Three-pronged Trojan attack threatens security on the Internet.

Written by MicroWorld Technologies Inc.

Continued from page 1

Mitglieder putsrepparttar system under complete control ofrepparttar 141647 attacker by openingrepparttar 141648 'backdoor' on a port using whichrepparttar 141649 attacker can updaterepparttar 141650 Trojan, to stay a step ahead of attempts to remove it, download and execute files, initiate an SMTP server to relay spam, execute files onrepparttar 141651 infected computer and download and execute files via an URL. "This is what makes it scary," say Aarti, Assistant Manager, QA, MicroWorld Technologies. "The fact thatrepparttar 141652 system can now be used as a remote controlled 'soldier' (bot) in an army (botnet) of similarly compromised machines to launch criminally motivated attacks, causing harm to Internet users."

Botnets thus formed can among other things, use your machine to launch Distributed Denial of service attacks which overload servers, making them crash, to send out spam, spread new Malware, plant Keylogger to retrieve your personal information like identity, passwords, account numbers etc., install Spyware, manipulate online polls/games, abuse programs like Google AdSense to cheat advertisers of revenue, and install Advertisement Addons for financial gain as in fake websites advertising services that don't exist.

"Botnets can even encompass over 50,000 host machines. The potential for mischief is huge," reflects Govind Rammurthy. "Such a three-pronged Trojan attack where attackers change their virus code and release viruses quickly to bypass virus signature scanners, then disable network access to denyrepparttar 141653 user link-ups to anti-virus and Microsoft Windows Update site for protection has huge significance for virus-signature based protection. It is a sign of things to come," he says, rememberingrepparttar 141654 scramble at MicroWorld labs to update their products to detect and removerepparttar 141655 three Trojans.

Anti-virus updates forrepparttar 141656 three-pronged Trojan threat are available at MicroWorld Technologies site. Mayberepparttar 141657 time for worrying about some pimply teenager turning out malicious code because they have nothing better to do on a nice sunny morning, is over. The world could be facing a determined organized crime syndicate who'll stop at nothing to get what they want - information precious to you.

For more information visit or write to

MicroWorld Technologies is one of the leading solution providers for Information Technology, Content Security and Communications Software.

Firewalls :::: What They Are And Why You MUST Have One!

Written by Titus Hoskins

Continued from page 1

Proxy server -- all messages entering or leaving your network must go thru this proxy server, effective for hiding your true network or computer address

Also, for greater security, many networks use encrypted data.

If you are operating a computer or a server, putting up firewalls will provide protection for your data and information that's passed along your network. If you regularly surfrepparttar Internet, placing a firewall on your own personal computer is a must. There is no reason not to have a firewall in place, you can download a free firewall from for your own personal use.

Keep in mind, no system is foolproof; any computer or network hooked up torepparttar 141278 Internet can be hacked! Therefore, most people inrepparttar 141279 know, always keep a back-up of their important data/information on a secure off-line source: floppy disks, CDs, or on a computer that's not connected torepparttar 141280 Internet. Do daily or weekly back-ups to make sure your data and programs are safe.

Still, a good firewall will go a long way in protecting yourself from any unauthorized access to your computer. Withrepparttar 141281 occurrences of spyware, adware, and other more invasive scumware increasing daily; putting up a firewall and protecting yourself should be your first line of defense against such unwanted and rude visitors. Nuke them atrepparttar 141282 gate and save yourself from some major headaches.

Put that firewall up right now!

To learn more about Spyware and Adware Click Here:

Spyware Remover Guide

Copyright 2005 Titus Hoskins of Internet Marketing Tools

This article may be freely distributed if this resource box stays attached.

    <Back to Page 1 © 2005
Terms of Use