THE DCS COMPUTER SCIENCE CLUB FORUM
Would you like to react to this message? Create an account in a few clicks or log in to continue.

THE DCS COMPUTER SCIENCE CLUB FORUM

This forum is designed for the Computer Science Students of Concepcion Holy Cross College with the idea of helping fellow student users with its problems, questions and optimize its usage to the fullest. enjoy sharing your knowledge and helping others.
 
HomePortalGalleryLatest imagesSearchRegisterLog in

 

 TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!

Go down 
4 posters
AuthorMessage
DeeCee
Admin
DeeCee


Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyFri Jul 24, 2009 10:58 am

The secretive Trojan horse

It’s difficult to come up with a better definition for Trojan horse malware than Ed Skoudis and Lenny Zelter did in their book Malware: Fighting Malicious Code:

“A trojan horse is a program that appears to have some useful or benign purpose, but really masks some hidden malicious functionality.”

Trojan horse malware cloaks the destructive payload during installation and program execution, preventing anti-malware from recognizing the malcode. Some of the concealment techniques include: Renaming the malware to resemble files that are normally present. Corrupting installed anti-malware to not respond when malware is located. Using Polymorphic code to alter the malware’s signature faster than the defensive software can retrieve new signature files.

Vundo is a prime example; it creates popup advertising for rogue anti-spyware programs, degrades system performance, and interferes with Web browsing. Typically, a malware scanner installed on a LiveCD is required to detect and remove it.

Deadly? Bwahahaha.. Beware the Trojans are Coming! Salute!!!!


excerpt taken from TechRepublic article entitled "10 Faces of Computer Malware written by Michael Kassner
Back to top Go down
Baldo
megabyte
Baldo


Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyTue Jul 28, 2009 2:27 pm

sir?! pano naman ung worm?
Back to top Go down
http://csctrojans.uuuq.com
DeeCee
Admin
DeeCee


Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 9:18 pm

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Back to top Go down
DeeCee
Admin
DeeCee


Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 9:23 pm

Ngayon.. what would be more dangerous?????????

A BLENDED THREAT - A Virus plus a worm plus a Trojan! Twisted Evil

A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload.

note:

We might not be considered as a blended threat but we are much more dangerous than before!

TROJAN WORMSSSSSSS! lol!
Back to top Go down
Baldo
megabyte
Baldo


Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 10:48 pm

hahahaha TROJAN WORM SIR!
Back to top Go down
http://csctrojans.uuuq.com
DeeCee
Admin
DeeCee


Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 10:58 pm

hehehe cheers
Back to top Go down
gudboygo2hell_remake
megabyte
gudboygo2hell_remake


Posts : 201
Join date : 2009-07-20
Location : SETTE DESERT (56,96)

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 11:11 pm

alam ko panira lang yan ng PC at networked PC...

ahahahahahaha.......

lahat ng bagay my porpose...

ano kaya porpose nyan maliban sa manira.... Twisted Evil
Back to top Go down
pxkos
megabyte
pxkos


Posts : 149
Join date : 2009-07-05
Location : Philippines

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 11:25 pm

FRAUD
Back to top Go down
gudboygo2hell_remake
megabyte
gudboygo2hell_remake


Posts : 201
Join date : 2009-07-20
Location : SETTE DESERT (56,96)

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 11:27 pm

FRAUD... meaning sir pxkos????
Back to top Go down
Baldo
megabyte
Baldo


Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyWed Jul 29, 2009 11:27 pm

hahahaha
Back to top Go down
http://csctrojans.uuuq.com
DeeCee
Admin
DeeCee


Posts : 100
Join date : 2009-07-10
Location : Sa Tabi Tabi

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyThu Jul 30, 2009 9:24 am

gudboygo2hell_remake wrote:
alam ko panira lang yan ng PC at networked PC...

ahahahahahaha.......

lahat ng bagay my porpose...

ano kaya porpose nyan maliban sa manira.... Twisted Evil

"propose"? sinong ikakasal?

baka ibig mong sabihin purpose?
Back to top Go down
Baldo
megabyte
Baldo


Posts : 137
Join date : 2009-07-06
Location : HUWAAT!!!

TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! EmptyThu Jul 30, 2009 12:39 pm

noel dapat pag may english ung pagtatagalog mo...


ung ENGLISH dapat ALL CAPS para maintindihan hahahaha
anyway sir diba may mga virus din na tinatawag na invader tska ung mga spider?

mga luma ata yun?
Back to top Go down
http://csctrojans.uuuq.com
Sponsored content





TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty
PostSubject: Re: TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!   TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!! Empty

Back to top Go down
 
TROoooooooo JaaaaaaaaaNNNsssssss!!!!!!!!!
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
THE DCS COMPUTER SCIENCE CLUB FORUM :: GENERAL DISCUSSIONS :: ARCHIVES-
Jump to: