Friday, March 13, 2009

New Computer Virus List

  • OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
  • AT&T VIRUS: Every three minutes it tells you what great service you are getting.
  • MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.
  • PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
  • POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
  • RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
  • ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.
  • MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.
  • TED TURNER VIRUS: Colorizes your monochrome monitor.
  • ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.
  • DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!
  • GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.
  • NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.
  • FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
  • GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)
  • TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
  • TEXAS VIRUS: Makes sure that it's bigger than any other file.
  • ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.
  • CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
  • AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.
  • FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.
  • PBS VIRUS: Your programs stop every few minutes to ask for money.
  • ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
  • OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.
  • NIKE VIRUS: Just does it.
  • SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.
  • JIMMY HOFFA VIRUS: Your programs can never be found again.
  • CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.
  • KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.
  • IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
  • STAR TREK VIRUS: Invades your system in places where no virus has gone before.
  • HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.
  • GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.
  • CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.
  • LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".
  • CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.
  • ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back. >>

Downadup virus exposes millions of PCs to hijack

A new sleeper virus that could allow hackers to steal financial and personal information has now spread to more than eight million computers in what industry analysts say is one of the most serious infections they have ever seen.
Experts say a single infected laptop could expose an entire network to the worm.

Experts say a single infected laptop could expose an entire network to the worm.

The Downadup or Conficker worm exploits a bug in Microsoft Windows to infect mainly corporate networks, where -- although it has yet to cause any harm -- it potentially exposes infected PCs to hijack.

Mikko Hypponen, chief research officer at anti-virus firm F-Secure, says while the purpose of the worm is unclear, its unique "phone home" design, linking back to its point of origin, means it can receive further orders to wreak havoc.

He said his company had reverse-engineered its program, which they suspected of originating in Ukraine, and is using the call-back mechanism to monitor an exponential infection rate, despite Microsoft's issuing of a patch to fix the bug.

"On Tuesday there were 2.5 million, on Wednesday 3.5 million and today [Friday], eight million," he told CNN. "It's getting worse, not better."

Hypponen explained to CNN the dangers that Downadup poses, who is most at risk and what can be done to stop its spread.

How serious is it?

It is the most serious large scale worm outbreak we have seen in recent years because of how widespread it is, but it is not very serious in terms of what it does. So far it doesn't try to steal personal information or credit card details.

Who is affected?

We have large infections in Europe, the United States and in Asia. It is a Windows worm and almost all the cases are corporate networks. There are very few reports of independent home computers affected.

What does it do?

It is a complicated worm most likely engineered by a group of people who have spent time making it very complicated to analyze and remove. The real reason why they have created it is hard to say right now, but we do know how it replicates.

How does it spread?

The worm does not spread over email or the Web. However if an infected laptop is connected to your corporate network, it will immediately scan the network looking for machines to infect. These will be machines that have not installed a patch from Microsoft known as MS08-067. The worm will also scan company networks trying to guess your password, trying hundreds and hundreds of common words. If it gets in, even if you are not at your machine, it will infect and begin spreading to other servers. A third method of spreading is via USB data sticks.

How can I prevent it infecting my machine?

The best way is to get the patch and install it company-wide. The second way is password security. Use long, difficult passwords -- particularly for administrators who cannot afford to be locked out of the machines they will have to fix.

What can I do if it has already infected?

Machines can be disinfected. The problem is for companies with thousands of infected machines, which can become re-infected from just one computer even as they are being cleared.

New Windows virus attacks PHP, HTML, and ASP scripts

Researchers have identified a new strain of malware that can spread rapidly from machine to machine using a variety of infection techniques, including the poisoning of webservers, which then go on to contaminate visitors.

The malware is a variation of a rapidly mutating virus alternately known as Virut and Virux. It has long proved adept at injecting itself into executable files, which are then able to attack uninfected machines through network drives and USB sticks.

The variant, which Microsoft is calling Virus:Win32/Virus.BM, is also able to infect web scripts based on languages such as PHP, ASP, and HTML. Servers that become infected include an iframe in webpages that attempt to spread malware to visitors.

"This catapults the possibility of spreading even farther," Trend Micro researchers warn. "If the script files happen to be uploaded to a publicly accessible website, any visitor to the affected sites will be led to the URL embedded in the iframe code."

