UNDERWORLD INTERNET

Welcome !


I was trying something for a long time now and it has always made me successful. Let me share this secret with you. If, you are desiring anything, and there are many hurdles in it, GIVE A TRY. Yes, focus on the capitalized words. I did this recently and bingo! I was successful. I was bit skeptical if a coding geek and a dedicated technology enthusiast would ever be attractive at blogging. But I gave a try and it changed my opinion altogether. Simple, yet with rich choice of words, coupled with plenty of information, Mr Jai Gangwani introduces us into the dark passageways of the Underworld Internet. Yes this section would bring to you the information about the various cyber malpractices, cracks and the hacks, their technologies, their tools and their modus operandi,everything at one place. Wait a minute, are you thinking that "Hey I am excited to know about this more, but I am in a  kindergarten in a security school"? Dont worry, hop on the page which says "Lets learn from the basics" on this blog, read it in entirety, you will definitely gain that confidence and knowledge to interest yourself in this section. An altogether new section developed by a fresh, new, a programming prodigy and an avid enthusiast of cyber security, Mr Jai Gangwani. In his first post he takes us into the world of viruses, their origins and leaves us hanging to know more about their technical aspects.
Hello people! 
Damage reported was around $9 billion.




1] VIRUS

This is my first ever blog post, I am excited!  I hope you find it useful.
Probably the most used jargon in the computer world, whether it is in your college laboratories or at a workstation or even your own personal computer is the term ‘Virus’! Inherited in terms of meaning and functionality from the very traditional biological virus which is actually an agent that can replicate inside the living cell of an organism, the computer virus is very much like it.

So in case you were roaming around on a different planet and just returned to planet earth, virus is just another computer program. Yep, that’s right, a sequence of instructions coded in a particular programming language, but with the intent of harming, stealing or doing any other unethical activity on computers. People spend their intellect, time and even money in writing and/or deploying viruses. Such persons are very popularly known as ‘Hackers’. The group is broadly differentiated into Black hats and White hats depending on the intent of hacking.

Black hats are the evil eyed hackers who aim at harming and destroying the computer systems of the victims and White hats are the saviors who learn hacking to defend the masses from the Black Hats and securing our systems. How cool! Oh by the way, what was this post about? Yeah, Viruses. J

Virus is a kind of malicious program which is capable of reproducing itself, much like biological viruses. Thus, a program can copy itself onto the hard-drive and initiate the same, or even it can selectively recreate itself. The level of complexity of virus is in direct proportion to the level of coding expertise of the programmer. So in case you were wondering why did the number of files and folders on your USB-drive doubled when you inserted it into your virus infected college-PC or any other infected computer for that matter, think no more. The virus on the computer replicated itself to your USB-drive.

Although the work on whitepapers in the lines of ‘self-producing automata’ was initiated and published very long back in 1960s, the first damage to the MS-DOS computing peace was hammered by a virus named ‘Brain’ in 1986. Brain was programmed by two brothers from Lahore, Pakistan named Basit Farooq Alvi and Amjad Farooq Alvi.

Brain infected the boot sector of a floppy disk with a copy of the virus. In simple words, Brain infected the very part of storage in which the code to start the computer is stored. On actuation of the virus, the disk label got changed and a custom message could be seen in the boot sectors. One variant of such a message is as follows:
Welcome to the Dungeon © 1986 Brain & Amjads (pvt). BRAIN COMPUTER SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE: 430791,443248,280530. Beware of this VIRUS.... Contact us for vaccination...

It was supposed to be a tracking program to stop illegal copies of disks.
Since then, more and more insanity has crept into the field of viruses. Over here, I discuss some of the most pernicious virus programs written till date.

I Love You
Sounds great, doesn’t it? Well, surely if you hear it from your loved ones but not a good sound if you get it as a subject in your mail. A very tactically programmed virus which was capable of replicating itself via IRC chat and SMTP(Simple mail transfer protocol) and hide itself in various filed and folders, I Love You infected the registry keys on your computer.



Stay tuned to know more about these ancient malwares and how did the underground computer industry advanced their technicality such that today we have only two kinds of companies. One who know that they have been hacked and those who dont.

No comments:

Post a Comment