SMK TAKISP/S 486, 89608, PAPAR, SABAHNO TEL: 088-915251N0 FAX: 088-911632

Forums

Post Reply
Forum Home > pelajar ICT form 4B > virus vs spyware?

SMK TAKIS PAPAR
Site Owner
Posts: 8

Virus VS Spyware mana lebih bahaya? bincangkan.

September 8, 2009 at 8:44 AM Flag Quote & Reply

ajien
Member
Posts: 6

aku rasa worm n trojan..

btul kah???

September 10, 2009 at 7:22 AM Flag Quote & Reply

sYameLz
Member
Posts: 1

mngkn trojan g bahaya..

September 10, 2009 at 7:42 AM Flag Quote & Reply

ajien
Member
Posts: 6

ATrojan Horse is an email virus usually released by an emailattachment. If opened, it will scour your hard drive for any personaland financial information such as your social security, account, andPIN numbers. Once it has collected your info, it is sent to a thief’sdatabase.

September 10, 2009 at 7:44 AM Flag Quote & Reply

SMK TAKIS PAPAR
Site Owner
Posts: 8

so, trojan horse = spyware?

kalo dapat virus bulu bebek yang bleh shut down komputer and erase ur data tahap mana bahayanya tu...:)

September 10, 2009 at 7:50 AM Flag Quote & Reply

ajien
Member
Posts: 6

aduh cg...

bnyaknya soalan..

huhuhuhu...

tahap gaban tu cg..

hahahahha...

tahap kritikal dha tu cg..

msti scan dngan cepat sblum smua data hilang...

--


September 10, 2009 at 8:09 AM Flag Quote & Reply

ajien
Member
Posts: 6

COLUMN Spyware vs. viruses: Two different fights By Ed Tittel

25 May 2005 | SearchCIO-Midmarket.com

 

 

Digg This!     StumbleUpon     Del.icio.us   

 

 

So what makes spyware so different fromviruses? Why is perfect prevention possible for viruses but notspyware? The answer is far from simple, and it involves anunderstanding of how uninvited software can take up residence on a PC.It also involves differentiating viruses, with the urges to reproducefrom spyware, which harvests user information and secretly shares itwith third parties. In general, however, what makes these two largeclasses of malicious software different also helps to explain why onemay be somewhat easier to corral and detect than the other.

There are too many differences to explain here, but here are the highlights:

Packaging: Viruses essentially send themselves around andinclude the code necessary to reproduce as part of their contents.Spyware is reproduced through the agency of active Web content or othertransient programs that users run on their machines (usually withouttheir knowledge or consent). Viruses are thus quite self-contained andmay be definitively identified by their contents.

"Withviruses, the mountain (the virus) comes to Mohammed (thecountermeasures investigator); with spyware, Mohammed (thecountermeasures investigator) must go to the mountain."

Spyware includes various types of packages thatmay run on a user's desktop, but is neither self-contained norcompletely identifiable. It can only be identified from traces thatremain behind after active content has run and is gone. Also, a viruscan be sent somewhere for inspection and analysis; spyware requiresidentifying, finding it in your system and then visiting a source ofinfestation.

Self-documentation: Viruses can usually be identified andconquered by those who can disassemble a PC. There, it will reproduceand possibly create new directories in which the new copies can reside.Likewise, changes to configuration files, the Windows Registry andother activity all result from chunking through the virus payload.Because the active content that deposits spyware on a PC must be"caught in the act," the remaining changes can only be discovered byrigorous, painstaking analysis of "before" and "after" snapshots ofclean machines deliberately exposed to infestation.

Spyware investigators may never see the source code for theafflictions they seek to cure. Virus investigators invariably get todig into that code directly.

Distribution: Viruses transport themselves around andseek to reproduce in many ways. Spyware waits for visitors to specificWeb sites and pages. Here, the active content that delivers spywarewill then run on a user's machine to download related software elementsand make related Registry and configuration changes. With viruses, themountain (the virus) comes to Mohammed (the countermeasuresinvestigator); with spyware, Mohammed (the countermeasuresinvestigator) must go to the mountain.

