Showing posts with label viruses. Show all posts
Showing posts with label viruses. Show all posts

10 Worst Viruses Witnessed in History


History has a record of the 10 worst computer viruses that did not just beat the best anti-virus software, but gave nightmares to many security experts as well.
· The Morris worm
This was created back in 1998 and was named after a university student, Robert Morris, the same student who created the worm. This worm infected 10 percent of all the computers that were linked to the internet and there were about 60,000 computers connected to the internet at that time. The worm brought all the systems to halt.
· The Concept virus
Within a few days, this virus became the most disseminated virus ever.
· CIH
· Anna Kournikova worm
It infected Windows computers with an email worm. · ILOVEYOU
· The Melissa virus
Melissa is recognized as a fast-spreading macro virus which was circulated through an e-mail attachment. This virus was created by David L. Smith and was a successful email-ware.
· The Blaster Worm
Blaster worm was created in 2003 as a denial of service attack against the Microsoft's website. The author of this particular worm was never discovered.
Netsky and Sasser worms were discovered by Sven Jaschan, a German teenager. · OSX/RSPlug Trojan
· Storm worm
The Storm worm was originally perplexed as a bad weather breaking news affecting Europe. Actually, this virus was in the news in 2007 and influenced millions of PCs. Hackers circulated spam and stole millions of identities.
Author is a computer professional and blog writer who basically writes on various computer security topics. He brings many interesting reviews about the latest anti-virus software and inform readers about the best free antivirus download for their computer protection.
Article Source: http://EzineArticles.com/?expert=Alexs_Smith


Article Source: http://EzineArticles.com/7474189

Ten Worst Viruses Witnessed in History


History has a record of the 10 worst computer viruses that did not just beat the best anti-virus software, but gave nightmares to many security experts as well.
· The Morris worm
This was created back in 1998 and was named after a university student, Robert Morris, the same student who created the worm. This worm infected 10 percent of all the computers that were linked to the internet and there were about 60,000 computers connected to the internet at that time. The worm brought all the systems to halt.
· The Concept virus
Within a few days, this virus became the most disseminated virus ever.
· CIH
· Anna Kournikova worm
It infected Windows computers with an email worm. · ILOVEYOU
· The Melissa virus
Melissa is recognized as a fast-spreading macro virus which was circulated through an e-mail attachment. This virus was created by David L. Smith and was a successful email-ware.
· The Blaster Worm
Blaster worm was created in 2003 as a denial of service attack against the Microsoft's website. The author of this particular worm was never discovered.
Netsky and Sasser worms were discovered by Sven Jaschan, a German teenager. · OSX/RSPlug Trojan
· Storm worm
The Storm worm was originally perplexed as a bad weather breaking news affecting Europe. Actually, this virus was in the news in 2007 and influenced millions of PCs. Hackers circulated spam and stole millions of identities.
Author is a computer professional and blog writer who basically writes on various computer security topics. He brings many interesting reviews about the latest anti-virus software and inform readers about the best free antivirus download for their computer protection.
Article Source: http://EzineArticles.com/?expert=Alexs_Smith


Article Source: http://EzineArticles.com/7474189

Technology You Need to Keep Your IT Systems Safe

Protecting Your IT Systems
Protecting your IT systems is simple, with the appropriate technology. Anti-Virus Programs- Anti-virus programs can accumulate your computer safe from viruses, worms, and Trojans that try to affect your devices. Encryption- Encryption involves scrambling abstracts into a cipher and authoritative it cacographic to prying eyes. Those who don't accept the encryption key are clumsy to apprehend the advice your accessories contain. This protects castigation and your employee's claimed data, your emails, your files, and any added important advice back you are online and offline. Encryptioncomputer application is capital for your business, and should be acclimated constantly.
Firewalls- Firewalls are capital to attention your IT systems, because they accumulate your arrangement and adamantine drive from actuality accessed by hackers. By application technology like encryption, firewalls, and anti-virus programs, you can accumulate your advice secure.
There are added accomplish you can booty as well, to assure your information, including:
Disabled Fire Sharing- While book administration may accomplish business easier, it can be a actual big aegis danger. If your employee's computers are set up to allotment files and folder, you could be agreement your advice at risk. Hackers can calmly admission this information, abnormally if you are not application encryption software. Avoid Cookies- Online advertisement networks generally abode accolade on your adamantine disk. If you appetite to accumulate your IT systems safe, accomplish abiding you are application the appropriate technology and chase these few simple accomplish to assure your computers and adaptable accessories from viruses, hackers, Trojans, and worms.
Whether your business is attractive for Anti Virus solutions, email security, assay and advertisement software, two agency authentication, abstracts encryption, or added arrangement aegis solutions, TekData is appropriate for you. With accompaniment of the artcomputer application and solutions, we action training, webinars, troubleshooting, and accession assistance.

eScan Anti Virus & Spyware Toolkit Utility (formerly Microworld Antivirus Toolkit Utility) 12.0.29 DB 12.07.2010

Scan for Viruses, Spyware and Adware in your computer

eScan Antivirus Toolkit is a utility that enables you to scan and clean Viruses, Spyware, Adware and any other Malware that may have infected your computer. The eScan Antivirus Toolkit requires no installation and can be run directly from anywhere, on your computer, USB Drive or from a CD ROM.

You can also run eScan Antivirus Toolkit even if you already have other antivirus software installed on your computer. The eScan Antivirus Toolkit also gets updated on a daily basis with the latest updates to detect recently release spyware and adware, plus the engine is constantly being improvised for faster and intelligent detections.
Here are some key features of "eScan Anti Virus & Spyware Toolkit Utility (formerly Microworld Antivirus Toolkit Utility)":

· Scans & cleans your computer completely and provides reports of any viruses that it finds.
· Checks and cleans all illegal dialers that are present on your computer.
· Checks and clears you of any background illegal sniffers or tools like spyware, adware, keyloggers etc. running in the memory of your computer.
· You can add this utility to the startup list of programs on your computer so that it scans and clean your computer every time you start using it.
· When you download this utility you will get it with the latest updated list of viruses that can scan and clean your computer for all known viruses.
· No need to install. Just download and run the eScan Antivirus Toolkit to scan for viruses.

download here 

AIM Fix 1.6.322.106

Removes all known AIM viruses in one consolidated removal tool

AIM Fix was created to remove all known AIM viruses in one consolidated removal tool.

AIM Fix is designed to end the virus processes, delete the files, and remove registry keys created by the virus.

In AIM Fix, the entire virus removal process is automated so you don't have to do a thing. Just execute the application and you're done.
download here
Related Posts Plugin for WordPress, Blogger...