Cryptography is a technique by which we can safely send our data from one place to another or we can say from sender to receiver computer. Or we can say it is an art of writing the data into secret codes so that it cannot be understand by any other third party or intruder.
As we can send data from one computer to another computer without using cryptography technique it will be easily hack by any another third party any miss use it and it may also possible to change the data to any other form which would be a wrong information to receiver user. As shown in below figure (1).
In the above figure sender want to send information to receiver of pay $ 100 which is original information when it is goes from sender to receiver it is hacked by intruder and intruder transform it to pay $ 200 and send it to the receiver and receiver will received a wrong piece of information which would be harmful for receiver.
But if we use cryptography techniques we use encryption method to transform the data into encrypted form before send to receiver so if it is hacked by any intruder it cannot be understand by it and he will not be able to transform it. As shown in figure (2).
As show in above figure when a sender send a particular data to receiver before send it encrypted in another format which cannot be understand by any third a party or we can say intruder . so at the receiver end it first decrypt the data and the get a original data.
Generally it is based on mathematical algorithms and these algorithms used a secret key for secure transactions.
Cryptography conditions
In Cryptography each person receives a pair of keys, called the public-key, or private-key. Through encryption and decryption will be done with the help of public key and private key both the receiver end and sender end. Each user public key is published but private key kept secret which is only known to user. Any user can send the information or any data using public key encryption but can only decrypted it with private key. The original data known as plane text and after encryption known as cipher text.
Classical Cryptography techniques
Classical cipher’s compromise two basic components:
- Substitution ciphers.
- Transposition ciphers.
- Mon alphabetic.
- Poly alphabetic.
Several of these ciphers are group together to form a product ciphers.
In today’s technological arena, the most common botheration that we all face with our PCs, Laptops or Workstations is VIRUS. The problem is so vast and deep rooted that it becomes obvious for all to install effective antivirus software in our PC along with Internet Security, Malware or Trojan Remover with it.
In this article I would like to share some basic information about the computer viruses. I would like to classify it into 4 broad divisions which are as follows:
•What is a computer virus?
•What are the symptoms of computer virus?
•Types of Virus
•What are the basic steps to get rid of the virus
-
What is a computer virus?
The full form of computer virus is – Vital Information Resource under Siege. In terms of Computer Security, computer virus is a software program that, like a biological virus, makes copies of it and spreads from one computer to another computer and that interferes with computer operation.
The term "virus" was first used in this sense in print by Fred Cohen in his 1984 paper Experiments with Computer Viruses, where he credits Len Adleman with coining it. According to his definition, "a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs. Every program that gets infected may also act as a virus and thus the infection grows." Using this definition it can be said that computer virus is an executable program code that may corrupt and/or delete program files, some specific data file (especially which contain executable code).
-
What are the symptoms of computer virus?
The most common Symptoms that are seen when a computer is affected with a virus definition are:
•The computer restarts on its own in every few minutes.
•Programs that used to run stop responding frequently. Even if you remove and reinstall the programs, the issue continues to occur.
•Out-of-memory messages are received very frequently though there are sufficient spaces in RAM.
•An antivirus program cannot be installed on the computer, or the antivirus program is disabled without any valid reason.
•The infected file may create copies of itself and use up all the free spaces on hard disk.
•Slow internet connections.
•Distorted menus and dialogue box can be observed.
•You receive an e-mail message that has a strange attachment. If you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
•Receivers inform you that they have recently received e-mail messages from you that contained attached files though you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.
If the above symptoms are being seen in a machine, the machine needs to be scanned with antivirus software thoroughly.
-
Types Of Virus:
There are different types of computer viruses. Not all of them behave, replicate, or infect the same way. The following list will describe the most common types of computer viruses:
•Boot Virus: It affects the boot sector of a floppy disk or hard drive. Boot Sector is the most important area of a hard disk The best way to avoid these types of viruses is never start computer with an unknown floppy disk in the disk drive.
•Macro Virus: It stores as a macro to a document like MS Word or MS Excel or similar application. When user try to open that document the virus causes damage and also spread to other compatible document and applications so that any new document user going to create, will be infected.
•Rootkit Virus: Rootkit is a collection of programs that enables administer level access to a computer network. The term comes from the Linux administrator root user. This virus has an ability to rewrite the login script allowing it to accept the attacker's login regardless of any changes made to the system by administrators. They are too much effective in the distribution of illegal material over the internet because the rooted machine identifies itself as the source, instead of the attacker's machine.
•Polymorphic Virus: It is one of the most common viruses. Every time it changes its signature when replicates and affects a new file. This unique behavior makes them undetected by ordinary antivirus software.
