how to clear computer's memory

Posted by Ganesh Murugaraju


It often happens our computer to operate its work very slowly.Most of people restart computer, but we have another simple method to proceed without restarting your OS.

1. Right-click on desktop and choose New-Shortcut
2. In the Type the location of the item write this code: %windir%\system32\rundll32.exe advapi32.dll,ProcessIdleTasks
3. Click Next
4. Name as Clear Memory
5. Click Finish.


Now whenever you see that your PC is working slowly go to this icon and click it, without restarting PC would clear your memory and speed up processes

5 individuals arrested on Cybercrime in Ukraine

Posted by Ganesh Murugaraju


Ukraine authorities have arrested five individuals who allegedly directed a global cybercrime scheme that used a version of the Zeus Trojan computer virus to steal $70 million from U.S. bank accounts, FBI officials said on Friday.

They told a news briefing that Ukraine authorities took the five individuals into custody and conducted searches under eight warrants on Thursday as part of an international crackdown that dismantled the operation this week.

The officials said the scheme targeted small and medium-sized U.S. businesses. It involved the use of malware, a software code that captures passwords, account numbers and other data used to log into online banking accounts.

The crackdown had previously been disclosed with some arrests announced in New York on Thursday and in London on Wednesday.

The FBI officials declined to identify any of the U.S. banks that had been victims or to say how many banks had suffered losses in the scheme.

They said the investigation began in May of last year after a complaint from a company in Omaha, Nebraska, and quickly spread to New York and New Jersey.

The U.S. cases involved more than 300 victims. In the United States, 92 people have been charged and 39 have been arrested, the officials said.

The scheme involved the use of foreigners who entered the United States on student visas and who were recruited as "mules" to open bank accounts under fake names. The accounts were then used to receive and transfer the stolen funds overseas.

"During this investigation, the FBI worked closely with our overseas counterparts to identify subjects who were instrumental in the development and control of the malicious software, those who facilitated the use of malware, and those who saw a means to make quick, easy money -- the mules," said Gordon Snow, assistant director of the FBI's Cyber Division. (Reporting by James Vicini, Editing by Gerald E. McCormick)

How to Remove Brontok Virus

Posted by Ganesh Murugaraju

Remove Brontok Virus Urself - It's easy!

its the most sticky virus ..
u can Remove it
be an ethical Hacker
It works~~!!

Start ur computer in safe mode with command prompt and type the followinf
command to enable registry editor:-

reg delete HKCU\software\microsoft\windows\currentversion\policies\system /v
"DisableRegistryTools"
and run HKLM\software\microsoft\windows\currentversion\policies\system /v
"DisableRegistryTools"

after this ur registry editor is enable
type explorer
go to run and type regedit
then follow the following path :-
HKLM\Software\Microsoft\Windows\Currentversion\Run

on the right side delete the entries which contain 'Brontok' and 'Tok-' words.

after that restart ur system
open registry editor and follow the path to enable folder option in tools menu

HKCU\Software\Microsoft\Windows\Currentversion\Policies\Explorer\
'NoFolderOption'
delete this entry and restart ur computer

and search *.exe files in all drives (search in hidden files also)
remove all files which are display likes as folder icon.

ur computer is completely free from virus brontok..!

Windows xp - Basic tricks

Posted by Ganesh Murugaraju

Windows XP- TRICKS :

Speed up your browsing of Windows 2000 & XP machines
Here's a great tip to speed up your browsing of Windows XP machines. Its actually a fix to a bug installed as default in Windows 2000 that scans shared files for Scheduled Tasks. And it turns out that you can experience a delay as long as 30 seconds when you try to view shared files across a network because Windows 2000 is using the extra time to search the remote computer for any Scheduled Tasks. Note that though the fix is originally intended for only those affected, Windows 2000 users will experience that the actual browsing speed of both the Internet & Windows Explorers improve significantly after applying it since it doesn't search for Scheduled Tasks anymore. Here's how :

Open up the Registry and go to :

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace

Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
and delete it.
This is key that instructs Windows to search for Scheduled Tasks. If you like you may want to export the exact branch so that you can restore the key if necessary.

This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.
 

How to make your Desktop Icons Transparent

Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"


Remove the Recycle Bin from the Desktop

If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.
Run Regedit and go to:

HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace
Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.

All About Trojan Horses (virus)

Posted by Ganesh Murugaraju

"Trojan Horses" (or Backdoors) have been in the news just recently, the term probably sounds familiar to you. But perhaps you’re not quite sure what a Trojan Horse is and what damage it is capable of doing to your system. Trojan Horses, of which there are now more than one thousand in circulation (including modifications and variants), are a relatively new and probably the most dangerous strain of viruses that have appeared in recent times.

The Meaning of its Name :

The name "Trojan Horse" derives itself from a page in Greek history when the Greeks had lain siege to the fortified city of Troy for over ten years. Their spy, a Greek called Sinon offered the Trojans a gift in the form of a wooden horse and convinced them that by accepting it, they would become invincible. The horse though was hollow and was occupied by a contingent of Greek soldiers. When they emerged in the dead of night and opened the city gates, the Greeks swarmed in, slaughtered its citizens and subsequently pillaged, burned and laid waste to the city.


How it Works :

In order to gain access to a user’s computer, the victim has to be induced to install the Trojan himself. The usual method is to offer a seemingly useful system enhancement or perhaps a free game that has the Trojan attached to it. By installing it, the user also installs the Trojan.
The most common sources of infection are as follows:
  • Executing any files from suspicious or unknown sources.
  • Opening an e-mail attachment from an unknown source.
  • Allowing a "friend" access to your computer while you are away.
  • By executing files received from any online activity client such as ICQ.
  • Virtually every Trojan virus is comprised of two main parts. These are the called the "server" and the other, the "client". It is the server part that infects a user’s system.
Once infected, the computer becomes accessible to any remote user, usually referred to as a "cracker" or "intruder", that has the client part of the Trojan. That person can perform any action that the user can. For example, if the user keeps his credit card details on the computer, the intruder can steal that information. He may not necessarily make use of the credit card himself, but he can certainly sell the information to a third party who can then go on a spending spree at the user’s expense. The intruder can also steal passwords in order to gain access to restricted information or to password protected web sites as well.
In addition, the intruder can cause the system to reboot without warning, shutdown without warning, eject the CDROM tray, delete files, add files, make use of the user’s e-mail client, etc. etc. The possibilities are endless.

Problems Caused by it :
Let's suppose that you have already been infected. How do intruders attack and get a full control of your computer?
Practically every Trojan virus has two functional parts called the server and the client. The server part is the part of the program that infects a victim's computer. The client part is the one that allows a hacker to manipulate data on the infected machine.
Intruders scan the Internet for an infected user (technically speaking, an attacker sends request packets to all users of a specific Internet provider) using the client part of the virus. Once an infected computer has been found (the server part of the virus that is located on infected machine replies to client part's request) the attacker connects to that user's computer and creates a "link" between the two just like the one in an ordinary telephone conversation. Once that has happened (this procedure may only take a few seconds), the intruder will be able to get unrestricted access to the user's computer and can do anything he likes with it. The intruder becomes the master and the user the slave because short of disconnecting from the Internet, the user is helpless and has no means at his disposal to ward off an attack.
Intruders can monitor, administer and perform any action on your machine just as if they were sitting right in front of it.
A Trojan Horse works a bit like the backdoor to your house. If you leave it unlocked, anybody can come in and take whatever they want while you're not looking. The main difference with a backdoor installed on your computer is that anybody can come in and steal your data, delete your files or format your hard drive even if you are looking. There are no visible outward signs that anything untoward is happening other than perhaps unusual hard disk activity for no apparent reason. 


Types of Trojans :
Each of the Trojan classes described next contains a variety of cracker's tools. Tauscan is capable of removing all of these classes if it detects them. To view the Trojans in each class, click on the Database button on the Tauscan toolbar.

