Three-pronged Trojan attack threatens security on the Internet.

Written by MicroWorld Technologies Inc.


Two is company. Three is a crowd. If one is not enough, use two, if two is not enough, use three. This isrepparttar credo behindrepparttar 141647 co-ordinated Trojan threat looming onrepparttar 141648 horizon. If you thought you've seen everything there was to see of virus threats, think again. Experts are saying this is "unprecedented", and could berepparttar 141649 next big one.

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks.

"Combating computer viruses is essentially a game of hide and seek," says Govind Rammurthy, CEO, MicroWorld Technologies, amongrepparttar 141650 leading Security Solutions providers. "Hackers riding piggyback on viruses have only a short window of opportunity to maximize their gain beforerepparttar 141651 viruses are detected, neutralized and logged into Virus Definition databases, 'vaccinating'repparttar 141652 system against those strains.

Without continuing system vulnerability caused by virus infection there is little they can do to further their malicious ends like stealing personal information, credit card details and other sensitive and vital data. To achieve their ends they need to keeprepparttar 141653 system vulnerability going for more time. This co-ordinated Trojan threat is an attempt torepparttar 141654 keep that 'backdoor' open, essentially buying time," he concludes.

Ofrepparttar 141655 three, Glieder leadsrepparttar 141656 initial charge. It sneaks past anti-virus protection to download and execute files from a long, hard-coded list of URLs and "plant"repparttar 141657 infected machine with "hooks" for future use. On Windows 2000 and Windows XP machines, it attempts to stop and disablerepparttar 141658 Internet Connection Firewall andrepparttar 141659 Security Center service (introduced with Windows XP Service Pack 2). Thenrepparttar 141660 Trojan accessesrepparttar 141661 URL list to download Fantibag. The way is now paved to launchrepparttar 141662 second stage of attack.

Sulabh, a tester with MicroWorld Technologies says of Fantibag, "Now Fantibag goes about attackingrepparttar 141663 networking feature ofrepparttar 141664 infected system to prevent it from communicating with anti-virus firms and denying access torepparttar 141665 Microsoft Windows Update site. It closes your escape route by making it impossible to download an anti-virus solution and any subsequent Windows security patch to your system. Effectively it helps Mitglieder (the third stage Trojan) openrepparttar 141666 'backdoor' by shuttingrepparttar 141667 other doors on you."

Firewalls :::: What They Are And Why You MUST Have One!

Written by Titus Hoskins


A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usuallyrepparttar first line of defense in protecting your private information or data. A good firewall will help protect you from malicious attacks of spyware, adware, malware, worms, trojans, and hackers.

Firewalls are security mechanisms that control who can access and send data thru your network or computer. They can be applied to both hardware and software on your computer; many systems use a combination of each for greater protection. All data or messages entering or leaving your computer has to pass thrurepparttar 141278 firewall, which checks all messages and blocks those that don't meet your specified security criteria or rules.

To put it in simple terms: think of a firewall as a security guard or a security scanner for your computer or network. Anything going in or out must be checked thru this system and must obey your rules!

Of course, this is just a simple explanation, firewalls can be very complex; consisting of a whole combination of techniques that can be used in concert depending onrepparttar 141279 level of security you wish to achieve.

These firewall techniques may include:

Application gateway -- places security mechanisms on specific applications (FTP, Telnet, etc.)

Packet filters -- examines each packet using your computer and accepts or rejects according to your rules

Circuit-level gateway -- security measures for such connections as TCP (Transmission Control Protocol) or UDP (User Datagram Protocol)

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use