•File Infectors: This virus infects the executable files like .EXE or .COM. When one of these programs is running, the virus is activated and does whatever it has been commanded to do. This virus typically resides in System Memory. One of the most common forms of it goes by the alias Win32.
•Trojan Horse: It is the most dangerous virus. Truly speaking, this is a very innocent looking virus that appears to perform some useful functions but secretly conducts some very harmful, destructive jobs like deleting a large number of data or allowing an outsider to gain an unauthorized access to the system. Trojan horse neither replicates nor copies itself but itself is a great threat towards system’s security. In many times it becomes so dangerous that a user has to format his OS to get rid of it.
Till now, we are talking about computer viruses and also discussing about its different types. But there are also other kinds of malwares which are not viruses by definition but do the same job as viruses do like destruction of important codes etc. We are now listing those malwares:
•Logic Bomb/Time Bomb: It is a dormant code that destroys junk data when certain conditions have been met. For example, an employee can write a code to delete a large number of files when his/her name will be removed from the project.
•Worms: A worm is a program that spreads copies of itself throughout a network or the internet without a host program. It creates problems by overloading the network as it replicates. Worms do damage by their presence rather than by performing a specific damaging act, as a virus does.
•Spyware: It is a technology to gather information about a person or organization without their knowledge or permission and relay those information’s to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
-
What are the basic steps to get rid of the virus?
Though there is no particular way out to protect our PC from computer viruses but we can follow the steps written below to decrease the percentage of virus attack.
•Download and install good antivirus (AV) software and update the software regularly.
•Scan computer through that AV software and if any virus is detected, delete it immediately.
•If antivirus software cannot remove the virus and there is no removal tool available, your online search for the name of the virus may yield a set of instructions on how to manually remove the virus. But don’t follow those instructions blindly. Please be careful before starting the process.
•Don’t open any unknown file type attachment in your mail unless and until you are sure about that attachment.
Security Threats
There is lot of malicious activities online which is the main reason for security threats in recent time and has become a major concern for PC users, businesses, software manufacturers. In the year 2010 and so far, there is increase in malicious activity and scams are reported in social networking sites such as Twitter and Facebook. The threats are increasing further and are not limited to email, bank account details etc. According to analysis of security companies it is stated that malware of around 95000 pieces are checked every day which are new attacks or variations of old one. This shows that there are many new ways to infect and hack users system, but simultaneously security companies are introducing latest Internet Security Program, which can protect users systems from malware, spyware and other major security threats to some extent. But sometimes even security software cannot be trusted after knowing the fact that there is increase in scams like fake anti- virus, social networking sites been attacked by malware, mobile apps malware etc. So, before opening any unknown email-attachment or known mobile application, one has to understand the possible and latest security threats. It is good to know well in before rather than becoming a victim of malware or any other security threat that can come in any way.
Mobile Applications security threat
Everyone has to admit the fact that smartphones are the latest trends and there has been huge increase in users for various purposes. Surprisingly, mobile Internet users are more who are the main target for malware and other malicious programs. Google Android market has reported cases of a Trojan known as DroidDream which attacked recently. It is malware that on execution gains administrator access and can download many other malicious programs to user phone for stealing the user data. Though Google has somehow managed to stop the malware application another case was reported that was spread through alternative application market.
Users can avoid installing application from suspected sources and should note that Android market is not completely malware free. Reading applications reviews from reputed sources and downloading a mobile antivirus application can be very useful. Important thing to note is that application permission screen should be read in detail for knowing what types of access permissions are available.
Social Networking security threat
The social networking has become a trend and is used for connecting with friends and sharing information. It is also one place where malicious activity can be performed and it is estimated that 20% of social networking site Facebook users can be targeted easily. Providing personal information including contact details is quiet common and these data can be hacked and misused if a malware is installed on users PC. Initially one can get links posted by some Facebook friends which can be photos or some videos. Once the malware installs itself, users critical data can also be accessed easily and also their friend's details. Twitter has reported cases of such scams.
So, before accessing any social networking postings see that what it is going to offers and suspicious cases should be ignored.
Scareware
Scareware is referred to as malicious program which misleads users by convincing that system needs antivirus program, which can be purchased on single payment. Once user gives critical information such as credit card credentials and other details the identity can be misused further. In addition to data theft, users system is exposed to other malicious programs too. It is just a fake anti-virus scam and there are reported cases, which has increased too. As security is major concern for PC-users, the scareware programmers have attracted them with an intention that they will definitely load the fake anti-virus.
It is good to never install any program that is show through a pop-up window as most of the time scareware comes to user PC in that way only. Updating the present security program that is genuine is also needed so that when any new malware is seen it can give an alert.