Remote Access Trojans

These are the probably the most popular and very likely the most dangerous of the many Trojan classes currently available. It is these types that work in the server/client mode. The server part installs itself on the unsuspecting user's computer and the client remains on the attacker's system. Once an infected machine has been discovered, the intruder establishes a link between the two. He can subsequently perform any action the user can and more. For example, let's assume that the user has valuable data stored in a folder called "ABC" on his C: drive. In order to steal that data, all the intruder needs to do is to drag and drop the folder called ABC from the user's C: drive onto his own. It's as simple as that!

Mail Trojans

Another popular type of Trojan in hackers' circles is the mail Trojan. It works in server mode only and its main function is to record certain data such as the keystrokes the user enters when passwords are typed, the web sites he regularly visits and files in general. An infected machine will automatically send the information by e-mail to the attacker. These are very difficult to spot because the e-mail client is part of the Trojan itself.

FTP Trojans

This particular class of Trojan works in server mode only. It allows FTP access to an infected machine and can download or upload files at the intruder's whim.

Telnet Trojans

Telnet Trojans run in server mode only and allow an intruder to execute DOS commands on a remote machine.

Keylogger Trojans

These Trojans record the keystroke input on an infected machine and then stores the information in a special log file that the intruder can access in order to decipher passwords.

Fake Trojans

This type of Trojan uses fake dialog boxes and other bogus windows that purport to show that the user has attempted to perform an illegal operation. By displaying a dialog box, its sole purpose is to get the user to enter his user name and password. That information is then stored on file so that the intruder can use it at a later date.

Form Trojans

This is a Trojan that once installed ascertains the users personal data such as IP address, passwords and other personal data that he or she has stored on their system and then by connecting to the cracker's web page, submits the online form via HTTP. A cracker can then use the information gained whenever he wishes. The Trojan performs this function without any user intervention and without the user's knowledge. The user will not see any indication of the transmission such as pop-up windows that would indicate that this is taking place.

E.Book : Computer Security And Cryptography

Posted by Ganesh Murugaraju

E.Book : Computer Security And Cryptography




Image

Computer Security And Cryptography
Wiley-Interscience | 2007 | 544 pages | PDF | 8.4 MB

Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.


Download:

Download with FileServe:
Code:
http://www.fileserve.com/file/WtA58bU/Comp.Sec.Crypto.rar

Inox Website is infected

Posted by Ganesh Murugaraju

Latest sources says that Inoxmovies.com was infected.
The source code for http://www.inoxmovies.com contains references to . A Google search for "" gives
jyothylaboratories.com as one of the results. Apparently making
detergents and showing movies doesn't involve securing corporate
websites.

Another search for intext:".info/ur.php>" shows a lot more
domains that have a similar naming convention (eg: http://google-stats45.info/ur.php)
and which are marked as suspicious by Google Safe Browsing.

A lookup on the URL gives the IP 77.78.239.63, which is presumably
located in the Republic of Moldova (which is is a landlocked country
in Eastern Europe, located between Romania to the west and Ukraine to
the north, east and south - src:Wikipedia.com) and is hosted with an
ISP called Maxhosting-services. Another IP Geo Location result puts it
in Bosnia And Herzegovina. The domain is registered as ruslan7777.com
by this dude called Avaris Pinofopoulos (src:
http://www.malwareurl.com/listing.php?ip=77.78.239.63). Another search
puts the registrant to be Vasea Petrovich, who stays (or works) in
Varlaam, Moscow, Postal Code 76549.

Google says the google-stats55.info site is clean (http://
www.google.com/safebrowsing/diagnostic?site=http://google-stats55.info).
It also says that the site acted as an intermediary for the infection
of 3 sites. Im not trusting them on this one.

Proceeding further on Inoxmovies.com takes you to a fake antivirus
software site that shows how it has scanned your computer and found
several infections in My Computer.

Thanks to Riyaz Ahamed for researching on this topic..!