The iframe surreptitiously directs visitors to zief.pl (don't visit it unless you're a security professional), which attempts to exploit a variety of vulnerabilities based on the browser and other applications the user has installed, Microsoft researchers say. Once installed, the virus injects its code into various system processes such as explorer.exe and winlogon.exe and hooks low-level Windows APIs to ensure it stays in memory.

Websense Senior Virus Researcher Nicolas Brulez has also drawn up this detailed analysis of virut.

The virus has also picked up some new polymorphic tricks designed to make it harder for anti-virus programs to detect. Among other things, it uses more than one layer of encryption, allowing its binary fingerprint to change but to preserve its malicious payload.

Infected machines will have an IRC backdoor installed that tries to connect to several servers using port 80.

WARNING -- NEW VIRUS FOUND in the PCs

Posting this here too (at Callandor's suggestion), to alert everyone that I found a new virus last night that is not found by any of the latest virus updates of McAfee or Norton, and is not found by Ad-Aware6, with the latest update last night.

If people complain of their system running about HALF speed, it is due to the WMIPRVSE.EXE virus.

Normally, wmipvrse.exe is a valid windows/system32 file, and with SP1, it stays in the WDEM directory at about 199KB, and has the SP1 distribution date of 8/29/2002. But when you get the virus, you will find another file, of 38KB size in the Windows/Prefetch directory, with the same name, but a more recent date. Deleting that file and rebooting seems to fix the problem, the original MS file seems unharmed.

The way I found this is, as soon as the system booted fully, I did C-A-D to bring up Task Manager. A few seconds later, it popped into view, and the system process meter went to 100% immediately.

Tell people to check for it if they are experiencing slow systems in the next week or so. Good luck.

New big-payload virus identified and Steps to Remove Permanently

Disguised as e-mail from an acquaintance, a malicious computer "worm" capable of destroying data on infected machines was spreading Thursday, forcing at least a handful of businesses to shut down their e-mail systems.

It was not immediately clear how far the "Worm.ExploreZip" program - which replicates itself by commandeering Microsoft Outlook on Windows systems - had spread since it was reported to Symantec Corp.'s AntiVirus Research Center on Sunday.

Carnegie Mellon University's Computer Emergency Response Team had not received any reports of the worm as of early Thursday, but it was causing havoc with e-mail at Microsoft, NBC and General Electric (MSNBC is a joint venture of Microsoft and NBC).

System administrators at GE shut down the company's e-mail system in an attempt to isolate the worm.

How the worm works
Symantec (Nasdaq:SYMC) said the worm, which was first discovered in Israel, e-mails itself as an attachment with the file name "zipped_files.exe."

The body of the message, which scans the "Inbox" to harvest addresses of e-mail correspondents, reads:

"Hi (recipient's name)!

"I received your e-mail and I shall send you a reply ASAP.

"Till then, take a look at the attached zipped docs.

"Bye."

According to an advisory posted by Symantec, users who receive such a message should delete it without opening it, then empty the deleted items file.

System file modified
If the file is executed on a Windows 9x system, the worm copies itself to the c:\windows\system directory with the filename "Explore.exe" and then modifies the WIN.INI file so that the program is executed each time Windows is started, the advisory says.

The worm then utilizes the infected computer's e-mail client to harvest e-mail addresses in order to propagate itself.

In addition, when Worm.ExploreZip is executed, it also searches through the C through Z drives of your computer system and selects a series of files of any file extension to destroy by making them 0 bytes long.

This can result in non-recoverable data and/or computer system, the Symantec advisory warns.

How to get rid of it
If your computer is infected, security software company Network Associates recommends these steps to remove it:

If you're running Windows 95 or 98:
Restart your computer in MS-DOS mode, edit the WIN.INI file and remove the line run=c:\windows\system\explore.exe. Then delete the file "c:\windows\system\explore.exe" and restart Windows.

If you're running Windows NT:
Run REGEDIT (not REGEDT32) and locate the hive [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows] and remove the following key: "run"="C:\\WINNT\\System32\\Explore.exe"

Restart Windows NT, then remove the file "c:\winnt\system32\Explore.exe"

Disguised as e-mail from an acquaintance, a malicious computer "worm" capable of destroying data on infected machines was spreading Thursday, forcing at least a handful of businesses to shut down their e-mail systems.

It was not immediately clear how far the "Worm.ExploreZip" program - which replicates itself by commandeering Microsoft Outlook on Windows systems - had spread since it was reported to Symantec Corp.'s AntiVirus Research Center on Sunday.

