Thursday, July 16, 2009

Hacking


Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)

Sunday, July 12, 2009

Trojan Horses

A Trojan horse is not a virus. It is a program that you run because you think it will serve a useful purpose such as a game or provides entertainment. Like a "Trojan horse" it serves not as it claims, but to damage files or perhaps plants a virus into your computer. A Trojan horse does not replicate or spread like a virus. Most virus checking programs detect Trojan horses.

Protecting yourself against computer worms

Computer worms which spread through vulnerabilities in network services can best be protected against by keeping up-to-date in installing patches provided by operating system and application vendors. This includes worms like SQL Slammer and Blaster.
Computer worms which spread like trojan horses can best be defended against by not opening attachments in your e-mail. These infected attachments are not limited to .EXE files. Microsoft Word and Excel files can contain macros which spread infection.
Some people would say that the best way to protect yourself against computer worms is not to run Microsoft software.

What is a Computer Worm?


A computer worm is a program which copies itself across a network.A computer worm differs from a Computer Virus in that a computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.

Well known examples of the computer worm

The original computer worm was (perhaps accidentally) unleashed on the Internet by Robert Tappan Morris in 1988. The Internet Worm used send mail, fingered, and rsh/rexec to spread itself across the Internet.

The SQL Slammer Worm of 2003 used vulnerability in Ms SQL Server 2000 to spread itself across the Internet. The Blaster Worm, also of 2003, used vulnerability in Microsoft DCOM RPC to spread itself.

The Melissa worm of 1999, the Sobig worms of 2003 and the Mydoom worm of 2004 all spread through e-mail. These worms shared some features of a Trojan horse, in that they spread by enticing a user to open an infected e-mail attachment.

Mydoom also attempted to spread itself through the peer-to-peer file sharing application KaZaA. The Mydoom worms attempted a Denial of Service (DoS) attack against SCO and Microsoft.


What is a Boot Sector Virus?

A boot sector virus is a computer virus which infects the boot sector on hard disks, floppy disks, and theoretically also other bootable media such as CD's and DVD's.

A boot sector virus does not need to be able to successfully boot the victims computer to infect it. Because of this, even non-bootable media can spread a boot sector virus.

Once the infected computer successfully boots, the boot sector virus stays in memory and infects floppies and other media when they are written to by the infected computer.

Boot sector viruses have become increasingly less common as floppy disks have become rarer.

What is the History of Computer Viruses?



The first Computer Virus to openly make it to the public was a program called "Elk Cloner". It was created by Rich Skrenta, a computer programmer who was in high school when this virs was created in 1982. Elk Cloner attached itself to the Apple DOS 3.3 Operating System and was later spreader by a floppy disk. When the virus was created, it was intentionally made as a joke by the high school student, who inputted the virus into a game in which the virus was set off after the 50th time of using the game. When the virus was set off, a blank screen appeared and displayed a poem about the virus. The computer then became infected.
The first PC virus was a boot sector virus named (c)Brain. Two brothers, Basit and Amjad Farooq Alvi, whose only intentions were to protect their work from piracy and to target copyright infringers, programmed it. However, according to analysts, the Ashar virus, which was a variant of Brain, possibly was created before the (c)Brain.
Before network computer expansion, most viruses were spreaded through removable media, such as floppy disks. These viruses infected programs stored in the disks, while others were inputted into the disk boot sectors, and activated when the user booted the computer from the disk. The traditional and typical virus characteristics common to us now emerged in the 1980s, where there was an increase of BBS (Bulletin Board System, where a computer system runs software that allows users to dial into the system over a phone line), modem use, and software sharing. BBS contributed greatly to the rapid spread of Trojan horses, and viruses were originally written to target popular software traders. Traders who were in a hurry to retrieve the latest software were usually the easiest prey to infect viruses with.
In the mid 1990s, macro viruses came into the scene and became common quickly. Ironically, some versions of Microsoft Word allowed the macro virus to multiply and gain additional blank lines. This can cause a misleading detection, as others would see the new strands of the macro virus as a new virus.
Viruses then began spreading via instant messaging. Typically, it sends a web address to everybody in the contact list, and anyone who so much as click on the link would be prone of an immediate infection. However, there are thousands and thousands of viruses operating online and new viruses are discovered every single day.

Saturday, July 11, 2009

What are the Types of Computer Viruses?

Computer viruses are generally defined as a program inputted into a computer that allows replication of the program installed. As it replicates, the program intentionally infects the computer, typically without even the user knowing about the damage being done. A virus, unlike worms or Trojan horses, needs an aid to transfer them to computers. Viruses usually take a large amount of computer memory, resulting into system crashes. Viruses are categorized to several parts based on its features.

