Tuesday, October 26, 2010

Cities.XL.2011-RELOADED - 1GB/4DL + 1 Link Only




Image


System Requirment:
CPU:   Intel core 2 duo or higher – 2.5 GHz and AMD equivalent, or higher    
RAM:   1GB RAM (XP); 1,5GB RAM (vista)    
VGA:   NVIDIA Geforce 8800/ATI Radeon HD 3850 or higher, 512 MB RAM   
DX:   DirectX® 9.0c   
OS:   Microsoft Windows XP SP3, Vista SP1 or 7   
HDD:   8GB  
Sound:   Compatible direct X 9


Megaupload - Full .ISO
http://www.megaupload.com/?d=V3Z5C67Q

Megaupload - 1GB Links 


http://www.megaupload.com/?d=O76UV7RF
http://www.megaupload.com/?d=F4ESDARQ
http://www.megaupload.com/?d=1WY05PGL
http://www.megaupload.com/?d=GF6IKUGE

RapidShare:
http://rapidshare.com/files/425133967/Game.rld-cx11.WaffeSS.iso.part1.rar
http://rapidshare.com/files/425133999/Game.rld-cx11.WaffeSS.iso.part2.rar
http://rapidshare.com/files/425134012/Game.rld-cx11.WaffeSS.iso.part3.rar
http://rapidshare.com/files/425134034/Game.rld-cx11.WaffeSS.iso.part4.rar

Fileserve:
http://www.fileserve.com/file/MjF45GC/Game.rld-cx11.WaffeSS.iso.part1.rar
http://www.fileserve.com/file/QjKm43b/Game.rld-cx11.WaffeSS.iso.part2.rar
http://www.fileserve.com/file/mcrrGgm/Game.rld-cx11.WaffeSS.iso.part3.rar
http://www.fileserve.com/file/bg7nyh7/Game.rld-cx11.WaffeSS.iso.part4.rar



How to install:
1. Download all files
2. Use WinRAR for extract files
3. Mount or burn image
4. Apply crack
5. Play game.

Civilization 5 [ENGLISH] [2010] 1GB/500MB

Image

Year: 2010
Genre: Strategy (Turn-based / Grand strategy) / 3D
Developer: Firaxis Games
Publisher: 2K Games
Publisher in Russia: 1C-SoftKlab
Language: English

3.251 GB ISO Image
3.100 GB when mounted
Game install is 4.50 GB
Game installed on Windows7/32bit/Pro 




Image
Image
Image


Game Info
For almost twenty years a series of Civilization worldwide has sold over
nine million copies of the game, making it the greatest global strategy today.

The fifth incarnation of the legendary Civilization "takes on a new level
of quality: opportunities and development options greatly increased, the
opponents have become smarter, network game - interesting and varied, and
the graphics - beautiful.

To hold his nation through the ages - from primitive society to a high-tech
civilization, to survive the golden age, and stand at the origins of world
religions, to reinvent the wheel, and a nuclear reactor, built the Pyramids
and the Statue of Liberty, to meet with the greatest political leaders, to
manifest themselves in the role of a diplomat or a strategist - Sid Meier's
Civilization V will realize your dreams!

Game Features
•INVITING PRESENTATION: Jump right in and play at your own pace with an
intuitive interface that eases new players into the game. Civ veterans
will appreciate the depth, detail and control that are highlights of the
series.
•BELIEVABLE WORLD: Ultra realistic graphics showcase lush landscapes for
you to explore, battle over and claim as your own. Art deco influences
abound in the menus and icons in the most well-designed Civ ever developed.
•COMMUNITY & MULTIPLAYER: Compete with Civ players all over the world or l
ocally in LAN matches, mod* the game in unprecedented ways, and install
mods directly from an in-game community hub without ever leaving the game.
Civilization V brings community to the forefront.
•WIDE SYSTEM COMPATIBILITY: Civilization V operates on many different systems,
from high end DX11 desktops to many laptops. Enjoy unlimited installations
on multiple PCs with your Steam account and take your Civ V experience with
you everywhere you go.
•ALL NEW FEATURES: A new hex-based gameplay grid opens up exciting new combat
and build strategies. City States become a new resource in your diplomatic
battleground. An improved diplomacy system allows you to negotiate with fully
interactive leaders. Custom music scores and orchestral recordings give Civ V
the level of polish and quality you expect from the series.

Minimum System Requirement
•Operating System: Windows® XP SP3/ Windows® Vista SP2/ Windows® 7
•Processor: Dual Core CPU
•Memory: 2GB RAM
•Hard Disk Space: 8 GB Free
•DVD-ROM Drive: Required for disc-based installation
•Video: 256 MB ATI HD2600 XT or better, 256 MB nVidia 7900 GS or better,
or Core i3 or better integrated graphics
•Sound: DirectX 9.0c-compatible sound card
•DirectX®: DirectX® version 9.0c
•Other Requirements:
software installations required (included with the game), Microsoft Visual
C++2008 Runtime Libraries and Microsoft Direc






MU 1GB links interchangable with File Serve 1GB
3.251 GB ISO Image. 1GB/4 Downloads
Language: English
5% Winrar Recovery Record included in downloads 


http://www.megaupload.com/?d=EPLZXSMY
http://www.megaupload.com/?d=UZZ0QPD6
http://www.megaupload.com/?d=9ZJCMOPE
http://www.megaupload.com/?d=G01EEK64
password: tooth



