Posts

Showing posts from January, 2025

What is the KLEZ virus?

 Klez is a worm that spreads via the Internet by attaching itself to mass-mailed emails using SMTP to pass itself along. The worm virus itself is a Windows PE EXE file of about 65Kb in size and is written in Microsoft Visual C++. The subject line of the email carrying the virus payload is randomly selected from a list of possible choices. The email message “From:” field will contain either one of the addresses found in a search of address books and files on the computer or an address taken from a list inside the virus body. When the virus was released, millions of email messages results and were sent around the world. This caused some messaging servers to fail and cripple internal company communications systems. Some claims were made that this virus caused billions of dollars of administrator’s and user’s time in dealing with all the errant messages, recovering failed systems and opportunities lost as a result of the failed communications. Those using GMS Anti-Virus were quickly pr...

What is Code Red?

code red computer virus (WORM) The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh, the Code Red worm exploited a vulnerability discovered by Riley Hassell. They named it "Code Red" because Code Red Mountain Dew was what they were drinking at the time. Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000.  code red screen CodeRed is a worm that caused possible billions of dollars of damage in the summer of 2001. It contains the text string "Hacked by Chinese!", which is displayed on web pages that the worm defaces. It is also one of the few worms able to run entirely in memory, leaving no files on the hard drive or any other permanent storage (although some variants do). Related Articles PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense SectorLital Asher-Dotan Lital ...

ILOVEYOU virus

 What is the ILOVEYOU virus? The ILOVEYOU virus comes in an email with "ILOVEYOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book. Perhaps more seriously, it results in the loss of every JPEG, MP3 and certain other files on all recipients' hard disks. Since Microsoft Outlook is widely installed as the default email management application in corporate networks worldwide, the ILOVEYOU virus can spread rapidly within a corporation. In fact, this is exactly what happened on May 4, 2000. In just about 10 days, ILOVEYOU reached an estimated 45 million users and caused about $10 billion in damages. It spread so quickly that many major enterprises like the Ford Motor Company, AT&T and Microsoft, as well as government organizations like the Pentagon, CIA, U.S. Army, and parliaments in Denmark and the U.K., had to completely shut down their email services as ...

Top 10 most dangerous computer viruses of all time

Malware is one of the most serious threats to businesses, and there are hundreds of thousands of these dangerous programs being detected every day. Not all malware strains behave the same way, either. There are worms designed to self-replicate and overwhelm networks as well as ransomware that can completely shut down a system and hold your data hostage. If you’re not careful, your business can suffer massive losses from a single malware attack. But just how much damage can malware truly cause? A timeline of the most devastating malware in history To help you understand the impact of malware, we’ve compiled a list of the 10 most dangerous computer malware of all time. 1. Melissa The Melissa virus was first spotted in March 1999, spreading to the public via internet forums and emails offering free login credentials to adult websites. The virus was delivered through a Microsoft Word document with an embedded macro that, when opened, would run a malicious code. If macros were enabled, Meli...

9 Common Types of Computer Viruses

  No one enjoys being sick. When you’re suffering from a cold, there’s no way you can operate at 100% It might sound silly, but your computer can catch a cold just like you. OK, maybe not exactly like you—you won’t give your computer a virus by sneezing on your keyboard, but there are similarities. Computer viruses have the “virus” name because they resemble illnesses in the way they infect a system. Doctors can usually diagnose a virus based on symptoms exhibited by the body. IT professionals can do the same with computers. Typical signs of computer virus infections include: Ongoing crashes and blue screen errors Slow performance Missing files Low storage Unexpected behavior Constant browser pop-ups Unidentifiable programs Increased network activity Disabled security softwarefolders, and programs. 3. Direct Action This virus targets a specific file type, most commonly executable files (.exe), by replicating and infecting files. Due to its targeted nature, this virus type is one of...

Why do People Create Computer Viruses

 passwords or credit card numbers and send it back to the virus creator. These types of viruses often use keylogging as a method of stealing information where it maintains a record of everything that is typed into the computer such as emails, passwords, home banking data, instant messenger chats etc.. The above mentioned methods also allows an attacker to gather an incredible amount of data about a person which can be used for identity theft purposes. To Prove a Point, To Prove it Can Be Done, To Prove Ones Skill or For Revenge Purposes A perfect example of this type of virus was the famous MS.Blaster virus (aka Lovesan) which infected hundreds of thousands of computers back in August 2003.This virus would cause the system to restart after 60 seconds and had two hidden messages written in its code: One was “I just want to say LOVE YOU SAN!!” which is why the virus is sometimes called Lovesan, and the other message was “billy gates why do you make this possible ? Stop making money a...

Melissa (computer virus

The Melissa virus is a mass-mailing macro virus released on or around March 26, 1999. It targets Microsoft Word and Outlook-based systems and created considerable network traffic. The virus infects computers via email; the email is titled "Important Message From," followed by the current username. Upon clicking the message, the body reads, "Here's that document you asked for. Don't show anyone else ;)." Attached is a Word document titled "list.doc," containing a list of pornographic sites and accompanying logins for each. It then mass-mails itself to the first fifty people in the user's contact list and disables multiple safeguard features on Microsoft Word and Microsoft Outlook. 