Carnegie Mellon University's Computer Emergency Response Team had not received any reports of the worm as of early Thursday, but it was causing havoc with e-mail at Microsoft, NBC and General Electric (MSNBC is a joint venture of Microsoft and NBC).

System administrators at GE shut down the company's e-mail system in an attempt to isolate the worm.

How the worm works
Symantec (Nasdaq:SYMC) said the worm, which was first discovered in Israel, e-mails itself as an attachment with the file name "zipped_files.exe."

The body of the message, which scans the "Inbox" to harvest addresses of e-mail correspondents, reads:

"Hi (recipient's name)!

"I received your e-mail and I shall send you a reply ASAP.

"Till then, take a look at the attached zipped docs.

"Bye."

According to an advisory posted by Symantec, users who receive such a message should delete it without opening it, then empty the deleted items file.

System file modified
If the file is executed on a Windows 9x system, the worm copies itself to the c:\windows\system directory with the filename "Explore.exe" and then modifies the WIN.INI file so that the program is executed each time Windows is started, the advisory says.

The worm then utilizes the infected computer's e-mail client to harvest e-mail addresses in order to propagate itself.

In addition, when Worm.ExploreZip is executed, it also searches through the C through Z drives of your computer system and selects a series of files of any file extension to destroy by making them 0 bytes long.

This can result in non-recoverable data and/or computer system, the Symantec advisory warns.

How to get rid of it
If your computer is infected, security software company Network Associates recommends these steps to remove it:

If you're running Windows 95 or 98:
Restart your computer in MS-DOS mode, edit the WIN.INI file and remove the line run=c:\windows\system\explore.exe. Then delete the file "c:\windows\system\explore.exe" and restart Windows.

If you're running Windows NT:
Run REGEDIT (not REGEDT32) and locate the hive [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows] and remove the following key: "run"="C:\\WINNT\\System32\\Explore.exe"

Restart Windows NT, then remove the file "c:\winnt\system32\Explore.exe"

Quick Recovery for FAT & NTFS


Windows Partition Recovery SoftwareQuick Recovery FAT & NTFS is professional windows data recovery software & rated as best data recovery tool to undelete data, recover deleted files & recover deleted data from formatted partition of Windows Operating System. Quick Recovery for FAT & NTFS - Windows Partition Recovery Software recovers deleted data in just 3 steps - Analysis, Select & Save. Analysis is the most important aspect of data recovery. Quick Recovery's unique Guided File Excavation Technology (GFETCh) helps in locating files and folders lost behind overwritten partitions too.

" Top 10 Data Recovery Software " - Rated as Best Data Recovery Software

Starting at USD 129 (Special OFFER 69 USD Only)

Quick Recovery FAT & NTFS - Windows data recovery software supports partition recovery from NTFS, NTFS5, FAT12, FAT16, FAT32 file system.

Quick Recovery for FAT & NTFS (Starting at USD 69)

Features of Windows Partition Recovery Software - Quick Recovery for FAT & NTFS

  • Quick and Automated Analysis.
  • Unique Guided File Excavation Technology (GFETch).
  • Simple and well guided steps to recover deleted files & restore lost files.
  • Unicode multiple lingual support.
  • Simulates previously existed windows partitions.
  • Recover deleted partition or data even if MFT is fragmented and broken.
  • Recover deleted partition or data even if MFT meta tags are overwritten.
  • Recognises drives even if MBR, Boot record and meta tags are not present.
  • Bad sector management and recovery (BSMR) helps in optimized recovery from damaged disks.
  • All recovery cases possible that have been experienced by Unistal have been incorporated.
  • Developed by experienced windows data recovery experts.
  • Supports the following Data Media
      • Hard Disk Drives: IDE, EIDE, SCSI, iSCSI, Micro & SATA drives.
      • USB drives, Compact flash card, Smart card, Secure digital card, SD mini, SD micro, Smart media, XD picture card, MMC multimedia card, jump drive, jet flash, memory stick, thumb drive.
      • Memory Cards: Toshiba compact flash, Smart Media, Memory Cards, IBM Micro drives, Multi Media Card, Kodak Picture Card, Picture Cards, Canon Secure Digital memory.

