The Move to a New Anti-Virus Model

Written by Tim Klemmer


This isrepparttar first in a series of articles highlighting reasons why today’s anti-virus security solutions don’t work.

Reason #1:repparttar 118519 Basic Model

Anti-virus software vendors still rely on yesterday’s methods for solving today’s problems: they wait forrepparttar 118520 next virus to wreak havoc and then produce a solution. That worked for a long time when a virus would take years to traverserepparttar 118521 world. But in this fast-paced Interet-crazed world we live in today, this type of solution is no longer applicable. Now a virus can traverserepparttar 118522 world and infect millions of computers in minutes.

Inrepparttar 118523 good old days a virus traveled by floppy disk. Put a floppy in your computer and save some data to it andrepparttar 118524 virus would infectrepparttar 118525 floppy. Then unwittingly putrepparttar 118526 infected floppy in another computer and prestorepparttar 118527 new computer would become infected. (I’m skimming over a lot of detail here to make a point). Sorepparttar 118528 virus’ progress was slow and steady. Anti-virus vendors had time on their side. They hadrepparttar 118529 time to get a copy ofrepparttar 118530 virus, dissect it, run it through a series of tests to come up with a signature string (see below for definition), putrepparttar 118531 string into a database of strings to search for when scanning your hard drive (and floppies) and releaserepparttar 118532 new database torepparttar 118533 public. Ten years ago this system worked very well.

But now everyone is connected viarepparttar 118534 Internet. Now, using email as a transport point, it doesn’t take years to gather momentum, instead it takes a matter of minutes. And here is whererepparttar 118535 model breaks. Step back and ask yourselfrepparttar 118536 following question: if vendors can catch “known and unknown viruses” as their literature states, how then is it that we continue to have virus problems?

The answer lies inrepparttar 118537 fact that virus authors have been more creative in coming up with new ways to infect and wreak havoc andrepparttar 118538 software industry has not responded in kind, preferring to stay embedded in its old fashioned methodologies.

Why don’trepparttar 118539 old ways work any more, you might ask? It’s relatively simple. Let’s go throughrepparttar 118540 steps.

A virus author unleashes NewVirus via email. He mass mails his virus to thousands of people. Some, not all, unwittingly openrepparttar 118541 attachment thinking it’s from a friend orrepparttar 118542 subject is so enticing that they are fooled into opening it without thinking it’s a problem (cf. nude pictures of Anna Kournikova). The email attachment immediately starts emailing everyone in his contact list and embeds itself into his operating system so that it’s activated every time he turns on his computer.

The folks he emails in turn get fooled into thinkingrepparttar 118543 email is valid and they openrepparttar 118544 attachment. Very quickly all hell breaks loose. Agencies which monitor Internet traffic see problems arising withrepparttar 118545 sudden spikes in email traffic and they begin to get calls or emails alerting them torepparttar 118546 fact that there’s a new problem. Samples are obtained and sent off to anti-virus vendors. They passrepparttar 118547 emails through a series of tests to analyze what exactlyrepparttar 118548 virus does and how it does it. Additionally analysis is performed to extract a unique string of 1’s and 0’s to identify this attachment as none other than NewVirus. This is calledrepparttar 118549 signature string. It’s important that whatever string is arrived at does not exist in any other program or piece of software; otherwise, you will get what is commonly called a false positive.

Special Report: How to Stop Spam

Written by Gary Cain


Special Report: How to Stop Spam

By Gary E. Cain Author www.dollarsforever.com

I imagine you have seen, heard about, or already know what spam is. But just in case you don’t, it is unsolicited and unwanted emails that arrive in your email inbox from a person or company that you don’t know.

What you might not know, however, is that now there is a law inrepparttar USA designed to protect you from specific types of spam – yes, there is more than one type of spam --repparttar 118518 variety and methods used are shocking.

The Federal Trade Commission (FTC) has created a law called The CAN-SPAM Act of 2003 to pursue, fine, and prosecute blatant and persistent “spammers”.

Furthermore,repparttar 118519 Department of Justice (DOJ) works actively to shutdown or fine offending web sites or emailers by enforcing this relatively new anti-spam law.

Unfortunately,repparttar 118520 sheer volume and different types of spam require …

…you,repparttar 118521 reader, to have available in your hands, a proven solution for defending yourself and your computer fromrepparttar 118522 onslaught of spam email. You might be asking yourself: But, Gary, how can I defend myself when there is so much spam everyday?”

Well, I’m glad you asked.

The solution that I am talking about is new, really works, and is called …

Internet Self Defense: How to Protect Yourself While On The Internet.

This well-written and information-filled handbook provides no nonsense solutions that you can implement immediately to solve not only problems with spam but also problems that concern …

…“Phishing” Scams, ·Clone web sites

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use