Computer Virus | List, Types & Examples

 A computer virus is a type of malicious software, or malware, that infects computers and corrupts their data and software. They are always the result of human activity. Because they are designed to replicate themselves by infecting other programs on a computer, they are termed "viruses". Computer viruses are designed to cause system disruption, significant operational issues, and data loss and leakage. They typically attach to an executable host file, resulting in the execution of their viral code when a file is opened. The code then spreads via networks, drives, file-sharing programs, or infected email attachments from the document or software to which it is attached. The way a computer virus performs is determined by the way it is coded. It could be as simple as a harmless prank, or it could be sophisticated, resulting in criminal activity and fraud. While some viruses are limited to a single device, others spread across a network environment in search of other vulnerable ...

Computer

  computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (computation). Modern digital electronic computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. The term computer system may refer to a nominally complete computer that includes the hardware, operating system, software, and peripheral equipment needed and used for full operation; or to a group of computers that are linked and function together, such as a computer network or computer cluster. Man replacing one vacuum tube out of hundreds in early computer Computer room with multiple computer cabinets and operating panel Smartphone with rainbow-like display held in a hand Black desktop computer with monitor on top and keyboard in front Purple video game console with attached controller Rows of large, dark computer cabinets in warehouse-like room Computers and computing devices from differ...

What are cookie

 Everyone has seen the website banners that ask you if you’ll allow cookies on your browser or not. But what exactly does this mean and what are these cookies? Well, to begin with, they are essential to the modern internet experience. A necessary part of browsing the web, cookies help web developers give you a more personal and convenient website visit. In short, cookies let websites remember you, your logins, shopping carts and more. But they can also be a treasure trove of private info and a serious vulnerability to your privacy. Guarding your privacy online can be overwhelming. Fortunately, even a basic understanding of cookies can help you keep unwanted eyes off your internet activity. Whilst most cookies are perfectly safe, some can be used to track you without your consent by cybercriminals. In this article, we will guide you through how cookies work and how you can stay safe online. What Are Internet Cookies? Cookies (often known as internet cookies) are text files with sma...

Why Do I Need to Back up My Computer

 lee harvey computer repair Main Menu Blog Why is it important to backup data on a computer? Why is it important to backup data on a computer Table of Contents  Everyone with a computer stores data. It might be your family photos, your accounts, sensitive data, important documents, maybe even the opening chapter of the novel you have been “writing ” for the last 10 years. Now, ask yourself what would happen if, through human errors or natural disasters, you had a system crash and all those important files were lost? It’s important that you always backup data on a computer in the event of disasters such as system crashes, hard drive failures, viruses or theft occurring. Data backups not only provide you with a secure copy of your important information, but can save you money, time and stress in the long run. Sometimes it is possible, with specialist programs, to retrieve some of that data but it is a complicated and often expensive operation. Common causes of computer data loss...

How to Fix a Black Screen on Your Computer: A Comprehensive Guide

 Laptop with a Black ScreenShare How to Fix a Black Screen on Your Computer: A Comprehensive Guide on FacebookShare How to Fix a Black Screen on Your Computer: A Comprehensive Guide on LinkedInShare How to Fix a Black Screen on Your Computer: A Comprehensive Guide on XShare How to Fix a Black Screen on Your Computer: A Comprehensive Guide on RedditShare How to Fix a Black Screen on Your Computer: A Comprehensive Guide via EmailCopy the link to share How to Fix a Black Screen on Your Computer: A Comprehensive Guide How to Fix a Black Screen on Your Computer: A Comprehensive Guide September 9, 2024 Reading time: 6 minutes In today’s digital age, computers are an integral part of our daily lives. Whether you’re using a custom-built PC or a personal laptop, these devices serve as our gateway to online shopping, virtual classrooms, remote work, and much more. However, like any technology, computers can encounter issues, and one of the most frustrating problems is the dreaded “black scre...

What to do when your computer won't turn off

 How to fix a PC that won't turn on There are many reasons why your computer won't turn on—some basic, some complex. Here are some methods to try to resolve the problem. Try a different power source If your computer won't boot up, the first thing to do is make sure your PC is plugged in and the power switch is turned on. If it is and it still won't start, try plugging your computer into a different outlet. If you're using a power strip or surge protector, plug it directly into the wall instead. And if your outlet is connected to a light switch, make sure that switch is on. Check your monitor connection If you hear your computer starting but don't see anything on your monitor, it could be an issue with your display. Make sure your monitor is plugged in, receiving power, and turned on. Then check that the cord connecting your PC and monitor is firmly attached, not damaged, and plugged into the correct input. If that doesn't work, try connecting your computer t...

How to Recover Deleted Files on Windows and MacOS

  hands typing on a laptop keyboard looking up documents How to Recover Deleted Files on Windows and MacOS Feb 2023 Personal Storage SSD Have you ever wanted to show your family some important files, like images or videos, on your computer and not be able to find them? Heartbreak! The sad truth is the accidental deletion of files happens more regularly than you would think. With some luck, you may be able to recover whatever you have lost with these tips! How to Recover Deleted Files on Windows 1. Check the Recycle Bin When files have been deleted or even lost, the Recycle Bin is always the number one place to check. On almost all computer systems, once a file has been deleted this is the place it will end up next. With a quick search in the Bin, your wayward file can easily be selected and restored to its original folder as long as you have not emptied it. You can set up a confirmation dialog so a confirmation pop-up will appear on your screen every time you go to delete a file. T...