show that even a Mac computer could be infected with a virus . It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.

This is a guest post by Gagandeep Singh who is working for a Desktop and Laptop Computer Repair Company in Clermont, Florida. South Lake Computers has the most personalized computer repair & service experience, while avoiding the confusing ‘techno-babble’ you may hear elsewhere.
Share and Enjoy!
Digg Stumble This Del.icio.us Furl Twitthis Reddit Technorati Yahoo Buzz

Software Review: EASEUS Partition Master v 3.5

Tuesday, April 14, 2009

(3) Comments

Application Name: EASEUS Partition Master

Type: Free for personal use

Editions: Home/Professional/Server/Unlimited

Price:
Home edition: Free
Professional: 31.96 $
Server: 149 $
Unlimited: 399.20 $ (Unlimited licenses)

Website: Partition tool

Version: 3.5 (Latest,as on 14.04.2009)

Size:
Home edition: 8.80 MB
Professional edition: 39.60 MB
Server edition: 39.60 MB

Compatibility:

Home edition: Windows 2000/XP/Vista (32 bit only)
Professional edition: Windows 2000/XP/Vista (32 bit and 64 bit)

To find whether your computer is 32 bit or 64 bit,go to Run --> dxdiag

If the Operating System has 'x64',then its 64 bit.If nothing is mentioned,it is 32 bit.Another alternative way is by right clicking 'My Computer' and going to 'Properties'.

Description and Advantages:

This is a great software which is free for personal use and is one of the best partition tools.
  1. Create/delete/format partitions
  2. Resize/move partitions(without losing data*)
  3. Convert FAT to NTFS
  4. Check any partition for errors
  5. Label partitions
  6. Copy partitions/copy disk
  7. Explore partitions(only for FAT and NTFS)
  8. Change drive letter
  9. Works with hardware RAID
  10. Supported up to 1.5TB
  11. Preview before applying
  12. Hide/Unhide partitions
This software does everything neatly as it says.

*But,it is highly recommended to have a back up.

Disadvantages:

No big disadvantages.It's compatible only with Windows and be careful while partitioning systems which has two OS.Once you have deleted a partition,you can't undelete it,so use this feature with caution.

Screen shots:

In the first screen shot,I am trying to convert a FAT32 to NTFS.


The 'preview' of the above operation can be seen below.This operation is implemented only when I click 'Apply' on the bottom left corner.


Author's rating: 9/10

Download link:

Download

The home edition is completely free for personal use without any other limitations.The professional edition supports 64 bit,and also has the ability to create bootable disks.A comparison of all the editions can be found here.

You can avail for a 20% discount using the coupon code CHEN-K0QO-SOFT

Overall,a recommended software.
Share and Enjoy!
Digg Stumble This Del.icio.us Furl Twitthis Reddit Technorati Yahoo Buzz

Efficient Back Link checker

Saturday, April 04, 2009

(5) Comments

The next PR update hit two days back on April 2nd.Some of my friends have got better PRs this time,while some have maintained it.I got my PR 3 back,which I had lost during my shift to my own domain name last January.So,I can say the transition from 'dot blogspot' to 'dot com' was smooth and the time period was about 2 months.Some also complained that the number of back links was less than they had earlier.

For those who aren't aware,you can basically check your back links by google searching link:www.yoursite.com

The back links that are displayed above are not the exact and only back links that your website has.Not all back links are displayed,and only some of them are displayed and there is no need to panic.The reason some of the back links aren't displayed may also be due do their low PR juice contribution.

Also,the google search engine position doesn't depend on your 'static' PR alone.Google keeps updating your PR almost daily and stores it,but the updated PR is not shown in google toolbar/PR checking websites.Google uses a lot of other complex datas to determine your Google SERP(Search Engine Ranking Position).The important thing which will never change is 'Content is King'

Another useful website to check back links for your site is Check Back links.It displays both the back links from google and yahoo.Added to it,it also displays the PR,anchor text,and whether its 'do follow' or 'no follow',and its completely FREE.

So,what other blog/SEO tools you use?What is your PR after the update?
Share and Enjoy!
Digg Stumble This Del.icio.us Furl Twitthis Reddit Technorati Yahoo Buzz