Macro Viruses
A macro virus, often scripted into common application programs such as Word or Excel, is spread by infecting documents. Macro viruses are known to be platform-independent since the virus itself are written in language of the application and not the Operating System. When the application is running, this allows the macro virus to spread amongst the operating systems. There are thousands of macro viruses that exists, and each are considered major threats. Examples of these viruses are: Melissa.A and Bablas. pc.


Network Viruses
Network viruses rapidly spreads through a Local Network Area (LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself. The most dangerous network viruses are Nimda and SQLSlammer.

Logic Bombs
The logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an Internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.

Companion Viruses

Companion viruses takes advantage of MS-DOS. This virus creates a new file with typically the .COM extensions, but sometimes the .EXD extension as well. When a user manually types in a program they desire without adding .EXE or any other specific extention, DOS will make the assumption that the user want the file with the extension that comes first in alphabetical order, and thus running the virus. The companion virus is rare among Windows XP computers as this particular operating system does not use the MS-DOS.

Boot Sector Viruses

Boot sector viruses generally hide in the boot sector, either in the bootable disk or the hard driv

e. Unlike most viruses, this virus does not harm the files in the hard disk, but harm the hard di sk itself. Boot sector viruses are uncommon at this day and age because these v iruses are spread rapidly by floppy disks and not on CD-ROMs.

Multipartite Viruses

Multipartite viruses are spreaded through infected media and usually hides in the memory. Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive and later across the computer system.

How do Viruses Spread?

Viruses begin to work and spread when you start up the program or application of which the virus is present. For example, a word processing program that contains a virus will place the virus in memory every time the word processing program is run.
Once in memory, one of a number of things can happen. The virus may be programmed to attach to other applications, disks or folders. It may infect a network if given the opportunity.

Viruses behave in different ways. Some viruses stay active only when the application it is part of is running. Turn the computer off and the virus is inactive. Other viruses will operate every time you turn on your computer after infecting a system file or network.
How to Prevent a Virus Invasion!
1. Load only software from original disks or CD's. Pirated or copied software is always a risk for a virus.
2. Execute only programs of which you are familiar as to their origin. Programs sent by email should always be suspicious.
3. Computer uploads and "system configuration" changes should always be performed by the person who is responsible for the computer. Password protection should be employed.
4. Check all shareware and free programs downloaded from on-line services with a virus checking program.
5. Purchase a virus program that runs as you boot or work your computer. Up-date it frequently.

What Viruses Don't Do


Computer viruses can not infect write protected disks or infect written documents. Viruses do not infect compressed files, unless the file was infected prior to the compression. [Compressed files are programs or files with its common characters, etc. removed to take up less space on a disk.] Viruses do not infect computer hardware, such as monitors or computer chips; they only infect software.
In addition, Macintosh viruses do not infect DOS / Window computer software and vice versa. For example, the Melissa virus incident of late 1998 and the ILOVEYOU virus of 2000 worked only on Window based machines and could not operate on Macintosh computers.
One further note-> viruses do not necessarily let you know they are present in your machine, even after being destructive. If your computer is not operating properly, it is a good practice to check for viruses with a current "virus checking" program.

What are Computer Viruses?

Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, it is said that the virus "infects" the executable file or program. Executable files include Macintosh "system files" [such as system extensions, INITs and control panels] and application programs [such as word processing programs and spreadsheet programs.] Viruses work the same ways in Windows or DOS machines by infecting zip or exe files.
A virus is inactive until you execute an infected program or application OR start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use.
Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments at a certain time or a programming event after replicating themselves to be picked up by other users one way or another. Other viruses make your computer's system behave erratically or crash frequently. Sadly many people who have problems or frequent crashes using their computers do not realize that they have a virus and live with the inconveniences.

Monday, July 6, 2009

Phoenix BIOS Beep Codes

These audio codes are a little more detailed then the AMI codes. This BIOS emits three sets of beeps. For example, 1 -pause- 3 -pause 3 -pause. This is a 1-3-3 combo and each set of beeps is separated by a brief pause. Listen to this sequence of sounds, count them, and reboot and count again if you have to.


1-1-3

Your computer can't read the configuration info stored in the CMOS. Replace the motherboard.

1-1-4

Your BIOS needs to be replaced.

1-2-1

You have a bad timer chip on the motherboard. You need a new motherboard.

1-2-2

The motherboard is bad.

1-2-3

The motherboard is bad.

1-3-1

You'll need to replace the motherboard.

1-3-3

You'll need to replace the motherboard.

1-3-4

The motherboard is bad.

1-4-1

The motherboard is bad.

1-4-2

Some of your memory is bad.

2-_-_

Any combo of beeps after two means that some of your memory is bad, and unless you want to get real technical, you should probably have the guys in the lab coats test the memory for you. Take it to the shop.