Complexity and ease of change: Because viruses propagate ontheir own after leaving their creators' hands, they survive or die outbased on their contents and payloads. (Some viruses may be described asself-mutating, where mutations usually deal with forms of disguise, notwith outright changes to activity.) Spyware remains available to itscreators over time, so they can tinker with it at will. This explainswhy spyware changes so quickly and changes its activities and modes ofinfection.

 

 

 

 

saya dapat nie dari==searchcio-midmarket.techtarget.com/news/column/0,294698,sid183_gci1085980,00.html

hehehe:D

September 10, 2009 at 8:15 AM Flag Quote & Reply

aCap
Member
Posts: 1

~apa sSah cG kLau rSak bLi bRu laH..

~haha..

 

~nie antara kesan jika terkena virus BuLu Bebek...

1. Task Manager tidak dapat dibuka
2. Command Prompt diblok
3. Regedit diblok
4. pada title bar di Windows Explorer ada tulisan hacked by Bulu Bebek
5. Terdapat folder yang bernama Application dengan saiz file sebesar 53Kb
6. Bila Task Manager dapat dibuka, maka Anda akan menemukan LSASS.EXE dengan huruf besar
7.Folder Option tidak ada

 

~cAra kC hPuskaN

 

1. Disconnect internet jika ianya connect ke internet.
2. Disable “System Restore” untuk sementara selama proses pembersihan berlangsung (jika menggunakan Windows ME/XP)
3. Matikan proses virus yang sedang aktif di memori, untuk mematikan proses virus ini gunakan tools penggganti taks manager seperti procexp, kemudian matikan proses virus yang mempunayi icon “Folder” (carilah process yang bernama LSASS.EXE yang bericon folder).
4. Repair registry mengunakan file ini. Sesudah download, klik kanan pada file, dan pilih install.
5. Buka Folder Option (jika belum dapat dibuka, silakan restart komputer), pilihlah pilihan yang berfungsi membuka semua Hidden Files dan uncheck 2 pilihan di bawah Show Hidden Files.
6. Gunakan search, dan carilah dengan nama "*.exe" (gunakan advance search untuk mencari hidden file).
7. Setelah proses pencarian selesai, hapuslah segala file yang bericon folder.
8. Langkah terakhir adalah menghapus segala autorun.inf dan tentu saja bulubebek.ini di semua folder.
9. Virus telah dibuang.
 

~jusT to kOngsI sMa koRang..

~haha..

September 10, 2009 at 9:08 AM Flag Quote & Reply

SMK TAKIS PAPAR
Site Owner
Posts: 8

thanks 4 de sharing...

dah penah kena virus bulu bebek la ni...;)

 

September 10, 2009 at 10:04 AM Flag Quote & Reply

SMK TAKIS PAPAR
Site Owner
Posts: 8

so, nazreen kalo ada nota dalam bahasa melayu pun bleh paste di sini..cikgu dah cut sikit.

September 10, 2009 at 10:05 AM Flag Quote & Reply

ajien
Member
Posts: 6

ok cg


--


September 11, 2009 at 5:12 AM Flag Quote & Reply

SMK TAKIS PAPAR
Site Owner
Posts: 8

kepada semua pelajar ICT form 4B ICT tolong respon this forum untuk dapat markah tambahan final EXAM 2009

October 3, 2009 at 1:04 AM Flag Quote & Reply

eQiewnd..
Member
Posts: 1

ala...ndax taw pa2 la cg...

nantylah..

d klaz bg cg jwpan dya..

hahaha

October 4, 2009 at 12:19 AM Flag Quote & Reply

SMK TAKIS PAPAR
Site Owner
Posts: 8

kena cari dalam internet la..banyak information bleh dapat tu

October 5, 2009 at 8:02 AM Flag Quote & Reply

You must login to post.