Minggu, 19 Desember 2010

Phising

Phishing is a form of electronic fraud.

Generally, phishing is for a person / victim willing to share sensitive information to certain parties by utilizing the credibility of large companies / famous (eg: banks, insurance, credit cards, internet service provider, etc.). Phishing most disseminated via email and web sites.

Problems caused:
A phishing victim will not realize that he is a victim of fraud. So it is not possible sensitive data obtained from the victim misused to deceive the other party, or take advantage of the victim. If youyou are like this , the treasure could be the main stake -affectedvictims of phishing .

The primary audience being targeted by phishers (people who do phishing) is a person who has an account at a bank or credit card. Phishing is also not uncommon to be sent in a surprise manner in which the victims have to pay any prize money in a certain amount.

Prevention / neutralization:
1. Never send personal data such as credit card numbers, ATM PIN or anything via email even if requested by the bank, credit card companies or any where you are enrolled in it. Because the company had never been and will never ask for personal information via email.
2. Do not easily believe that if you are asked to pay something to the prize you've won without doing inspection to interested parties.

from : http://www.infokomputer.com

Spyware


Spyware is software that allows advertisers or hackers to obtain sensitive information without being noticed by the victims.

Problems caused:
Because it is not easy to know, spyware is often used to steal valuable data from computer users. If you have this, do not be surprised if suddenly passwords, ATM pin numbers, credit card numbers and other sudden changes hands.


Prevention / neutralization:
A system could be infected with spyware just by visiting certain web sites (which is dangerous). Some sites that contain spyware will require the installation of applications through a window pop up. Tpai there is also a direct install themselves without permission.

To avoid this make sure the browser used to surf the Internet already has a reporting system to malicious sites. Browsers like Internet Explorer 8, Firefox (with NoScript plugin), Google Chrome, and Opera already provides this facility.

from : http://www.infokomputer.com

Sabtu, 18 Desember 2010

Social Engineering

Social Engineering is a trick done by a hacker / cracker to fool the victim to want to do something.

Usually things are done related to social engineering is incited to a victim would visit a particular web site or run malicious files inserted in an email attachment.

Problems caused:
Many adverse effect caused by social engineering because a victim does not realize that he was deceived. Most cases of this technique is to lose your password, account, or transfer of confidential data to a particular party.

Another problem posed is the spread of computer viruses or malware as a victim considers a result of social engineering news is true as well go pass it.

Prevention / neutralization:
Because not too involve technical issues in computer technology, the only way to avoid social engineering is aware of all incitement, news, or information from various parties. Including friends or relatives who have known though. Double-check to other sources could be an effective way to avoid social engineering.

from : http://www.infokomputer.com

Trojan


Trojan is a program that seemed as the program works as well.

Though he hides a dangerous secret functions of the system. Trojan is also sometimes used as a substitute for other malware such as bot, backdoor trojan and trojan downloader.

Problems caused:
Trojans often look like ordinary program that can be used for productivity. He also frequently claim to have only a single function for a particular purpose. However, unbeknownst to the victim, he was running the other functions such as data theft or search for system weaknesses. This information is then sent to the hacker without the knowledge of the victim.

Trojan many distributed pirated applications, including keygenerator (to create a false license number) and the like. The number of trojan is also growing rapidly compared to the virus because of its ability to spread independent.

Prevention / neutralization:
Trojans can be recognized easily by antivirus or antimalware applications with the latest updates. Advised to always check the application downloaded from the internet using a program / antivirus applications.

from : http://www.infokomputer.com

Jumat, 17 Desember 2010

DDos-Distributed Denial of Service


Distributed Denial of Service (DDoS) is an attack to computer or server who doing by many other computers that are connected via the Internet.

Problems caused:
Because DDoS attacks carried out by many computers on a single target (computer / server) then the lightest possible problem is the difficulty of a computer or server that becomes the victim to be accessed.

Worst case in a DDoS attack is total paralysis of a machine due to hardware damage due to "bombarded" a very large data packets. Some systems are very attractive to attackers DDoS including: Web Server, FTP Server, Email Server, and so forth.

DDoS
also often involve malware called botnets. It works like a Trojan horse that menembuh to a particular system and make the computer messengers (zombies). That's why computer users who are used to attack other computers sometimes do not realize it.

Prevention / neutralization:
Although there is no best way to avoid DDoS but identify where the weakest point in the network and use of firewall that is able to automatically eliminate the DDoS packets are 2 ways you can do to protect the system from this attack.

Use of the device ready to use kind of a Cisco Self Defending Network Appliance can also be used as another option to circumvent the DDoS attacks.

from : http://www.infokomputer.com

Brute Force

Brute Force is one of the ways crackers to guess the key word (password) specific.

The process is done by guessing the order of a password combinations from a combination of numbers from 0 to, A to Z, and so on each digit keyword.

Problems caused:
A successful keyword guess by brute force techniques result in unauthorized access to an account. If the successful administrator account adalan predictable (bigwigs in a system), it is not impossible that system will change hands (take over).

Brute Force is a technique through which the most popular system and bsia used in almost all systems that use keyword-based authentication system.

Prevention / neutralization:
1. Create kumci word that is not easily guessed. For example, a combination of numbers, letters and combinations of special characters such as "&^%$#@*"
2. Create a keyword with the number of characters not less than 8. The longer the number of characters that are used more and more difficult and takes time to brute force guess a combination.

from : http://www.infokomputer.com

Malware Bootsector

As the name , Malware bootsector settle for the next disk bootsector to spread itself by modifying the first street program in a system, eg operating system (OS)

Problems caused:
This type of malware is most commonly used to spread the virus because it works by changing the original information on the hard disk boot sector. The operating system has been infected will become a zombie (the messengers) to spread malware to save it detects all media, including CD ROM, USB Flash disk.

In addition to the hard drive, this one malware that can infect a variety of storage media, including CD ROM, DVD ROM, floppy disks, and USB Flash Disk.

Prevention / neutralization:
1. Use antivirus program
2. Reinstall Windows

from : http://www.infokomputer.com