3-1-_

One of the chips on your motherboard is broken. You'll likely need to get another board.

3-2-4

One of the chips on your motherboard that checks the keyboard is broken. You'll likely need to get another board.

3-3-4

Your computer can't find the video card. Is it there? If so, try swapping it with another one and see if it works.

3-4-_

Your video card isn't working. You'll need to replace it.

4-2-1

There's a bad chip on the motherboard. You need to buy another board.

4-2-2

First check the keyboard for problems. If nothing, you have a bad motherboard.

4-2-3

Same as 4-2-2.

4-2-4

One of the cards is bad. Try yanking out the cards one by one to isolate the culprit. Replace the bad one. The last possibility is to buy another motherboard.

4-3-1

Replace the motherboard.

4-3-2

See 4-3-1

4-3-3

See 4-3-1

4-3-4

Time of day clock failure. Try running the setup program that comes with the computer. Check the date and time. If that doesn't work, replace the battery. If that doesn't work, replace the power supply. You may have to replace the motherboard, but that is rare.

4-4-1

Your serial ports are acting up. Reseat, or replace, the I/O card. If the I/O is on the motherboard itself, disable them with a jumper (consult your manual to know which one) and then add an I/O card.

4-4-2

See 4-4-1, but this time is your Parallel port that's acting up.

4-4-3

You math coprocessor is having problems. Run a test program to double-check it. If it is indeed bad, disable it, or replace it.

Low 1-1-2

Your motherboard is having problems

Low 1-1-3

This is an Extended CMOS RAM problem, check your motherboard battery, and motherboard.
AMI BIOS Beep Codes

1 Short Beep
One beep is good! Everything is ok, that is if you see things on the screen. If you don't see anything, check your monitor and video card first. Is everything connected? If they seem fine, your motherboard has some bad chips on it. First reset the SIMM's and reboot. If it does the same thing, one of the memory chips on the motherboard are bad, and you most likely need to get another motherboard since these chips are soldered on.

2 Short Beeps

Your computer has memory problems. First check video. If video is working, you'll see an error message. If not, you have a parity error in your first 64K of memory. First check your SIMM's. Reseat them and reboot. If this doesn't do it, the memory chips may be bad. You can try switching the first and second banks memory chips. First banks are the memory banks that your CPU finds its first 64K of base memory in. You'll need to consult your manual to see which bank is first. If all your memory tests good, you probably need to buy another motherboard.

3 Short Beeps

Basically the same thing as 2 beeps. Follow that diagnosis above.

4 Short Beeps

Basically the same thing as 2 beeps. Follow that diagnosis above. It could also be a bad timer

5 Short Beeps

Your motherboard is complaining. Try reseating the memory and rebooting. If that doesn't help, you should consider another motherboard. You could probably get away with just replacing the CPU, but that's not too cost-effective. Its just time to upgrade!

6 Short Beeps

The chip on your motherboard that controls your keyboard (A20 gate) isn't working. First try another keyboard. If it doesn't help, reseat the chip that controls the keyboard, if it isn't soldered in. If it still beeps, replace the chip if possible. Replace the motherboard if it is soldered in.

7 Short Beeps

Your CPU broke overnight. Its no good. Either replace the CPU, or buy another motherboard.

8 Short Beeps

Your video card isn't working. Make sure it is seated well in the bus. If it still beeps, either the whole card is bad or the memory on it is. Best bet is to install another video card.

9 Short Beeps

Your BIOS is bad. Reseat or Replace the BIOS.

10 Short Beeps

Your problem lies deep inside the CMOS. All chips associated with the CMOS will likely have to be replaced. Your best bet is to get a new motherboard.

11 Short Beeps

Your problem is in the Cache Memory chips on the motherboard. Reseat or Replace these chips.

1 Long, 3 Short Beeps

You've probably just added memory to the motherboard since this is a conventional or extended memory failure. Generally this is caused by a memory chip that is not seated properly. Reseat the memory chips.

1 Long, 8 Short Beeps

Display / retrace test failed. Reseat the video card.
IBM POST Diagnostic Code Descriptions

100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Color/Graphics Display

600 - 699 Floppy-disk drive and/or Adapter

700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Color/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System

Power On Self Test Beep Codes


1. short beep Normal POST - system is ok
2. short beeps POST Error - error code shown on screen
3. No beep Power supply or system board problem
4. Continuous beep Power supply, system board, or keyboard problem
5. Repeating short beeps Power supply or system board problem
6. 1 long, 1 short beep System board problem
7. 1 long, 2 short beeps Display adapter problem (MDA, CGA)
8. 1 long, 3 short beeps Enhanced Graphics Adapter (EGA)
9. 3 long beeps 3270 keyboard card