Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Elite Stuff Jan 2010

Elite Stuff Jan 2010

Ratings: (0)|Views: 48 |Likes:
Published by Cutie
Free e-magazine
Free e-magazine

More info:

Published by: Cutie on Jan 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

06/25/2010

pdf

text

original

 
Editor’s Mantra
Here at Elite Stuff I felt the need of one magazine that provides just the right quantity of stuff toread & not 100 pages of clutter that one can’t read even after spending whole one month. So Icame up with an idea of compiling an e-magazine that is 1. Free of cost 2. Contains only few pages which one can read in less time 3. Has stuff for every community like students, hobbyistsand all. So here I am with the first issue of Elite Stuff. It houses articles about software, gadgets,tech news & not so common personality development. I hope in this world where everyonecarries a notebook its easy to read a few pages of an e-mag whenever you get free time.Enjoy reading!!!Editor: Star Tech
Contents
2.Cover Story – Be Aware Of Malware
4.
 
Gadgets & Gizmos6.Scintillating Softwares
8.
 
5 Worth Visiting Websites
9.
 
 Personality Plus
 
11.
Tech News
Cover Story – Be Aware Of Malware
 
Page
2
of 
11
In recent years, consumers have become more tech savvy and have a better understanding of themysticism of the Internet. From banking and shopping online, keying in our user IDs and passwords and confidently sharing our personal information at secure sites, these are everydayoccurances. Although it makes our life easier, our increasing online usage also makes usvulnerable to digital threats. When we enjoy the convenience of online banking, we invariablyexpose ourselves to phishing attacks. We download applications from the Internet and invitemalware to take control of our computers. Email attachments may unknowingly bring in Trojansthat might play havoc with our computers. However, if we exercised a little more caution, wecould prevent the threat of malware from capturing our online identity. To do that we need to beaware of the different types of risks that exist, how they work and what can be done to safeguardour data against them.
Danger defined:
By and large, we tend to categorize all online threats as viruses. But what really is a virus?Historically speaking, a virus is a type of a computer program that not only infects youcomputer, but makes multiple copies of itself and proliferates within documents or applicationson your computer. It also has malicious repercussions like corrupting file content, denying accessto databases, stealing personal information and the like. Back in the days of the floppy disk, aninfected disk could infect a host computer if the user executed or copied files from it. This digital plague could further infect other floppy disks or other media if inserted into the host computer,thus replicating them. To prevent these viruses from spreading and damaging files, computer security firms developed applications that could detect and even remove viruses within files. Incases where this disinfection was not possible, the program would delete the file from thecomputer or move it to a secure location (much like a quarantine). However, today’s virusengineers are smarter. Drawing on the power of the Internet, there are very few viruses out therethat still spread by physical media—most viruses proliferate through the Internet across various programs. This has given rise to worms that travel through local and web networks, Trojans thatare capable of camouflaging their presence and spyware that can steal your data without your knowledge. Welcome to the new world of malware.
Computer worm:
In computer terminology, a Worm is a self-replicating threat that travels through a network andsettles in a computer via a variety of online applications like e-mails, chat clients, P2P clients,etc. A worm does not attach itself to any program that explicitly needs to be executed for itsspread. Instead, it travels through networked applications and primarily replicates itself up to a point where the network is clogged with its clones, preventing it from being used by legitimateapplications. The different types of worms you could encounter are:
E-mail worm:
This type of worm uses e-mail as its vehicle. When an infected e-mail reaches your inbox, it doesnothing unless the e-mail is opened to be read. When you open the mail, you may see anattachment or a link to a real or fictitious web site. The moment you click on the link and visitthe web site, the worm gets triggered. Once activated, it starts searching your address book andsends e-mails to your contacts. It can even fake the sender’s address, so that the recipientassumes that the mail is not from someone he knows. Clearly, across an office networconsisting of tens or hundreds of users, the numbers of ficticious e-mails traversing the mailservers grow exponentially over a short time. E-mail worms often bring down mail servers andclog their functioning.
 
Page
3
of 
11
File sharing network worm:
This worm generally proliferates through a shared folder of a machine. It creates a copy of itself and masks its intent by using a seemlingly harmless and unassuming name. The moment youconnect to a networking site like ‘kazaa.com’ and your sharing folder gets accessed, the copy of the worm moves from your computer to other computers in the file sharing network. Withmillions of computers actively being used to access files from peer-to-peer networks, theseworms can proliferate very quickly. Another popular type of worm is the instant messagingworm (similar to the email worm, but uses an instant messenger service as its vehicle).
Trojan:
Trojans are malicious programs that pose as legitimate applications. When users execute such programs, blissfully unaware of their real intent, the host computer gets infected. Once on your computer, it may strike in a variety of ways, ranging from capturing what you see on your screento logging what you type. The captured information is then sent to the author of that malwarethrough the Internet. You could therefore stand to lose precious data, bank passwords and thelike. The different types of Trojans include remote access Trojans, where others can gain accessto and even take over your machine, data sending Trojans that scan your computer and send datato the author, and destructive Trojans that simply delete files on the host computer. Trojans canalso infect your computer and you may face denial of service (unavailability of data). Trojanseven have the potential to counter anti-virus software by changing their coding DNA (a processknown as polymorphism), making it harder to detect. Spyware is also a type of computer application, developed with the intention of stealing information from your computer. Theseapplications can steal data including the history of web sites you have visited, passwords thatyou have used to access online secure services, etc . However, unlike Trojans and worms,spyware cannot replicate but it does exploit the host computer for commercial gain. Theseinclude everything from throwing unsolicited pop-up advertisements, capturing your web browser’s home page and directing it elsewhere.
Adware:
Adware is more of an annoyance than a threat. Typically found in applications downloaded fromquestionable web sites, it infects the host computer by downloading and installing other advertising material and displaying it on your computer via annoying popups that appear whileyou use Internet applications. This is where adware generally gets confused with advertising-supported software. The latter is not malicious and only displays an advertisement within thewindow of the application program (such as trial or shareware versions of software). Adware, onthe other hand, displays advertisements randomly, often when you least expect it.
The last call:
This new breed of Internet threats may or may not be harmful to users, but they do hamper the performance of computers. To protect computers from today’s digital threats, an anti-virus program is a good place to start. Look for application suites that specifically offer protectionagainst all of these threats and not just ones that offer plain vanilla virus protection. In today’sworld, data security requires blanket protection systems that do it all. You can also install anti-spyware and adware application like NoAdware, ErrorDoctor, Spynukke, AdAware, etc.Secondly, it is important to exercise caution on what applications and files are downloaded. Thisincludes your mail attachments. Chain mails with attachments (such as .exe, .com, .scr, .bat, or .pif), download sites that contain links of questionable web sites, applications that aren’t from

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->