Saturday, August 21, 2010
Secure your PC from Internet browsing risks
Learn more about it, and download at http://www.kace.com/products/freetools/secure-browser/
Download now, its free.
Thursday, April 2, 2009
Remove Downadup/Conficker/Kido Worm from your PC
This worm is one of the most deadly worm which attacks your network and modify your system settings. It gets launched automatically at system startup and stays in memory in stealth mode to prevent its detection. It spreads itself through pen drives, network holes and it also features a method of cracking administrator password.
Almost all the antivirus vendors have released separate tools to remove the worm. These standalone programs do not require any installation. Just download, unzip/extract if required and then run on the infected PC.
There are lot of tools available on web which can remove various versions of Conficker aka Downadup aka Kido worm.
Some Conficker Removal or Deletion tools are as follows:
1. Avert Stinger Standalone tool from McAfee
2. F-Secure Worm:W32/Downadup.AL Removal Tool from F-Secure
3. Symantec W32.Downadup Removal Tool from Symantec
4. Conficker Single PC Removal Tool from Bitdefender
5. Conficker Network Removal Tool from Bitdefender
You can download any of the above tools to remove conficker or downadup or kiddo virus from your computer safely. Leave a comment if none to the above tools works for you.
Monday, June 9, 2008
Blackmail ransomware returns with 1024-bit encryption key
The biggest change in this variant of the ransomeware is the use of RSA encryption algorithm with a 1024-bit key, making it impossible to crack without without the author’s key. Here’s the explanation:
We recently started getting reports from infected victims, analysed a sample, and added detection for Gpcode.ak to our antivirus databases yesterday, on June 4th. However, although we detect the virus itself, we can’t currently decrypt files encrypted by Gpcode.ak – the RSA encryption implemented in the malware uses a very strong, 1024 bit key.
The RSA encryption algorithm uses two keys: a public key and a private key. Messages can be encrypted using the public key, but can only be decrypted using the private key. And this is how Gpcode works: it encrypts files on victim machines using the public key which is coded into its body. Once encrypted, files can only be decrypted by someone who has the private key – in this case, the author or the owner of the malicious program.
After Gpcode encrypts files on the victim machine, it adds ._CRYPT to the extension of the encrypted files and places a text file named !_READ_ME_!.txt in the same folder. In the text file the criminal tells the victims that the file has been encrypted and offers to sell them a “decryptor”:
«Your files are encrypted with RSA-1024 algorithm.
To recovery your files you need to buy our decryptor.
To buy decrypting tool contact us at: ********@yahoo.com»
There are three Yahoo e-mail addresses associated with the new version of the ransomware.
Saturday, June 7, 2008
Sneaky Blackmailing Virus That Encrypts Data
-
Tuesday, June 10, 2008 2:10 PM PDT A leak on a Microsoft Web site referring to a product in the Office suite hints at a 2009 release for the...
-
Another week, another quantum computing story. Quantum computing is a very hot topic in the world of physics at the moment because, for the...
-
holy_calamity writes "New Scientist reports on worries that the OLPC's BitFrost security protocols could hand a ready-made surveil...