Posts Tagged ‘control’
Kaspersky Lab announced that a new botnet (an array of infected computers controlled by criminals), called TDL-4 is a serious attempt at making the botnet “indestructible”.
TDL-4 is the fourth generation of the botnet. The first TDL was born in 2008 and has been modified several times over the last years. Kaspersky announced that they have found that TDL-4 is colossal improvement over its predecessors.
On the SecureListblog experts wrote that:
“The malware writers extended the program functionality, changed the algorithm used to encrypt the communication protocol between bots and the botnet command and control servers, and attempted to ensure they had access to infected computers even in cases where the botnet control centers are shut down. The owners of TDL are essentially trying to create an ‘indestructible’ botnet that is protected against attacks, competitors, and antivirus companies.”
According to Kaspersky Lab, an integral part of the TDL-4 upgrades is the improved encryption algorithm for the communications between the controlled computers and the botnet’s command.
To protect itself against anti-malware software, TDL-4 infects the master boot record, allowing it to run before the OS. What is even more interesting is that TDL-4 deletes other malicious files, thus preventing the AV software from alerting the user of the presence of any problems.
TDL-4 downloads fake AV programs, adware and a spambot known as Pushdo.
The biggest feature of TDL-4 is the fact that it uses the Kad network. Now botnets controlled through P2P are not something new, but most of the time they use protocol connections created by the cybercriminals. However, using a public P2P network to control the bontet is a whole different approach. Basically the botnet issues a command to create a new Kad P2P whose clients are only infected computers.
However, the most interesting part of TDL-4 is not its colossal improvement in comparison to its predecessors, it’s the panic that it caused. In the article on SecureList, the main accent was on the fact that:
“The owners of TDL are essentially trying to create an ‘indestructible’ botnet that is protected against attacks, competitors, and antivirus companies.”
However, most reviewers either did not read the entire article (big mistake) or misinterpreted that particular sentence. The internet was flooded with articles which stated that the malware was indestructible and stuff like that, which is not true. TDL-4 is destructible. In fact, Kaspersky’s TDSS Killer can kill it quite easy.
In conclusion, we must state that we find it quite disturbing that the numerous recent attacks performed by various hacker groups have brought up so many insecurities not only among ordinary computer users, but among high-rated and respected media.
In Bash you have three constructs for loops – for, while and until.
The while construct basically executes a piece of code while a given expression (called control expression) evaluates to true. The while loop stops when the control expression evaluates to false (or a break is executed)
The for construct is a little different from what we have seen in other languages. It can be thought that it iterates the words in a string.
The until loop resembles the while loop. The difference is that the code in the loop is executed until the control expression evaluates to true (while it evaluates to false). Naturally the until construct resembles the while construct.
Let’s start with an example of the while construct:
Read the rest of this entry »
One can have many reasons to block a website. The most notable without any doubt is parental control. Although this can be done using the Windows hosts file, Opera makes it even easier by adding it as a feature.
First, open Opera. Click on the Opera Menu button (the button with the Opera logo), select Settings and click Preferences:
Read the rest of this entry »
Dr. Kaoru Ishikawa, a Japanese quality control statistician, invented the Fishbone Diagram.
The fishbone diagram is an analysis tool that provides a systematic way of looking at effects and the causes that create or contribute to those effects.
The design of the diagram looks much like the skeleton of a fish. Therefore, it is often referred to as the fishbone diagram. Read the rest of this entry »
In this tutorial we will talk about one of the great controls that Windows Operating System offers for its users – the control over the way files are displayed in Windows Explorer. In General the guide is for showing how to manage the display way of the known files types in Explorer.
In my experience I have used to recognize file types based on the icon i see in Windows Explorer. Recently however i had to deal with creating a web gallery for a friend. It turned out that the web gallery software supported only limited number of graphical file types. You may ask why the web gallery did so and the answer is that some picture formats were licensed. Anyway that was not something that will stop me from using the web gallery as I know several ways to convert images from on format to another. Eventually the problem was that all pictures I had were with the same icon in Windows Explorer. Unfortunately I was not seeing the extension of the filename in Windows Explorer. I thought myself \"There has to be a way to see the extension of the filename!. Here is how to do that under Windows XP.
Open My computer and go to Tools-> Folder Options as shown on the screen shot below Read the rest of this entry »
Windows have ability to give access to an remote computer to take control over the Windows server or just to let remote user to work remotely on the server.
When the remote user opens this kind remote connection we call on this – session. If the user forget for his opened session and even he leave his computer, the server have to keep this session which will cost more resources to be unavailable. Also this opened session on the remote computer is potential risk for the security, because someone unhappy person can seat on the computer and take some control over it with all possible dangerous.
If you enable Remote Desktop feature of your Windows you can apply some settings to tune exactly this security options on the server.
In this tutorial I will show you How to make Auto Disconnect and Auto Logoff Idle Sessions on Remote Desktop. Read the rest of this entry »
In this tutorial I will show you how to configure Pidgin to use a proxy server. The tutorial is very basic and will guide you in three simple steps how to accomplish our goal. The operating system used is ArchLinux and we have installed Pidgin 2.6.5 (libpurple 2.6.5)
The prerequisites for this tutorial are:
1. Linux distribution with Gnome 2.x
2. Pidgin installed and functional
3. A proxy server
Start Pidigin and go the "Tools" menu. Click on Preferences Read the rest of this entry »
In this tutorial I will show you how to set you Google Chrome browser to use a proxy server. The tutorial is very basic and will guide you in four simple steps how to set the proxy. The operating system used is Windows XP and we have installed 18.104.22.168 version of Google Chrome browser.
The prerequisites for this tutorial are:
1. Windows XP
2. google chrome installed and functional
3. that you have the proxy settings and confirmed them working
Start Google Chrome browser and go the "Customize and control Google Chrome" menu. Click on Options Read the rest of this entry »