    Quick Recovery for FAT & NTFS efficiently recovers data from Windows Vista. To run Quick Recovery for FAT & NTFS in Windows Vista follow the steps below:
    • Install Quick Recovery for FAT & NTFS. Right Click Quick Recovery for FAT & NTFS Icon from Desktop and choose "Run as administrator". OR users can
    • Go to Start menu > Programs > Quick Recovery > Quick Recovery for FAT & NTFS & Right Click Quick Recovery for FAT & NTFS and choose "Run as adiministrator".

    Download Quick Recovery FAT & NTFS - Windows Data Recovery Software

    Download Demo Version of Quick Recovery FAT & NTFS - Windows Data Recovery Software to recover lost or deleted data from FAT12, FAT16, FAT32, NTFS, NTFS5 partitions of Windows Operating System.

    Primary Location


    Buy Online FAT & NTFS Data Recovery Software

    We offer Full Version of Windows data recovery software. After getting satisfied with the Demo Version, click the Buy Online button to purchase the Full Version of the software.

Windows Data Recovery - Recover lost Data from FAT & NTFS Partitions

Have you suffered with the data loss situation & realizing the need of Best Windows Data Recovery Software & File Recovery Services to restore windows data?

Recover Data can help you to recover your valuable & vital data, file and folders in a minute with there experience data recovery engineers or Recover Data Software. For more than a decade, Recover Data successfully retrieve files and folders from many data disasters situation.

Recover Data fully technically sound data recovery software company who offers windows data recovery services and a wide range of windows data recovery software or product to recover lost and deleted data from inaccessible, reformatted, downed, formatted, damaged or corrupted storage media & storage device(s).

Recover Data have fully equipped data recovery software & labs with experienced data recovery engineers having expertise knowledge to create effective & result-oriented services to recover lost data from inaccessible hard drives & any other storage media having Windows Operating System.

Data Recovery-10 Most Effective Computer Backup Tools

Despite my best efforts, this past week I lost both my primary and secondary computer systems. After losing my primary desktop several years ago, I vowed I would never let myself be caught without an operating PC. As they say, “the road to h*ll is paved with good intentions,” and I once again was caught with my proverbial pants down without an operating computer when my desktop, which had been exhibiting some problem signs in the last month, died suddenly and would not turn on.

I then went to my laptop, which I had admittedly been lazy about keeping updated, and turned it on. Immediately the Windows update process started, and asked me install Service Pack 3 for Windows XP. Having done that successfully on my desktop, I wasn’t too worried about any installation problems on the laptop. However, upon completing the installation, the blue screen of death appeared, which is NEVER a good sign with a Windows-based system.

After trying for about an hour without success to revive my laptop (which is only 8 months old and still under warranty), I knew that I was in trouble and starting looking for alternatives. Fortunately, my husband keeps a laptop on hand that he uses for gaming when we travel, and he generously offered to let me install my programs and files on it until I could repair one of my computers.

After finally acknowledging that there was no way I could have foreseen this situation, I decided that I needed to s*ck it up, get over, and move on. So, I’m making do with a partially customized laptop that will do until one or the other of my PCs is returned.

Despite having gone through similar situations previously, I still learned a few new things along the way about data recovery and computer backup. Here are the 10 most effective tools that saved my bacon during my recent computer meltdown.

1. Automatic backup software. I’ve been using 2 online backups, Carbonite and Syncplicity. I have had to restore from Carbonite previously, and I found the process to be lengthy and somewhat confusing. So, several months ago I began using Syncplicity because it offers online access to all backed up files as well as the ability to synchronize an unlimited number of computers. However, it has taken a week to restore 20 GB of data with Syncplicity, and some of the data was wasn’t really restored, despite what Syncplicity told me in my account. However, I can easily download this missing info to my computer from the online vault. One process that makes this backup system easier is that I store all of my data files in My Docs so I don’t have to hunt them down in Program Files, or wherever they are typically stored.

2. Email client software. I still use the dinosaur Eudora for my email client. Old habits die hard, I suppose. However, somehow I missed marking some key Eudora folders to back up, and so I was initially using my webmail access providing by my hosting company to access email because of this oversight with Eudora. I began to tire of that quickly, as I had no way to create additional folders in those systems, so I then decided to manually configure Eudora and open folders and emails as I need them in the program. This experience has made me very tempted to change all of my incoming and outgoing email servers on all domains to Gmail just to have access to everything online, come hurricane, flood, tornado, or computer crash.

