Welcome !
I was trying something for a long time now and it has always made me successful. Let me share this secret with you. If, you are desiring anything, and there are many hurdles in it, GIVE A TRY. Yes, focus on the capitalized words. I did this recently and bingo! I was successful. I was bit skeptical if a coding geek and a dedicated technology enthusiast would ever be attractive at blogging. But I gave a try and it changed my opinion altogether. Simple, yet with rich choice of words, coupled with plenty of information, Mr Jai Gangwani introduces us into the dark passageways of the Underworld Internet. Yes this section would bring to you the information about the various cyber malpractices, cracks and the hacks, their technologies, their tools and their modus operandi,everything at one place. Wait a minute, are you thinking that "Hey I am excited to know about this more, but I am in a kindergarten in a security school"? Dont worry, hop on the page which says "Lets learn from the basics" on this blog, read it in entirety, you will definitely gain that confidence and knowledge to interest yourself in this section. An altogether new section developed by a fresh, new, a programming prodigy and an avid enthusiast of cyber security, Mr Jai Gangwani. In his first post he takes us into the world of viruses, their origins and leaves us hanging to know more about their technical aspects.
Hello people!
Damage reported was around $9 billion.
1] VIRUS
Stay tuned to know more about these ancient malwares and how did the underground computer industry advanced their technicality such that today we have only two kinds of companies. One who know that they have been hacked and those who dont.
I was trying something for a long time now and it has always made me successful. Let me share this secret with you. If, you are desiring anything, and there are many hurdles in it, GIVE A TRY. Yes, focus on the capitalized words. I did this recently and bingo! I was successful. I was bit skeptical if a coding geek and a dedicated technology enthusiast would ever be attractive at blogging. But I gave a try and it changed my opinion altogether. Simple, yet with rich choice of words, coupled with plenty of information, Mr Jai Gangwani introduces us into the dark passageways of the Underworld Internet. Yes this section would bring to you the information about the various cyber malpractices, cracks and the hacks, their technologies, their tools and their modus operandi,everything at one place. Wait a minute, are you thinking that "Hey I am excited to know about this more, but I am in a kindergarten in a security school"? Dont worry, hop on the page which says "Lets learn from the basics" on this blog, read it in entirety, you will definitely gain that confidence and knowledge to interest yourself in this section. An altogether new section developed by a fresh, new, a programming prodigy and an avid enthusiast of cyber security, Mr Jai Gangwani. In his first post he takes us into the world of viruses, their origins and leaves us hanging to know more about their technical aspects.
Hello people!
Damage reported was around $9 billion.
1] VIRUS
This is my first ever blog post, I am excited! I hope you find it useful.
Probably the most used jargon in
the computer world, whether it is in your college laboratories or at a workstation
or even your own personal computer is the term ‘Virus’! Inherited in terms of
meaning and functionality from the very traditional biological virus which is
actually an agent that can replicate inside the living cell of an organism, the
computer virus is very much like it.
So in case you were roaming
around on a different planet and just returned to planet earth, virus is just
another computer program. Yep, that’s right, a sequence of instructions coded
in a particular programming language, but with the intent of harming, stealing
or doing any other unethical activity on computers. People spend their
intellect, time and even money in writing and/or deploying viruses. Such
persons are very popularly known as ‘Hackers’. The group is broadly
differentiated into Black hats and White hats depending on the intent of
hacking.
Black hats are the evil eyed
hackers who aim at harming and destroying the computer systems of the victims
and White hats are the saviors who learn hacking to defend the masses from the
Black Hats and securing our systems. How cool! Oh by the way, what was this
post about? Yeah, Viruses. J
Virus is a kind of malicious
program which is capable of reproducing itself, much like biological viruses.
Thus, a program can copy itself onto the hard-drive and initiate the same, or
even it can selectively recreate itself. The level of complexity of virus is in
direct proportion to the level of coding expertise of the programmer. So in
case you were wondering why did the number of files and folders on your USB-drive
doubled when you inserted it into your virus infected college-PC or any other
infected computer for that matter, think no more. The virus on the computer
replicated itself to your USB-drive.
Although the work on whitepapers
in the lines of ‘self-producing automata’ was initiated and published very long
back in 1960s, the first damage to the MS-DOS computing peace was hammered by a
virus named ‘Brain’ in 1986. Brain was programmed by two brothers from Lahore,
Pakistan named Basit Farooq Alvi and Amjad Farooq Alvi.
Brain infected the boot sector of
a floppy disk with a copy of the virus. In simple words, Brain infected the
very part of storage in which the code to start the computer is stored. On
actuation of the virus, the disk label got changed and a custom message could
be seen in the boot sectors. One variant of such a message is as follows:
Welcome to the Dungeon © 1986 Brain & Amjads (pvt). BRAIN
COMPUTER SERVICES 730 NIZAM BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE:
430791,443248,280530. Beware of this VIRUS.... Contact us for vaccination...
It was supposed to be a tracking
program to stop illegal copies of disks.
Since then, more and more
insanity has crept into the field of viruses. Over here, I discuss some of the
most pernicious virus programs written till date.
I Love You
Sounds great, doesn’t it? Well,
surely if you hear it from your loved ones but not a good sound if you get it
as a subject in your mail. A very tactically programmed virus which was capable
of replicating itself via IRC chat and SMTP(Simple mail transfer protocol) and
hide itself in various filed and folders, I Love You infected the registry keys
on your computer.
Stay tuned to know more about these ancient malwares and how did the underground computer industry advanced their technicality such that today we have only two kinds of companies. One who know that they have been hacked and those who dont.
No comments:
Post a Comment