Security : Protect yourself and your computer.
Updated: 8/19/2005; 9:53:48 PM.

 

 
Looking for a Story? Check:
 
 


 
Work:
 
 

Archives:
 
 
 
 
 
 
 
 
 
 
 
 

Great Sites:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


Subscribe to "Security" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

Comments by: YACCS

« chicago blogs »

 
 

Friday, August 19, 2005



Zotob Outbreak Leads To Worm War III

The internet has become a gangland war zone and your computer is the street corner being fought over.

Shortly after someone published exploit code for a newly discovered Windows 2000 flaw, someone created the Zotob worm. Once installed, Zotob will try to seek out and infect other computers on the same network. It also opens a backdoor trojan that allows someone to access the infected machine.

Several slightly different versions of Zotob have been released. The creators of these separate versions apparently have gone to war with each other. Now owners of infected computers not only have to deal with a virus infection. They also are dealt the double indignity of seeing their machine become a battleground, as the different Zotob worms try to exterminate each other.

In the past, people released viruses and worms for bragging rights. They wanted to show their fellow miscreants how cool they were, so they would infect millions of computers for the hell of it. These days, an infected computer is worth money.

Everyone - from spammers to organized crime to international terrorists - pay good money for control of large networks of infected computers. These computers can be used to send spam. They can be used to launch denial of service attacks. They can be used for a number of illegal things.

An infected computer now is "turf" belonging to whoever can take the machine and keep it. If a competitor is discovered, that competitor must go. The best way to avoid being hit in the crossfire of this or any future computer gang war is to have a policeman nearby. By that, I mean that you must have an antivirus program which is kept up-to-date on a constant basis.

You also need to make sure you install Windows security updates, as soon as they come out. Turn on automatic updates or visit http://windowsupdate.microsoft.com at least once a week. Microsoft Updates usually are released on the second Tuesday of each month. Occasionally, a very critical update is released off schedule, so take the time to check at least once a week.



categories: Security
Other Stories according to Google: Computerworld - New worm and phishing scam hits AIM, Yahoo IM | PC Help :: Make your PCs Earn Their Keep | InfoSec News Blog | Keywordblogger.com - security blog - Web Access Over Power Lines | worm blog: papers | Soul Photo . Net -- International Weblog | The best of the best from across the Weblogs, Inc. Network - The | NEWS - expandinghead.net

9:53:32 PM    


© Copyright 2005 Earl Bockenfeld.



Click here to visit the Radio UserLand website.
 



August 2005
Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      
Apr   Sep






Top 10 hits for Downing Street Memo on..
Google
1.The secret Downing Street memo - Sunday Times - Times Online
2.The Downing Street Memo :: What is it?
3.Downing Street memo - Wikipedia, the free encyclopedia
4.The secret Downing Street memo
5.Democracy For America
6.AfterDowningStreet.org | For a Resolution of Inquiry
7.Why has ' Downing Street memo ' story been a 'dud' in US ...
8.The Downing Street Memo
9.TomDispatch - Tomgram: Mark Danner on the British Smoking-Gun Memo
10.1,2005. May *See Michael Smith, “Blair Hit By New Leak of Secret ...

Help link 8/19/2005; 9:53:46 PM.


Story Categories:

Blogging

Body

Digital Media

Heart

Humor

Internet

Microsoft

Mind

Miscelleous

Politics

Outrages

Security

Software

Soul

Userland

Top 10 hits for spyware adware on..
Google
1.Adware , Spyware and Advertising Trojans - Info & Removal Procedures
2.Ad-Aware SE Personal - Software - Lavasoft
3.NEW! Adware .info - Adware Spyware Software Quick Reference
4.How to Protect Your Computer from Spyware and Adware
5.Spyware / AdWare /Malware FAQ and Removal Guide - Table of Contents ...
6.PC Hell: Spyware and Adware Removal Help
7.Free Spyware Removal - Anti Spyware Remover Software
8.Software: Spyware / Adware /Hijackware Tools
9.Removing Spyware and Adware Help and Tips
10.Free Spyware / Adware / Trojans / Hijackers Detection, Prevention ...

Help link 8/19/2005; 9:53:47 PM.