3. Bookmark service. I’m an avid researcher and resource collector, so having access to my bookmarks, or favorites file, is vital to my day-to-day operations. I had been using Spurl, but because of frequent periodic outages of their service, I’ve changed to Foxmarks. I like that this service offers me the ability to access all of these online, as well as have them at my fingertips any time I need them from my Bookmarks menu as well as easily synchronize them to any computer.

4. Contact management. Even though I don’t use Outlook for email, I do use it for calendar and contact management. I had been using Plaxo as an online backup for my contacts, but it doesn’t permit me to store my notes about each contact. I’ve been using Airset now for several months, and it regularly syncs my contacts (with notes) and my calendar to their online service. I found this much more convenient than trying to restore a backup PST file to Outlook and then repeating that again when my primary computer is returned. Instead, I just make changes to contacts and my calendar on Airset, and I’ll just sync that to Outlook on my desktop.

5. Passwords. I’ve been using Roboform for years to help me manage my passwords. I’ve got my Roboform data in My Docs, so it was a breeze to reinstall Roboform and copy the data folder to the new computer and permit me to access all of the sites requiring a password and username. Finally, something that worked seamlessly!

6. Project Management. Smartsheet has been my project management service for the last few months. I love that it has the ability to create an item and allow you to attach a document and discussion to that item. Rather than having to hunt down information about a project, all I had to do was log into my Smartsheet account and there it was.

7. Software licenses. Roughly 99% of the new software I install is downloaded and I don’t get a physical copy on CD. Therefore, I make sure that I have the downloaded version in a My Downloads folder that’s a part of My Docs file, which is backed up regularly. And, I make a PDF copy of the software license that I get by email and store in a Software folder, also in My Docs. Lastly, I purchased a very inexpensive program, Registration Vault, that lets me store all of my software license and purchase info and permits me to back up my data to My Docs. As I had to reinstall software on a new computer, it was easy to restore the Registration Vault files, get my software license number, and have a fully functioning piece of software within minutes.

8. Accounting. I use Quickbooks for my accounting needs, and while they do offer an online version, I haven’t yet moved to that. Instead, I back up Quickbooks after every use in the My Docs folder. When I needed to invoice consulting clients at the beginning of this month, all I had to do was reinstall Quickbooks and restore my latest backup. I instantly had everything I needed again at my fingertips.

9. Alternate free services. Some software I use, like CuteFTP and TraxTime, don’t permit data backups. So, I really do have to start all over with my FTP info and my time tracking info when my computer dies. Rather than installing these programs on the new computer, I just used some free alternatives to get me through. FireFTP, a Firefox add-on, has worked quite well for me as my FTP client, and MyHours.com has stood in fairly well for TraxTime, although it requires a few more steps for operation than TraxTime.

10. Email marketing. While not a tool, I discovered that both text and HTML versions of email broadcasts matter in email marketing. I wasn’t initially able to get my normal email client up and running, so I was reading my email from my webmail systems. I’ve got 2 hosting accounts, and the newer one has a fairly sophisticated webmail system and let me read HTML emails with no problem. The other, however, doesn’t permit HTML viewing. So, those emails sent only in HTML were ones that I was unable to read. If you’re wise and your email marketing program permits you to send emails out in both plain text and HTML, do it, even though it might seem like a needless pain. You just never know how members of your list might be forced to ready your emails.
What is required for Multilingual SEO

Multilingual SEO is obviously a much more complex process than standard SEO as it also needs to consider language and cultural differences. For example, if you want to appeal to a global market your site would have to be modified in order to take account of differences not only in language and culture, but also the various search engines and how they work too. Basically, you really need to know what you are doing to get the desired results.

It’s essential to have an understanding of what people are likely to be searching for using the correct keywords in the target language. You cannot just translate your site and your keywords and expect that to work because it won?t. Certain words or phrases may be translated correctly but will not necessarily be the words and phrases that are used in a particular country.

You would also need to consider common miss-spellings in each language and the possibility of slang words for a particular term. Ideally your website should be written from scratch in the target language by a native speaker as then it will have the best chance of grabbing a share of the foreign market.

With multilingual PPC you should also ensure that it isn’t just the landing page that is translated, you really need to have several pages of relevant information if you want those conversions.

Finally, don’t make the mistake of thinking that Google is the most popular search engine across the globe. Yes it does have an international presence but it isn’t the most dominant search engine in every country. A professional in multilingual SEO will know which search engines are the best options in different countries.

All things considered, to get the best results from multilingual SEO you will either have to be an expert yourself, or call in an expert in multilingual SEO to do it for you.