SKIDROW 1.0 crack "folder"


http://www.megaupload.com/?d=E1526OUM
password: tooth


How to install:
1-download files and run winrar "test archive"
2-extract ISO image to any folder
3-follow screen shot install below

Image
Image
Image
Image
Image
Image
Image
Image
Image
Image 







 








Fallout New Vegas [ENG][2010]DLC+Patch2 1GB/500MB

Year: October 19, 2010
Genre: Action / RPG / 3D
Developer: Obsidian Entertainment
Publisher: Bethesda Softworks

Language: English (voice, language, subtitles all English)
6.50 GB ISO Image-SKIDROW release
6.230 GB when mounted
Game install is 6.750 GB
Game installed on Windows7/64bit


Image
Image
Image

Game Info
Welcome to New Vegas - a city of dreamers and hunters for good
luck. Three groups are ruthless struggle for control of this oasis in
the post-apocalyptic desert. Those who are well armed and knows
for sure what he wants, is quickly become famous, but end up being
a lot of enemies. Do the hard way on a hot wasteland Mojave, go
to the Hoover Dam, walk on the streets of the glittering neon of
Vegas. While traveling, you will meet many colorful personalities,
will take part in clashes between factions of power hungry, and fight
with mutants of all stripes and sizes, and experience the unparalleled
power of weapons. Decide who will be your ally, or by choosing the
path of the hero's single, stand edinovlastnym King of New Vegas.

Game Features
* Hot Vegas.
Explore the vast spaces - from the provincial small towns scattered
across the Mojave Wasteland, to the magnificent shining lights of
the streets of New Vegas.
* Your word.
The war between competing factions will forever change the lives
of the inhabitants of the city. On whose side in this conflict will
take you, everything depends: who would have to meet and communicate,
who will be loyal companions, and who - a sworn enemy, and of
course, the final struggle for power.
* Fresh ideas.
The new system of communication with partners; reputation system -
remember: a backfire, and respond; mode "Hardcore" - for those
who are not looking for easy ways, special techniques-hand combat.
* To arms!
Arsenal is twice represented in Fallout 3: Now you have more than
enough funds to adequately respond to any threat. In addition,
the Vault-Tec engineers have developed a new weapon system
configuration that will repair and modify any dangerous "toys" in
any place at any time.
* The complete lawlessness.
Here is a huge world, you are free to choose there own path. Travel
and sightseeing, fight shoulder to shoulder with those who, in your
opinion, it is worth, or become a lone hero - it's your world, this is
your game!

Minimum System Requirement
- Operating system Windows 7/Vista/XP;
- Dual-Core processor with 2 GHz;
- 2 GB of RAM;
- 10 GB of free hard disk space;
- Graphics Card NVIDIA GeForce series 6/ATI Series 1300XT or better;
- Sound card;
- Device for reading DVD;
- Keyboard and mouse.


MU 1GB links interchangable with File Serve 1GB
6.50 GB ISO Image-SKIDROW release. 1GB/7 Downloads
Language: English
5% Winrar Recovery Record included in downloads
Image
Code:

http://www.megaupload.com/?d=VARACN2J
http://www.megaupload.com/?d=C6JO637A
http://www.megaupload.com/?d=MYXUASG2
http://www.megaupload.com/?d=7ZKRRU90
http://www.megaupload.com/?d=J73ZNLRO
http://www.megaupload.com/?d=RRUL9V9Z
http://www.megaupload.com/?d=DIVV7POJ
password: tooth


PostPosted: Tue Oct 19, 2010 7:15 pm   Post subject: [MU/FS/RS] Fallout New Vegas [ENG][2010]DLC+Patch2 1GB/500MB Reply with quote Report postBack to top

Image

Making a YouTube video of my in-game play. Maybe this will help
you decide if you wish to download this game.
This is a quick intro teaser only Smile 1080 HD
Code:
http://www.youtube.com/watch?v=eiWh_nvRboc

About 90 seconds of in-game play called "Critter Control".
Code:
http://www.youtube.com/watch?v=HJs_XrMJbNY


**I put a lot of work into my screen shots, I dont approve you
to copy/paste my work without asking. I hope others that
enjoy my game topics will agree Smile ***



Year: October 19, 2010
Genre: Action / RPG / 3D
Developer: Obsidian Entertainment
Publisher: Bethesda Softworks

Language: English (voice, language, subtitles all English)
6.50 GB ISO Image-SKIDROW release
6.230 GB when mounted
Game install is 6.750 GB
Game installed on Windows7/64bit


Image
Image
Image

Game Info
Welcome to New Vegas - a city of dreamers and hunters for good
luck. Three groups are ruthless struggle for control of this oasis in
the post-apocalyptic desert. Those who are well armed and knows
for sure what he wants, is quickly become famous, but end up being
a lot of enemies. Do the hard way on a hot wasteland Mojave, go
to the Hoover Dam, walk on the streets of the glittering neon of
Vegas. While traveling, you will meet many colorful personalities,
will take part in clashes between factions of power hungry, and fight
with mutants of all stripes and sizes, and experience the unparalleled
power of weapons. Decide who will be your ally, or by choosing the
path of the hero's single, stand edinovlastnym King of New Vegas.

Game Features
* Hot Vegas.
Explore the vast spaces - from the provincial small towns scattered
across the Mojave Wasteland, to the magnificent shining lights of
the streets of New Vegas.
* Your word.
The war between competing factions will forever change the lives
of the inhabitants of the city. On whose side in this conflict will
take you, everything depends: who would have to meet and communicate,
who will be loyal companions, and who - a sworn enemy, and of
course, the final struggle for power.
* Fresh ideas.
The new system of communication with partners; reputation system -
remember: a backfire, and respond; mode "Hardcore" - for those
who are not looking for easy ways, special techniques-hand combat.
* To arms!
Arsenal is twice represented in Fallout 3: Now you have more than
enough funds to adequately respond to any threat. In addition,
the Vault-Tec engineers have developed a new weapon system
configuration that will repair and modify any dangerous "toys" in
any place at any time.
* The complete lawlessness.
Here is a huge world, you are free to choose there own path. Travel
and sightseeing, fight shoulder to shoulder with those who, in your
opinion, it is worth, or become a lone hero - it's your world, this is
your game!

Minimum System Requirement
- Operating system Windows 7/Vista/XP;
- Dual-Core processor with 2 GHz;
- 2 GB of RAM;
- 10 GB of free hard disk space;
- Graphics Card NVIDIA GeForce series 6/ATI Series 1300XT or better;
- Sound card;
- Device for reading DVD;
- Keyboard and mouse.


MU 1GB links interchangable with File Serve 1GB
6.50 GB ISO Image-SKIDROW release. 1GB/7 Downloads
Language: English
5% Winrar Recovery Record included in downloads
Image
Code:

http://www.megaupload.com/?d=VARACN2J
http://www.megaupload.com/?d=C6JO637A
http://www.megaupload.com/?d=MYXUASG2
http://www.megaupload.com/?d=7ZKRRU90
http://www.megaupload.com/?d=J73ZNLRO
http://www.megaupload.com/?d=RRUL9V9Z
http://www.megaupload.com/?d=DIVV7POJ
password: tooth


File Serve 1GB links interchangable with MU 1GB
6.50 GB ISO Image-SKIDROW release. 1GB/7 Downloads
Language: English
5% Winrar Recovery Record included in downloads
Image
Code:

http://www.fileserve.com/file/bc4awCS/1019_fnv_sr.part1.rar
http://www.fileserve.com/file/HN3YCNA/1019_fnv_sr.part2.rar
http://www.fileserve.com/file/4P6pSjk/1019_fnv_sr.part3.rar
http://www.fileserve.com/file/2uHrgCv/1019_fnv_sr.part4.rar
http://www.fileserve.com/file/jYd5kFt/1019_fnv_sr.part5.rar
http://www.fileserve.com/file/gMZJFsC/1019_fnv_sr.part6.rar
http://www.fileserve.com/file/9ABUMMK/1019_fnv_sr.part7.rar
password: tooth


Rapid Share 500MB/15 downloads
6.50 GB ISO Image-SKIDROW release. 1GB/7 Downloads
Language: English
5% Winrar Recovery Record included in downloads
Image
Code:
http://safelinking.net/p/3e66e11374
password: tooth






SKIDROW Update patch 1 October 21st
Double Click the exe to install, apply the cracks last (v1.0 crack)
Image
Code:
http://www.megaupload.com/?d=ADKA2IOK
password: tooth

Image
Code:
http://www.fileserve.com/file/7NqqwKj/1019_fnv_update1_patch_only.rar
password: tooth


SKIDROW Update patch 2 October 24st
Double Click the exe to install, apply the cracks last (v1.0 crack)
Image
Code:
http://www.megaupload.com/?d=S9XGYKUR
password: tooth

Image
Code:
http://www.fileserve.com/file/xm3Hv5f/1019_fnv_update2.rar
password: tooth


SKIDROW 1.0 crack file Oct 19th
Image
Code:
http://www.megaupload.com/?d=B1RNKTOR
password: tooth

Image
Code:
http://www.fileserve.com/file/RuvnWNz/1019_fnv_sr_crack.rar
password: tooth

How to install:
1-download files and run winrar "test archive"
2-extract ISO image to any folder
3-follow screen shot install below

Image
Image
Image
Image
Image
        









                


   

Sunday, October 24, 2010

KaraFun-Seperate Voice from music file.

Turn your PC into an interactive karaoke machine with the KaraFun free karaoke software for Windows. More than just a karaoke player, KaraFun offers a complete solution for playing and creating karaoke at home.
Fun and exciting, it plays nearly every karaoke file: KFN, KAR, CDG, KOK, LRC, AVI, MPEG... The user-friendly KaraFun editor enables you to create, quickly and easily, your own karaoke songs from Audio and MIDI music files: MP3, OGG, KAR, MID...
Based on a powerful and revolutionary 3D animation engine for animated lyrics and background, your karaoke party in full screen has every chance of being a success!



Download: 
http://42ebaf22.linkbucks.com

(Skip the ad if appear)

Thursday, September 9, 2010

For PAKISTANI Only!

If you want updates from me through mobile  then write in your text message.

Follow Mr_Ultimate

And send it to

2323 For Zong and Ufone
9536 For Warid

Computer Virus !!!

A computer virus is a computer program which distributes copies of itself without the permission or knowledge of the user. A computer virus is often simply called a virus. The term is commonly used to refer to a range of malware, but a true virus does not need to be harmful. To distribute itself, a virus needs to execute. Viruses often hide themselves inside other programs to be executed.
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of it self over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.

How viruses work

A computer virus will pass from one computer to another in the same way that a real life biological virus passes from person to person. For example, it is estimated by experts that the Mydoom worm infected a quarter-million computers in a single day in January 2004. Another example is the ILOVEYOU virus, which occurred in 2000 and had a similar effect. There are tens of thousands of viruses out there, and new ones are discovered every day. While a generic explanation of how viruses work is difficult due to the wide variety of infection or spreading patterns, there are broad categories commonly used to describe various types of viruses.

Basic types of viruses

1.File viruses

File viruses, also known as parasitic or executable viruses, are pieces of code that attach themselves to executable files, driver files or compressed files, and are activated when the host program is run. After activation, the virus may spread itself by attaching itself to other programs in the system, and also carry out the malevolent activity for which it was programmed. Most file viruses spread by loading themselves in system memory and looking for any other programs located on the drive. If it finds one, it modifies the program’s code so that it contains and activates the virus the next time it’s run. It keeps doing this over and over until it spreads across the system, and possibly to other systems that the infected program may be shared with. Besides spreading themselves, these viruses also carry some type of destructive constituent that can be activated immediately or by a particular ‘trigger’. The trigger could be a specific date, or the number of times the virus has been replicated, or anything equally trivial. Some examples of file viruses are Randex, Meve and MrKlunky

Boot sector viruses

A boot sector virus affects the boot sector of a hard disk, which is a very crucial part. The boot sector is where all information about the drive is stored, along with a program that makes it possible for the operating system to boot up. By inserting its code into the boot sector, a virus guarantees that it loads into memory during every boot sequence. A boot virus does not affect files; instead, it affects the disks that contain them. Perhaps this is the reason for their downfall. During the days when programs were carried around on floppies, the boot sector viruses used to spread like wildfire. However, with the CD-ROM revolution, it became impossible to infect pre-written data on a CD, which eventually stopped such viruses from spreading. Though boot viruses still exist, they are rare compared to new-age malicious software. Another reason why they’re not so prevalent is that operating systems today protect the boot sector, which makes it difficult for them to thrive. Examples of boot viruses are Polyboot.B and AntiEXE.

Multipartite viruses

Multipartite viruses are a combination of boot sector viruses and file viruses. These viruses come in through infected media and reside in memory. They then move on to the boot sector of the hard drive. From there, the virus infects executable files on the hard drive and spreads across the system. There aren’t too many multipartite viruses in existence today, but in their heyday, they accounted for some major problems due to their capacity to combine different infection techniques. A well-known multipartite virus is Ywinz.

Macro viruses

Macro viruses infect files that are created using certain applications or programs that contain macros. These include Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases and other similar application files such as Corel Draw, AmiPro etc. Since macro viruses are written in the language of the application and not in that of the operating system, they are known to be platform-independent—they can spread between Windows, Mac and any other system, so long as they are running the required application. With the ever-increasing capabilities of macro languages in applications, and the possibility of infections spreading over networks, these viruses are major threats. The first macro virus was written for Microsoft Word and was discovered back in August 1995. Today, there are thousands of macro viruses in existence—some examples are Relax, Melissa.A and Bablas.

Network viruses

This kind of virus is proficient in quickly spreading across a Local Area Network (LAN) or even over the Internet. Usually, it propagates through shared resources, such as shared drives and folders. Once it infects a new system, it searches for potential targets by searching the network for other vulnerable systems. Once a new vulnerable system is found, the network virus infects the other system, and thus spreads over the network. Some of the most notorious network viruses are Nimda and SQLSlammer.

Email Viruses

An email virus could be a form of a macro virus that spreads itself to all the contacts located in the host’s email address book. If any of the email recipients open the attachment of the infected mail, the virus spreads to the new host’s address book contacts, and then proceeds to send itself to all those contacts as well. Email viruses can infect hosts even by previewing the infected email in a mail client.

There are many ways in which a virus can infect or stay dormant on your PC. However, whether active or dormant, it is dangerous to let one loose on your system, and it should be dealt with immediately.

Other malicious software

Earlier, the only way a computer was at risk was when you inserted an infected floppy. With the new age of technology, almost every computer is interconnected to the rest of the world at some point or other, so it’s difficult to pinpoint the source and/or time of the infection. As if that weren’t bad enough, new-age computing has also brought about a new breed of malicious software. Today, the term ‘virus’ has become a generic term used for all the different ways that your computer can be attacked by malicious software. Besides the type of viruses we mentioned, here are some of the newer problems we face today.

Trojan horses

File-Destructive Trojans

The only function of these Trojans is to destroy and delete files. They can automatically delete all the core system files on your machine. The Trojan could be controlled by the attacker or could be programmed to strike like a logic bomb, starting on a specific day or hour.
The main idea behind Denial of Service (DoS) Attack Trojans is to generate a lot of Internet traffic on the victim’s machine, to the extent that the Internet connection is too overloaded to let the user visit a website or download anything. Another variation of a DoS Trojan is the mail-bomb Trojan, whose main aim is to infect as many machines as possible and simultaneously attack specific email addresses with random subjects and contents that cannot be filtered.

Proxy/Wingate Trojans

These types of Trojan turn the victim’s computer into a proxy/wingate server. That way, the infected computer is available to the whole world to be used for anonymous access to various risky Internet services. The attacker can register domains or access pornographic Web sites with stolen credit cards or do similar illegal activities without being traced.

FTP Trojans

These trojans are probably the most simple, and are outdated. The only thing they do is open port 21 — the port for FTP transfers — and let everyone connect to your machine. Newer versions are password-protected, so only the attacker can connect to your computer.

Software Detection Killers

These Trojans kill popular anti-virus/firewall programs that protect your machine, to give the attacker access to it. A Trojan could have any one or a combination of the above-mentioned functionalities.

Worms

Computer Worms are programs that reproduce and run independently, and travel across network connections. The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependent on a host file or boot sector and on the transfer of files between machines to spread, while a worm can run completely independently and spread of its own accord through network connections. The security threat of worms is equivalent to that of a virus. Worms are capable of doing a whole range of damage such as destroying essential files in your system, slowing it down to a great extent, or even causing some essential programs to crash. Two famous examples of worms are the MS-Blaster and Sasser worms.

Spy ware

Spy ware is another term for advertising-supported software (Ad ware). Advertising in shareware products is a way for shareware authors to make money, other than by selling it to the user. There are several large media companies that offer to place banner ads in their products in exchange for a portion of the revenue from banner sales. If the user finds the banners annoying, there is usually an option to get rid of them by paying the licensing fee. The advertising companies often also install additional tracking software on your system, which is continuously using your Internet connection to send statistical data back to the advertisers. While the privacy policies of the companies claim there will be no sensitive or identifying data collected from your system and that you shall remain anonymous, the fact remains that your PC is acting as a server, sending information about you and your surfing habits to a remote location, using your bandwidth.
Spyware has been known to slow down computers with its semi-intensive usage of processing power, bringing up annoying pop-up windows at the most inappropriate times and changing your Internet browsing settings such as your home page or default search engine to their own services. As well as being illegal, this is a major security threat, and the fact that there is no way to get rid of them makes them as much of a nuisance as viruses.

Classification

Viruses can be subdivided into a number of types, the main ones being:

• Boot sector viruses
• Companion viruses
• Email viruses
• Logic bombs and time bombs
• Macro viruses
• Sentinels
• WB Microworm
• Cross-site scripting virus
• The invisible Halo Virus

Two other types of malware are often classified as viruses, but are actually forms of distributing malware:

• Trojan horses
• Worms

Boot sector virus

A boot sector virus alters or hides in the boot sector, usually the 1st sector, of a bootable disk or hard drive. Boot sector viruses were prevalent in the 1980s.

Companion virus

A companion virus[1] does not have host files per se, but exploits MS-DOS. A companion virus creates new files (typically .COM but can also use other extensions such as ".EXD") that have the same file names as legitimate .EXE files. When a user types in the name of a desired program, if a user does not type in ".EXE" but instead does not specify a file extension, DOS will assume he meant the file with the extension that comes first in alphabetical order and run the virus. For instance, if a user had "(filename).COM" (the virus) and "(filename).EXE" and the user typed "filename", he will run "(filename).COM" and run the virus. The virus will spread and do other tasks before redirecting to the legitimate file, which operates normally. Some companion viruses are known to run under Windows 95 and on DOS emulators on Windows NT systems. Path companion viruses create files that have the same name as the legitimate file and place new virus copies earlier in the directory paths. These viruses have become increasingly rare with the introduction of Windows XP,which does not use the MS-DOS command prompt.

E-mail virus

An E-mail virus is a virus which uses e-mail messages as a mode of transport. These viruses often copy themselves by automatically mailing copies to hundreds of people in the victim's - Fishbert Regina Sk address book.

Logic bomb

A logic bomb employs code that lies inert until specific conditions are met. The resolution of the conditions will trigger a certain function (such as printing a message to the user and/or deleting files). Logic bombs may reside within standalone programs, or they may be part of worms or viruses. An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts. A time bomb is a subset of logic bomb, which is set to trigger on a particular date and/or time. An example of a time bomb is the infamous ‘Friday the 13th’ virus.

Macro virus

A macro virus, often written in the scripting languages for programs such as Word and Excel, is spread by infecting documents and spreadsheets.

Cross-site scripting virus

A cross-site scripting virus (XSSV) is a type of virus that utilizes cross-site scripting vulnerabilities to replicate. A XSSV is spread between vulnerable web applications and web browsers creating a symbiotic relationship.

Sentinels

A sentinel is a highly advanced virus capable of empowering the creator or perpetrator of the virus with remote access control over the computers that are infected. They are used to form vast networks of zombie or slave computers which in turn can be used for malicious purposes such as a Distributed Denial of Service attack.

Trojan horse

Trojan Horses are impostor files that claim to be something desirable but, in fact, are malicious. Rather than insert code into existing files, a Trojan horse appears to do one thing (install a screen saver, or show a picture inside an e-mail, for example) when in fact it does something entirely different, and potentially malicious, such as erase files. Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information stored on a computer.
Although often referred to as such, Trojan horses are not viruses in the strict sense because they cannot replicate automatically. For a Trojan horse to spread, it must be invited onto a computer by the user opening an email attachment or downloading and running a file from the Internet, for example.

Worm

A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating a new worm.
Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. Mydoom or ILOVEYOU are two examples of worms.

Effects of computer viruses

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.

Use of the word "virus"

computer virus acronym V.I.R.U.S. - Vital Information Resources Under Siege
The word virus is derived from and used in the same sense as the biological equivalent. The term "virus" is often used in common parlance to describe all kinds of malware (malicious software), including those that are more properly classified as worms or Trojans. Most popular anti-virus software packages defend against all of these types of attack. In some technical communities, the term "virus" is also extended to include the authors of malware, in an insulting sense. The English plural of "virus" is "viruses". Some people use "virii" or "viri" as a plural, but this is rare. For a discussion about whether "viri" and "virii" are correct alternatives of "viruses", see plural of virus.
The term "virus" was first used in an academic publication by Fred Cohen in his 1984 paper Experiments with Computer Viruses, where he credits Len Adleman with coining it. However, a 1972 science fiction novel by David Gerrold, When H.A.R.L.I.E. Was One, includes a description of a fictional computer program called "VIRUS" that worked just like a virus (and was countered by a program called "VACCINE"). The term "computer virus" with current usage also appears in the comic book Uncanny X-Men #158, written by Chris Claremont and published in 1982. Therefore, although Cohen's use of "virus" may, perhaps, have been the first "academic" use, the term had been used earlier.

History

A program called "Elk Cloner" is credited with being the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created. Written in 1982 by Rich Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. This virus was originally a joke, created by the high school student and put onto a game. The game was set to play, but release the virus on the 50th time of starting the game. Only this time, instead of playing the game, it would change to a blank screen that read a poem about the virus named Elk Cloner. The computer would then be infected.
The first PC virus was a boot sector virus called (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi, operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written. However, analysts have claimed that the Ashar virus, a variant of Brain, possibly predated it based on code within the virus.
Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk.
Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS and modem use, and software sharing. Bulletin board driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's. Within the "pirate scene" of hobbyists trading illicit copies of commercial software, traders in a hurry to obtain the latest applications and games were easy targets for viruses.
Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well. Most of these viruses did not have the ability to send infected e-mail. Those viruses which did spread through e-mail took advantage of the Microsoft Outlook COM interface.
Macro viruses pose unique problems for detection software. For example, some versions of Microsoft Word allowed macros to replicate themselves with additional blank lines. The virus behaved identically but would be misidentified as a new virus. In another example, if two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents".[2]
A computer virus may also be transmitted through instant messaging. A virus may send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) and follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.
The newest species of the virus family is the cross-site scripting virus. The virus emerged from research and was academically demonstrated in 2005. This virus utilizes cross-site scripting vulnerabilities to propagate. Since 2005 there have been multiple instances of the cross-site scripting viruses in the wild, most notable sites affected have been MySpace and Yahoo.

Why people create computer viruses

Unlike biological viruses, computer viruses do not simply evolve by themselves. Computer viruses do not come into existence spontaneously, nor are they likely to be created by bugs in regular programs. They are deliberately created by programmers, or by people who use virus creation software. Computer viruses can only do what the programmers have programmed them to do.
Virus writers can have various reasons for creating and spreading malware. Viruses have been written as research projects, pranks, vandalism, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines. Many writers consider the systems they attack an intellectual challenge or a logical problem to be solved; this multiplies when a cat-and-mouse game is anticipated against anti-virus software. Some viruses were intended as "good viruses". They spread improvements to the programs they infect, or delete other viruses. These viruses are, however, quite rare, still consume system resources, may accidentally damage systems they infect, and, on occasion, have become infected and acted as vectors for malicious viruses. A poorly written "good virus" can also inadvertently become a virus in and of itself (for example, such a 'good virus' may misidentify its target file and delete an innocent system file by mistake). Moreover, they normally operate without asking for the permission of the computer owner. Since self-replicating code causes many complications, it is questionable if a well-intentioned virus can ever solve a problem in a way that is superior to a regular program that does not replicate itself. In short, no single answer is likely to cover the broad demographic of virus writers.
Releasing computer viruses (as well as worms) is a crime in most jurisdictions.
See also the BBC News article.[3]

Replication strategies

In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user tries to start an infected program, the virus' code may be executed first. Viruses can be divided into two types, on the basis of their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect these targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.

Nonresident viruses

Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.
For simple viruses the replicator's tasks are to:

1. Open the new file
2. Check if the executable file has already been infected (if it is, return to the finder module)
3. Append the virus code to the executable file
4. Save the executable's starting point
5. Change the executable's starting point so that it points to the start location of the newly copied virus code
6. Save the old start location to the virus in a way so that the virus branches to that location right after its execution.
7. Save the changes to the executable file
8. Close the infected file
9. Return to the finder so that it can find new files for the replicator to infect.

Resident viruses

Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. However, this module is not called by a finder module. Instead, the virus loads the replication module into memory when it is executed and ensures that this module is executed each time the operating system is called to perform a certain operation. For example, the replication module can be called each time the operating system executes a file. In this case, the virus infects every suitable program that is executed on the computer.
Resident viruses are sometimes subdivided into a category of fast infectors and a category of slow infectors. Fast infectors are designed to infect as many files as possible. For instance, a fast infector can infect every potential host file that is accessed. This poses a special problem to anti-virus software, since a virus scanner will access every potential host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory, the virus can "piggy-back" on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. For instance, some slow infectors only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably, and will at most infrequently trigger anti-virus software that detects suspicious behavior by programs. The slow infector approach does not seem very successful however.

Host types

Viruses have targeted various types of hosts. This is a non-exhaustive list:

• Binary executable files (such as COM files and EXE files in MS-DOS, Portable Executable files in Microsoft Windows, and ELF files in Linux)
• Volume Boot Records of floppy disks and hard disk partitions
• The master boot record (MBR) of a hard disk
• General-purpose script files (such as batch files in MS-DOS and Microsoft Windows, VBScript files, and shell script files on Unix-like platforms).
• Application-specific script files (such as Telix-scripts)
• Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files)

Methods to avoid detection

In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool anti-virus software, however.
Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files had many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.
Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.
As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced.
Avoiding bait files and other undesirable hosts
A virus needs to infect hosts in order to spread further. In some cases, it might be a bad idea to infect a host program. For example, many anti-virus programs perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of anti-virus software. Another type of hosts that viruses sometimes avoid is bait files. Bait files (or goat files) are files that are specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus:

• Anti-virus professionals can use bait files to take a sample of a virus (i.e. a copy of a program file that is infected by the virus). It is more practical to store and exchange a small, infected bait file, than to exchange a large application program that has been infected by the virus.
• Anti-virus professionals can use bait files to study the behavior of a virus and evaluate detection methods. This is especially useful when the virus is polymorphic. In this case, the virus can be made to infect a large number of bait files. The infected files can be used to test whether a virus scanner detects all versions of the virus.
• Some anti-virus software employs bait files that are accessed regularly. When these files are modified, the anti-virus software warns the user that a virus is probably active on the system.

Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of 'garbage instructions'.
A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week.
Stealth
Some viruses try to trick anti-virus software by intercepting its requests to the operating system. A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it seems that the file is "clean". Modern anti-virus software employs various techniques to counter stealth mechanisms of viruses. The only completely reliable method to avoid stealth is to boot from a medium that is known to be clean.

Self-modification

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses. If a virus scanner finds such a pattern in a file, it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.

Simple self-modifications

In the past, some viruses modified themselves only in simple ways. For example, they regularly exchanged subroutines in their code for others that would perform the same action - for example, 2+2 could be swapped for 1+3. This poses no problems to a somewhat advanced virus scanner.

Encryption with a variable key

A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible.
Mostly, the decryption techniques that these viruses employ are simple and mostly done by just XORing each byte with a randomized key that was saved by the parent virus. The use of XOR-operations has the additional advantage that the encryption and decryption routine are the same (a XOR b = c, c XOR b = a.)

Polymorphic code

Polymorphic code was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. In the case of polymorphic viruses however, this decryption module is also modified on each infection. A well-written polymorphic virus therefore has no parts that stay the same on each infection, making it impossible to detect directly using signatures. Anti-virus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine) somewhere in its encrypted body. See Polymorphic code for technical detail on how such engines operate.
Some viruses employ polymorphic code in a way that constrains the mutation rate of the virus significantly. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. The advantage of using such slow polymorphic code is that it makes it more difficult for anti-virus professionals to obtain representative samples of the virus, because bait files that are infected in one run will typically contain identical or similar samples of the virus. This will make it more likely that the detection by the virus scanner will be unreliable, and that some instances of the virus may be able to avoid detection.

Metamorphic code

To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables. Viruses that use this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine is needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14000 lines of Assembly language code, 90% of it part of the metamorphic engine.

Vulnerability and countermeasures

The vulnerability of operating systems to viruses

Another analogy to biological viruses: just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses.
This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. The users of Microsoft software (especially networking software such as Microsoft Outlook and Internet Explorer) are especially vulnerable to the spread of viruses. Microsoft software is targeted by virus writers due to their desktop dominance, and is often criticized for including many errors and holes for virus writers to exploit. Integrated applications, applications with scripting languages with access to the file system (for example Visual Basic Script (VBS), and applications with networking features) are also particularly vulnerable.
Although Windows is by far the most popular operating system for virus writers, some viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. Some operating systems are less secure than others. Unix-based OS's (and NTFS-aware applications on Windows NT based platforms) only allow their users to run executables within their protected space in their own directories.
As of 2006, there are relatively few security exploits [4] targeting Mac OS X (a Unix-based operating system); the known vulnerabilities fall under the classifications of worms and Trojans. The number of viruses for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. It is safe to say that Macs are less likely to be exploited due to their secure Unix base, and because a Mac-specific virus could only infect a small proportion of computers (making the effort less desirable). Virus vulnerability between Macs and Windows was/is a chief catalyst of the platform wars between Apple Computer and Microsoft.
Windows and Unix have similar scripting abilities, but while Unix natively blocks normal users from having access to make changes to the operating system environment, Windows does not. In 1997, when a virus for Linux was released – known as "Bliss" – leading antivirus vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows.[5] The Bliss virus may be considered characteristic of viruses – as opposed to worms – on Unix systems. Bliss requires that the user run it explicitly, and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked.[6]

The role of software development

Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits.
Closed-source software development, as practiced by Microsoft and other proprietary software companies, is seen by many as a security weakness. Open source software such as Linux, for example, allows all users to look for and fix security problems without relying on a single vendor. Some advocate that proprietary software makers practice vulnerability disclosure to improve this weakness.
On the other hand, some claim that open source development exposes potential security problems to virus writers, hence increases in the prevalence of exploits. They claim that popular closed source systems such as Windows are often exploited by claiming that these systems are only commonly exploited due to their popularity and the potential widespread effect such an exploit will have.

Anti-virus software and other preventative countermeasures

There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms’ have yet to create a signature for.
Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content heuristics of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. There have been attempts to do this but adoption of such anti-virus solutions can void the warranty for the host software. Users must therefore update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to gain knowledge about the latest threats.
One may also prevent the damage done by viruses by making regular backups of data (and the Operating Systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like cd and DVD is closed, it becomes read-only and can no longer be affected by a virus. Likewise, an Operating System on a live cd can be used to start the computer if the installed Operating Systems become unusable. Another method is to use different Operating Systems on different file systems. A virus is not likely to affect both. Data backups can also be put on different file systems. For example, Linux requires specific software to write to NTFS partitions, so if one does not install such software and uses a separate installation of MS Windows to make the backups on an NTFS partition (and preferably only for that reason), the backup should remain safe from any Linux viruses. Likewise, MS Windows can not read file systems like ext3, so if one normally uses MS Windows, the backups can be made on an ext3 partition using a Linux installation.

Recovery Methods

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

Virus Removal

One possibility on Windows XP is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint.

Operating System Reinstallation

In the most extreme circumstances, the reinstallation of the operating system is required. To do this properly, the hard drive is completely erased and the operating system is installed from media known not to be infected.

The Ten Most Dangerous Viruses

Panda Software, leading antivirus software developer, has published a list of the ten most prevalent viruses in 2002 based on the data compiled from Panda ActiveScan, the free, online antivirus.

There's no doubt that this year's most virulent malicious code has been Klez.I, responsible for nearly 18 percent of all infections. This ruthless virus uses a two-pronged attack. On the one hand using 'social-engineering' under a multitude of guises, to trick users, and on the other exploiting a known vulnerability in Microsoft Internet Explorer to run automatically when viewed in the Preview Pane.

In second place, although responsible for less than five percent of total infections, comes Bugbear. This worm exploits the same vulnerability as Klez.I and is able to block certain application processes including those of some antiviruses and personal firewalls. It also opens port 36794 on the computer under attack to create a backdoor that could be used by a hacker to gain remote access to the computer or network.

Right behind Bugbear comes Elkern.C. The prevalence of this virus throughout 2002 is due largely to the fact that it is installed on computers by the Klez.I worm.

The tenacious Nimda, the culprit in just over three percent of cases, holds fourth place in the Top Ten list. This virus was first detected in September 2001 when it reached epidemic proportions. Its persistence is largely due to its exploiting of both an Internet Explorer vulnerability (the same one asexploited by Klez.I) and a flaw affecting Microsoft IIS, allowing Nimda to infect both directly and indirectly, via Internet downloads.

In fifth place is Sircam, which has appeared in nearly all monthly rankings of virulent malicious code since August 2001, no doubt due to its cunning use of social engineering techniques.

The remaining five viruses to make up this year's ranking are Grade.A, Help, Magistr.B, Klez.F and the PSW/Bugbear Trojan horse. Despite seemingly low infection rates -all of them were responsible for less than three percent of total infections- the continuous appearance of such viruses once again highlights the need for users to take the protection of their IT resources seriously.


Ranking Name Percentage frequency
1 W32/Klez.I 17.96%
2 W32/Bugbear 4.41%
3 W32/Elkern.C 3.70%
4 W32/Nimda 3.22%
5 W32/Sircam 2.94%
6 W32/Grade.A 2.91%
7 VBS/Help 2.72%
8 W32/Magistr.B 2.63%
9 W32/Klez.F 2.47%
10 Trj/PWS.Bugbear 2.30%

The Difference between a Virus, Worm and Trojan horse

The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.
A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.Â* People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In more recent worm attacks such as the much-talked-about .Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.Â* Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.Â* When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
Added into the mix, we also have what is called a blended threat. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses

The first steps to protecting your computer are to ensure your operating system (OS) is up-to-date. This is essential if you
are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. You should also install a firewall as well.
A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall.Â* A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.
It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

Recommanded Antivirus Software

Norton, AVG, Panda, ZoneAlarm, NOD32, SpyDoctor, MacAfee..............

Frozen (2010)[700mb]DVDRip



Download:
http://www.megaupload.com/?d=O7LO88I9

The Other Guys (2010)[1.37Gb]DVDScr Premium Only - Splitting into 2 Files...


Premium Link:
http://www.megaupload.com/?d=6J70PQ12

Stomp The Yard 2 Homecoming (2010)[697mb]DVDRip


Chance Harris looks to find a balance between his school, work, relationships and opportunity to perform at the nationally televised step competition during homecoming weekend at Truth University.

 Download:
http://www.megaupload.com/?d=ZIBB5V04

Wrath of Cain (2010)[979mb]DVDRip







Download:
http://www.megaupload.com/?d=PO9F63LX

Shank (2010)[701mb]DVDRip



Download:
http://www.megaupload.com/?d=OTV0ZVHI