Adobe Portable Document Format security threat
It is estimated that most of the targeted e-mail attacks are done using PDF format which contain a malware program. Hence, PDF file format can be consider dangerous and generating malicious content is easy too. Hence, users should be cautious and before opening should scan it if that attachment comes from unknown sources. Updating Adobe security updates can also be helpful as latest versions are providing protection from malicious programs. Finally, companies should also consider these security threats and also monitor network traffic for any suspicious activity as they may loss heavily if attacked.
Computer Security
In today's world the usage of Internet is not limited to checking mails as users can shop online, Bank online through Internet Banking and even book reservations etc. So, there is lot of information been shared online, which even includes critical information. Though a secured gateway is used to share the information the issue of computer security is always been a major concern due to increase in security threats. Not only businesses but also home users are unsure of their computer security. Any malicious online attacks including hacking might make the home users as well as businesses to face heavy loss. Hence, it is duty of computer users to ensure appropriate security is there.
Especially, home users are easy targets for intruders as most of the home users are not well prepared to handle any attacks. First of all it is believed that home user do not install proper and genuine security software which make them easy targets. Secondly, intruders also concentrate on them with an intention to steal valuable information such as credit card details or Internet bank account details stored on the computer, through malicious programs like Spyware. But, the question of how can a user predict, from which activity on Internet such attacks may happen arises. Well, the answer is very difficult as there are many ways and one can expect via email attachment, ad-banners and pop-up screens. Even sending valuable information through email can be hacked by the time recipient receives it. There are ways to protects system from these attacks. First of all Windows users have in-built security tools that includes malicious program remove tools which is also available in Linux, Mac and other Operating System. Users should enable this facility, which should be updated regularly, so that new database of latest Trojans, virus and malicious programs are available for that security software to protect your PC. This is free service and is available with Operating system but still anti-virus software which has higher list of virus definitions is needed to be installed. Some anti-virus programs are available for free which can be downloaded too. The intruders are quite capable and are also using malicious programs like Spyware, which can steal user's data as well as weaken the system to such an extent that it will be prone to more attacks. Even anti-virus program cannot help in such situations. Anti-Spyware software can also be used to stop the attack which is available for free or can be purchase. There is also a security program called Firewall which acts as a wall and doesn't allow any application to access the computer without users confirmation, this program is also need for computer security.
Important Computer Security Tools
Some important security tools for computer protection are as follow:
1) Anti-Spyware and Anti-malware protection tools
These tools are needed for malicious programs like Spyware and malware which are available in market or can be downloaded online. The standard names include WEBROOT, SPY BLASTER, STOPZILLA, WINDOWS DEFENDER etc. The top rate one such as SPY SWEEPER can be an asset for controlling attacks. Weekly and monthly updates are to be performed after installing for better results.
2) Firewalls and Anti-virus programs
Firewalls are sometime in-built in Anti-virus programs which can help in preventing unauthorized access of PC. If users have interest in installing high-end Firewall, ZoneAlarm Pro is the best option or else some well-known names include Online Armor Premium 5, Kaspersky Internet Security, Norton Internet Security, BitDefender Internet Security etc. The Comodo Internet Security has been high rated according to latest review by its users.
Though there is no guarantee that every security tool can help the users from malicious attacks, to some extent prevention can be done using these computer security tools if they are regularly updated.
Introduction to Spyware
It is estimated by Source: Facetime communications, that 80% and more than that of personal computers have the problem of spyware infected on its operating system. But
what exactly is this spyware and how is it different from other malicious programs?
It is simple program that hides in the background and collects information on users system without user's intervention. As it is hidden in background user may not recognize it.
Type of information it collects include personal information about the user and internet surfing details which include sites often visited details etc. It is also known that spyware installs additional software, changes computer setting, redirecting web browser activity and finally slows the overall performance of the computer. Even internet connection cannot perform well if a spyware is present in the system. So, the difference from other malicious programs like virus, worms, Trojans is that a Spyware program does not self-replicate itself.
Most of the time a spyware targets windows operating system only and some well-known spyware threats on Windows OS include Trymedia, Nuvens, Estalive, Hotbar etc.
Facts to note on Spyware
It is to be known that leaning about spyware is safe but too much suspicious is not needed and some misconception about it should be cleared by knowing it properly.
In general there is misunderstanding among Internet users that some advertising companies use spyware as medium to know users profile and shopping interests but it is not so. However, an Adware has similar features and it throws pop-up windows and gathers general information and habits about user.
There is very dangerous security problems connected with Spyware software as they connect with target computer remotely. The system can be vulnerable to outside attack other than spyware program.
A Spyware is illegal activity and in some countries it is having punishment that includes heavy penalty and imprisonment. So, before trying to install a Spyware of any system the hacker should think about this. However, some countries do not consider it illegal.
