THE DCS COMPUTER SCIENCE CLUB FORUM

This forum is designed for the Computer Science Students of Concepcion Holy Cross College with the idea of helping fellow student users with its problems, questions and optimize its usage to the fullest. enjoy sharing your knowledge and helping others.
 
HomePortalCalendarGalleryFAQSearchMemberlistUsergroupsRegisterLog in

Share | 
 

 TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!

View previous topic View next topic Go down 
AuthorMessage
DeeCee
Admin
avatar

Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

PostSubject: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Fri Jul 24, 2009 10:58 am

The secretive Trojan horse

It’s difficult to come up with a better definition for Trojan horse malware than Ed Skoudis and Lenny Zelter did in their book Malware: Fighting Malicious Code:

“A trojan horse is a program that appears to have some useful or benign purpose, but really masks some hidden malicious functionality.”

Trojan horse malware cloaks the destructive payload during installation and program execution, preventing anti-malware from recognizing the malcode. Some of the concealment techniques include: Renaming the malware to resemble files that are normally present. Corrupting installed anti-malware to not respond when malware is located. Using Polymorphic code to alter the malware’s signature faster than the defensive software can retrieve new signature files.

Vundo is a prime example; it creates popup advertising for rogue anti-spyware programs, degrades system performance, and interferes with Web browsing. Typically, a malware scanner installed on a LiveCD is required to detect and remove it.

Deadly? Bwahahaha.. Beware the Trojans are Coming! Salute!!!!


excerpt taken from TechRepublic article entitled "10 Faces of Computer Malware written by Michael Kassner

_________________
Back to top Go down
View user profile
Baldo
megabyte
avatar

Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Tue Jul 28, 2009 2:27 pm

sir?! pano naman ung worm?

_________________
-pls. read Signature Tips and Guidelines under General Rules and Regulation section

by: -px
Back to top Go down
View user profile http://csctrojans.uuuq.com
DeeCee
Admin
avatar

Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 9:18 pm

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.

_________________
Back to top Go down
View user profile
DeeCee
Admin
avatar

Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 9:23 pm

Ngayon.. what would be more dangerous?????????

A BLENDED THREAT - A Virus plus a worm plus a Trojan! Twisted Evil

A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload.

note:

We might not be considered as a blended threat but we are much more dangerous than before!

TROJAN WORMSSSSSSS! lol!

_________________
Back to top Go down
View user profile
Baldo
megabyte
avatar

Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 10:48 pm

hahahaha TROJAN WORM SIR!

_________________
-pls. read Signature Tips and Guidelines under General Rules and Regulation section

by: -px
Back to top Go down
View user profile http://csctrojans.uuuq.com
DeeCee
Admin
avatar

Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 10:58 pm

hehehe cheers

_________________
Back to top Go down
View user profile
gudboygo2hell_remake
megabyte
avatar

Posts : 201
Join date : 2009-07-20
Location : SETTE DESERT (56,96)

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 11:11 pm

alam ko panira lang yan ng PC at networked PC...

ahahahahahaha.......

lahat ng bagay my porpose...

ano kaya porpose nyan maliban sa manira.... Twisted Evil

_________________
-gudboygo2hell.remake@gmail.com


"Huwag mamapak ng asin pag gutom"
- Bertong Badtrip
Back to top Go down
View user profile
pxkos
megabyte
avatar

Posts : 149
Join date : 2009-07-05
Location : Philippines

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 11:25 pm

FRAUD

_________________
-pxkos
Back to top Go down
View user profile
gudboygo2hell_remake
megabyte
avatar

Posts : 201
Join date : 2009-07-20
Location : SETTE DESERT (56,96)

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 11:27 pm

FRAUD... meaning sir pxkos????

_________________
-gudboygo2hell.remake@gmail.com


"Huwag mamapak ng asin pag gutom"
- Bertong Badtrip
Back to top Go down
View user profile
Baldo
megabyte
avatar

Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Wed Jul 29, 2009 11:27 pm

hahahaha

_________________
-pls. read Signature Tips and Guidelines under General Rules and Regulation section

by: -px
Back to top Go down
View user profile http://csctrojans.uuuq.com
DeeCee
Admin
avatar

Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Thu Jul 30, 2009 9:24 am

gudboygo2hell_remake wrote:
alam ko panira lang yan ng PC at networked PC...

ahahahahahaha.......

lahat ng bagay my porpose...

ano kaya porpose nyan maliban sa manira.... Twisted Evil

"propose"? sinong ikakasal?

baka ibig mong sabihin purpose?

_________________
Back to top Go down
View user profile
Baldo
megabyte
avatar

Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   Thu Jul 30, 2009 12:39 pm

noel dapat pag may english ung pagtatagalog mo...


ung ENGLISH dapat ALL CAPS para maintindihan hahahaha
anyway sir diba may mga virus din na tinatawag na invader tska ung mga spider?

mga luma ata yun?

_________________
-pls. read Signature Tips and Guidelines under General Rules and Regulation section

by: -px
Back to top Go down
View user profile http://csctrojans.uuuq.com
Sponsored content




PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   

Back to top Go down
 
TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!
View previous topic View next topic Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
THE DCS COMPUTER SCIENCE CLUB FORUM :: GENERAL DISCUSSIONS :: ARCHIVES-
Jump to: