Thursday, May 6, 2010

How Long Should I Use Daktarin For



Naive vs. Trojans

I nternet .. Network Network .. Where we can find virtually any utility that we want for our computer. But be a little careful, any program you download can contain a virus or Trojan.

But it is a Trojan?

is simply a program that hides inside another program potentially dangerous to your computer and that, to go hidden in another, probably never installed in your PC. When trying to run this utility that we so eager to get and that we have finally managed to find on the Internet, not working properly (this is a generality but it is not at 100% of cases) and on top we have infected your computer.

As in the city of Troy, .. we got the enemy inside your computer, in a beautiful package, and left this at the mercy of the person who wrote the trojan.

The last Trojans are allowing third parties to take full control of your computer remotely, you can write, delete, change files, settings .. etc., like ourselves ahead of our screen.

In these programs, unlike viruses, its aim is not to reproduce. Therefore, most of the antivirus heuristic scanners do not detect such programs as hazardous unless they have been updated accordingly.


Well .. and what I can do to determine whether the program is just run a Trojan or not? Give a small general guidelines to try to discover whether or not a hidden Trojan.

1 Check the new appearance of DLLs or EXEs in c: \\ windows or c: \\ windows \\ system. There are several methods. One of them is to use find with the search option by date of modification or creation. Another is to use specific utilities like FileMon, a very useful free program that can get http://www.sysinternals.com/filemon.htm and helps monitor any changes in the filesystem.

2 The only way to maintain control of our machine by a Trojan is by opening a connection to your computer, it will check for open connections with a netstat-an. Any suspicious connection must be analyzed in depth.

3 will check the Windows Registry, be suspicious of new entries that appear spontaneously to run any program. There Be especially careful with the keys hanging in

HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows \\ CurrentVersion \\ Run ,

As is often the place chosen by the majority of Trojans to install a key point to the file you want to run every time you restart Windows. In any case, we also will help free utility Regmon, that helps monitor any changes in the Windows Registry.

Finally, it is worth remembering that there are tools created especially for the detection / removal Trojans. Although today many antivirus detect and remove many trojans, the protection offered can not, in any case be sufficient. Anti-trojan tools specific, but still have much room for improvement, are generally much higher compared to the virus. Are two of them: Jammer 1.7, which has a freeware version and LockDown2000.

0 comments:

Post a Comment