As said earlier the Spyware can be easily installed on any system and even technical knowledge is not needed for doing it. Sometimes it is believed that even a child can install it. There are companies which sell the Spyware software that is legitimate and are used by employers to monitor their employees.
Most of the Spyware software selling companies often convinces the buyers that it is untraceable but there is way to trace and remove it. Deleting history and cookies can be useless for users who are attacked by Spyware. However, anti-spyware software can work fine in such cases. As they use various detection methods to trace the Spyware which can be further removed.
As a point to note avoid unknown and suspicious programs to download on system by using good Internet security software.
How to detect and remove a Spyware
As said earlier, a Spyware is hidden program which can be installed in users system through some download or pop-up. So, inorder to detect it users should note the point whether they have done any download from unknown site. If the answer is yes then there is a chance of Spyware affecting the system. However, if the system performance degrades then only the doubt arises.
Some of the symptoms that can be noticed are:
1) Pop-up ads display themselves when user is offline and sometimes even username is display in that pop-up window.
2) On starting a browser some different content can be seen that usually do not occur before. Even on changing the setting of browser the same thing happens
3) Web search through browser shows some unknown sites which are not related to search
4) Favorites links change with some new websites been displayed. Even after deleting the same links may re-appear. Some unknown toolbar may also appear without any installation by user and often it is not removable or reappears in removing.
5) Suddenly the system performance degrades due to some unknown program using system resources fully.
6) Internet connection/modem icon in system tray may not function correctly or may act different. However if all these symptoms are not noticed particularly by the user then everything seems normal.
What is the solution?
There is often a solution for any malicious program that affects our system. But, some quick steps can also help for users who are not interested in installing Internet security software.
1) Pop-up blocking software is quiet useful such as Google or Alexa toolbars which have in-build pop-up blocker.
2) Spyware scanning should be done either through anti-spyware software such as SpyBot which is free software or remove with Internet security software.
Following these steps can be useful and also helps in securing the system from other outside attacks.
Password theft is becoming the most dangerous crime in our cyber society. Many times having no knowledge about cyber security leads people to beome victim of cyber-crime and loses their important money, data and much more. So at this point knowledge about methods crackers apply to steal passwords become of much importance. Let me clear one thing crackers don’t have any special quality. What they do is to look out for loop holes in the systems and play mind games with us.
There are various methods which are applied for password stealing. The mainly used methods are
- Phishing
- Key-logging
- Social engineering
- Java script hack
- Brute forcing
- Software hack
In this article I will tell you about phishing technique and how to prevent yourself from becoming the victim
PHISHING- As the name suggests its similar to fishing as we all know. Basic idea is same, every step performed is same. In fishing fisherman put a bait to lure fish and here also the cracker put a bait to lure people and then who give their attention to bait, needless to say what they get. First cracker sends an email to the person which has some catchy subject and body providing a link also saying that to avail this thing you first need to open your email through this link. When the person opens this link and enters his id, password and hit enter….he does the biggest mistake in his life….id and password get sent to the cracker and the login page which the victim is using shows that page can’t be reloaded/connection timed-out/server is not responding…..thus making user believe that he is using the original page and it’s a connection problem but what he really doesn’t know that this page is not the actual page of mail provider. Anyone can cross-check this by checking URL in address bar…it won’t have correct address of the mail provider…like for Gmail id it would have something like http://www.gmailmail.com or some catchy address but not the actual one http://www.gmail.com or http://www/mail.google.com
So a million dollar question arises- what should we do??? How to protect ourselves??? What to do after we hitting enter in the fake login page???
Well answers to all these questions are easy… all you need to do is to be aware because no email provider or bank asks its users/customers to open their id on an email. They can say visit your id but will not provide any link to login. You have to go on your own to their website and open your id yourself.
If you think you have opened any fake login page or if you are opening a suspicious link/mail, just check the address bar right in upper side of your browser…you will definitely know if you are at right place or not. Be aware
Now a new question arises- what should we do if we have opened the fake login page and entered our id and password???? Yeah…I’m coming to that question only……if you have entered your id and password and when message of server busy comes then you realized that you have done mistake…no need to worry then , just change your password right then because it may be probability that the cracker may not see your password right then…there may be some delay because he can’t be online 24 x7. There is very little chance because you now rely on cracker. But you should definitely try to change your password because it’s the only way to deal with this and many a times you can protect yourself
Now days it’s becoming very difficult for crackers to go for phishing because now people know about this method and don’t click on the malicious links.
Remember always that crackers always relies on your weakness…..so it’s you who can protect yourself…no one else can
This is all for phishing knowledge....Hope you enjoyed this article…..I will tell you about other methods of password stealing in coming posts….give me your feedback and feel free to ask question….
-(Helping you always)-
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 99 of 193