How to get rid of new Sobig.F virus?

Written by Nowshade Kabir


As you know, this timerepparttar virus underrepparttar 132023 name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. According to an online poll conducted by CNN: 32% of respondents were infected with this malicious virus. Atrepparttar 132024 pick, each of every 17 emails contained sobig.F! Internet service provider AOL says it scanned 40.5 million emails and foundrepparttar 132025 virus in more than half of them. Sobig accounted for 98 percent of all viruses found in these emails. What is Sobig.F virus? This is a worm type of virus. Which means it is an executable program that installs enhancement to your Windows operating system. The ?F? implies that it isrepparttar 132026 sixth ofrepparttar 132027 family of Sobig viruses. The first one was launched inrepparttar 132028 beginning of this year. The latest attack was started on August 19. According to some experts, Sobig.F was first posted to a porn Usenet group and spread from there. It is timed to deactivate itself on September 10. The pre-built deactivation mechanism itself is a worrisome factor. Most experts think this means there are more to come! How it works?

Sobig.F comes along with an email with subject headers like Your details, Thank you!, Re: Thank you!, Re: Details, Re: Re: My details, Re: Approved, Re: Your application, Re: Wicked screensaver or Re: That movie. The body ofrepparttar 132029 message is quite short and usually contains either "Seerepparttar 132030 attached file for details" or "Please seerepparttar 132031 attached file for details." Oncerepparttar 132032 file is opened, Sobig.F resends itself using a built-in mailing program to e-mail addresses fromrepparttar 132033 infected computer. As a sender is address it shows one ofrepparttar 132034 e-mails randomly selected fromrepparttar 132035 computer's address book. The worm was also supposed to attempt to retrieve an URL from a predetermined list of 20 master servers on a certain date and time. The content of that URL was to be downloaded and executed onrepparttar 132036 infected machines. Luckily those servers were identified right away and shut down. How to protect yourself against it? If your computer is infected or you have doubts, first thing you should do is: to check and clean up your computer from this virus. Although, it is set to deactivate on September 10, which means it will no longer multiply itself, however, left untouched, it might attempt to update itself, oncerepparttar 132037 newer version ofrepparttar 132038 virus comes out. Suggestion One:

Information Security for SMEs

Written by Thom Leggett


This article explores computer security, aiming to give businesses an insight into why they must be proactive in protecting their systems. There are many aspects to security onrepparttar Internet and a lot has been made recently ofrepparttar 132021 security of e-commerce transactions. Whilst many ofrepparttar 132022 security issues that a website administrator faces are similar to those that your businesses computers are threatened with, this column will concentrate on how and why you should secure your internal IT investment.

The Internet in its current state is similar to a city with no locks onrepparttar 132023 doors of its houses, where computers can be thought of as houses andrepparttar 132024 networks making uprepparttar 132025 Internet,repparttar 132026 city streets. Computers as they are sold today are inherently insecure, allowing access to anyone with a bit of curiosity or malicious intent. As businesses come to rely more and more on electronic information (not least e-mail),repparttar 132027 potential disruption caused by a data burglary, informational arson attack or digital graffiti has reached a level that businesses should not ignore

The threat Any computer onrepparttar 132028 Internet exposes a series of ports through which information flows. By default these are all open and unlocked. Whilst many of them may lead to empty rooms or brick walls, an attacker will only need to find one port vulnerable to attack forrepparttar 132029 whole system to be compromised.

Even if your ports are secure; intruders can get into your computer in a Trojan horse. A piece of software disguised as something useful can contain a malicious sub-program to install a backdoor into your system. Often these programs claim to give something for free or display small games whilst an attacker has a good nose around

One ofrepparttar 132030 most worrying developments has beenrepparttar 132031 proliferation of automated attacks. These can be run from an attacker's computer, scanning hundreds or thousands of computers in a day; or can berepparttar 132032 self-replicating Internet worm. These are a hybrid of virus programs and computer security attacks. In worst-case scenarios, they can bring whole segments ofrepparttar 132033 Internet to a standstill.

Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accountsrepparttar 132034 day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer dorepparttar 132035 job for which they were intended.

When we drive a car we are accepting and using a set of standards that have evolved sincerepparttar 132036 turn ofrepparttar 132037 century to ensure safety, convenience and fair access for all users ofrepparttar 132038 road system. Some of these standards are globally accepted (for instance a road is made from tarmac and wheels are made from rubber) whilst others vary from country to country (for example if we drive onrepparttar 132039 left orrepparttar 132040 right). The practical upshot of these standards is that a car designed and built for use in one country can be safely used in another (possibly with a little bit of inconvenience).

The aftermath Attacks on your information can be carried out for as varied reasons as an arsonist burns things, a robber steals things or kids spray-paint walls. An electronic attack could leave you with no data (imagine losing your accountsrepparttar 132041 day before your filing date), data that has been altered in subtle ways (imagine your accounts with 10% taken off each figure), a website that is 'owned' by a teenager in another country or an office full of computers that no longer dorepparttar 132042 job for which they were intended.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use