Sunday, October 21, 2012

Antivirus Knowledge

1. Antivirus software cannot kill all types of viruses.

2. Antivirus software may find a virus, but may not be able to kill it.

3. Each computer or operating system cannot install two or more antivirus software, unless they are compatible versions.

4. Antivirus software can act on infected files in a variety of ways:
a. clear
b. delete
c. prohibit access
c. isolate
d. do not handle

Once you clear a file that is infected with worms, the file will go back to normal, just as a sick person who is given treatment will recover. If it is a virus file, as opposed to a file infected by viruses, it cannot be cleared and you must delete it.

Users who choose not to clear or delete a virus file, can prohibit access to the file by creating an error dialog box with the message "the file is not a valid Win32 file".

With isolation, the virus is transferred to the quarantine area. Quarantined files cannot run any activity, but users can retrieve files from quarantine.

Do not handle means the user is not sure if it is a virus file, and chooses not to deal with it.

Wednesday, October 17, 2012

About Antivirus Technology

Antivirus installation is used to eliminate computer viruses, hijackers, key-loggers, malicious LSPs, rootkits, spyware, and other malicious software. Antivirus software is usually integrated with monitoring recognition, virus scan, virus removal, and automatic upgrade features. Some antivirus software has data recovery and computer defense systems such as firewalls as well, to ensure that systems work properly.

Through real-time monitoring, signature-based detection can constantly scan for known virus definitions and behavior from the database, compare them with virus attack patterns, and release further executable protection codes. However, it is not possible for an antivirus to identify new or unknown malware. To cover this weakness, some antivirus software groups unknown source files to a sandbox where it further analyzes what they do to see if they perform any malicious action.

Antivirus Technology

1. Shelling technology is very commonly used. It is able to scan and analyze compressed files.

2. Self-protection technology is basically like an immune system. It prevents the virus or malware from stopping antivirus monitoring.

3. Virus corrupted file repair technology can repair files destroyed by viruses. Without this technology, anti-virus software often deletes the infected system files, which makes the computer crash or unable to start properly.

4. Active real-time upgrade technology automatically upgrades server information and virus definitions each time you connect to the Internet. There is also more advanced cloud technology, which uses real-time access to cloud data centers to make virus database comparisons and protect against the latest viruses. Users do not need frequent upgrades.

5. Active defense technology through automatic monitoring of anti-virus system for dynamic simulation of various procedural actions, the logical relationship between the actions of automatic analysis program, integrated application of virus identification rules knowledge to achieve the purpose of active defense.

6. Inspired technology is the original eigenvalue recognition technology based on a summary of the analyses of suspicious program samples, which are transplanted into the antivirus program. When viruses meet the conditions, users will be notified to defend against the unknown viruses or malware. In contrast, conventional antivirus software collects virus definitions, types, or behavior from a huge number of user computers, analyzes the database, then redistributes it as antivirus updates. This method is time-consuming.

7. Using artificial intelligence (AI) algorithms with "self-learning, self-evolution" capabilities, antivirus software can remove packers and variants of viruses without frequent updates to the database, or analyses of virus static characteristics. It uses the intelligent algorithms to discover and learn new virus variations. This leading technology does not have the "do not upgrade the virus database, cannot kill the virus" technical problems that the first two generations of antivirus engines have.

Antivirus Problems

Many antivirus software requires a lot of system resources, such as memory resources and CPU resources, to ensure the safety of the system but this reduces the system speed.

Antivirus technology continues to progress but for now, antivirus software can only kill viruses. If used to kill Trojans, some user data or system files may be destroyed as well, causing system corruption problems.

Monday, October 8, 2012

Difference Between Hacker and Cracker

There are many definitions of the term "hacker". In most cases, a hacker is defined as having superb programming technology, and a strong desire to solve problems and overcome limitations. If you want to know how to become a hacker, there are two important things - attitude and technical knowledge. Historically, the word "hacker" can be traced back to a few decades ago, to the earliest ARPAnet experiment period, when expert-level programmers and network engineers shared their knowledge through minicomputers.

Hackers built the Internet with the Usenet and Unix operating systems. Hackers allowed WWW. to operate normally. Any individual who participated in the online community automatically became a hacker, as they contributed to building the system.

The hacker spirit is not limited to software applications. Hackers can also be found in other industries such as electronics and music. In fact, we can find hackers in any higher-level science and art field. In this article, we only focus on the skills and attitudes of software hackers, as well as the invention of the word "hacker".

There is another group of people who claim themselves to be hackers, but they are really not. They are intentional destructors of computer and telephone systems. In this century, the actual hackers call these people "crackers". Most real hackers think of "crackers" as irresponsible and lazy people, not a great accomplishment. Setting out for the specific purpose of destroying others' safety behavior does not make a person become a hacker, just as using wire to open a car door does not make one an automotive engineer. Unfortunately, many journalists and writers often use the words "cracker" and "hacker" interchangeably, which angers the real hackers. The fundamental difference is that hackers provide solutions with informative advise, whereas crackers purely create damage.

Hackers solve problems and help people. In order to be a real hacker, the person must have a good attitude and good behavior. The purpose of becoming a hacker is not for public recognition, but more importantly for helping, learning and discovering.