creatingcomputervirus.blogspot.com
Computer Virus: May 2009
http://creatingcomputervirus.blogspot.com/2009_05_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Saturday, May 30, 2009. The usage of the software firewall is not limited to the small network. It is also used in the huge network to regulate the usage of the internet by the employees. The firewall uses the following ways to prevent the unwanted data transfer through the internet. Packet Filtereing: The information to be sent are breakdown into small units and are converted to packets. These packets are first...
creatingcomputervirus.blogspot.com
Computer Virus: April 2010
http://creatingcomputervirus.blogspot.com/2010_04_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Thursday, April 22, 2010. Zeus Virus: Becoming more powerful. For more details on spread of infection visit: thepcsecurity.com/latest-security-software-cannot-detect-zeus-virus/. Links to this post. Subscribe to: Posts (Atom). Thiruvananthapuram, Kerala, India. View my complete profile. Zeus Virus: Becoming more powerful. Share what you read . Awesome Inc. template. Powered by Blogger.
creatingcomputervirus.blogspot.com
Computer Virus: June 2009
http://creatingcomputervirus.blogspot.com/2009_06_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Friday, June 26, 2009. Spyware (Part - 1). Links to this post. Wednesday, June 24, 2009. Microsoft Malicious Tool For Computer Virus Removal. The application to be download is 8.4 MB in size. The file name is "windows-kb890830-v2.11.exe". You can download it from:. Http:/ www.microsoft.com/downloads/details.aspx? Links to this post. Crazy Boot Computer virus. DON'T PLAY WITH THE PC! CRAZY BOOT VER. 1.0. Commwarrior ...
creatingcomputervirus.blogspot.com
Computer Virus: March 2010
http://creatingcomputervirus.blogspot.com/2010_03_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Friday, March 26, 2010. Antivirus 2010 is a fake antivirus software which may harm your computer if used. It is a cunning malware that uses advertisements to make the user pay for the malware. It displays fake Blue Screen Of Death (BSOD). In the BSOD it shows that windows has detected unregistered version of the Antivirus 2010. It has to be registered for solving the problem. Do not believe this! HKEY CLASSES ROOT T...
creatingcomputervirus.blogspot.com
Computer Virus: March 2009
http://creatingcomputervirus.blogspot.com/2009_03_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Monday, March 2, 2009. Facebook under attack of two malware applications. Links to this post. Subscribe to: Posts (Atom). Thiruvananthapuram, Kerala, India. View my complete profile. Facebook under attack of two malware applications. Share what you read . Awesome Inc. template. Powered by Blogger.
creatingcomputervirus.blogspot.com
Computer Virus: February 2009
http://creatingcomputervirus.blogspot.com/2009_02_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Tuesday, February 24, 2009. The keyloggers are installed in the victim's machine by making him belive that they are useful software. The most of the infection are through the P to P network. To avoid the infection connect only to trusted network. Download softwares only from trusted sources. Use an updated Antivirus software and install a firewall. Links to this post. Friday, February 20, 2009. Note that you have to...
creatingcomputervirus.blogspot.com
Computer Virus: January 2009
http://creatingcomputervirus.blogspot.com/2009_01_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Friday, January 30, 2009. You may noticed that a folder named spam in your email account. Mos. T of the people think that spam is only the email send by a person with another person's identity thereby hiding his own identity. Actually spam is anonymous as described above and is unsolicited bulk e-mail. Links to this post. Thursday, January 29, 2009. Trojans are the most dangerous among the malicious software. Th...
creatingcomputervirus.blogspot.com
Computer Virus: October 2010
http://creatingcomputervirus.blogspot.com/2010_10_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Thursday, October 14, 2010. New e-mail virus: email from Ashley Anderson. Links to this post. Wednesday, October 13, 2010. Microsoft releases security patches to fix 49 vulnerabilities. According to Symantec (Norton Antivirus Provider), out of the total 49 flaws, 35 could give hackers the means to run malicious code on victim's computers. Microsoft has already released 86 security patches so far this year, as co...
creatingcomputervirus.blogspot.com
Computer Virus: August 2010
http://creatingcomputervirus.blogspot.com/2010_08_01_archive.html
The blog contains information about different types of viruses and properties of viruses. Friday, August 27, 2010. Eventhough this logic avoid the chances of false alarm, it has opened a door for the virus creators to attempt to camouflage their viruses so that they included the specific characteristics the antivirus softwares were checking for and thus have the antivirus program ignore that particular virus. Fortunately, camouflage virus never became a serious threat, but the possibility existed. Now I ...