Every Computer user has faced a computer virus attack in his/her lifetime. That’s why the first thing we do after installing an operating system is to install an Antivirus Program on our computer. Don’t we? So in this article we are not going to discuss about all antivirus programs and which one should you use. Instead of that,I am going to write of the most deadly computer virus of all times in the history of Computer Viruses.
Now Let’s Start our Journey of Viruses:-
Melissa:- The Virus created in 1999 by David L. Smith based on Microsoft Word macro. This Virus tempts its recipients to open a document with an e-mail message like "Here is that document you asked for" Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
ILOVEYOU:- The virus with a sweet name but of nasty nature created by Onel de Guzman of the Philippines . This virus spread in the same way like Melissa .It copied itself several times and hid the copies in several folders, added new files to the registry keys, replaced several different kinds of files with copies of itself, sent itself through Internet Relay Chat clients as well as e-mail,it downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address. According to studies , It is assumed that this virus had caused damage of $10 billion.
The Klez Virus:- This Virus established new standards in the virus technology due to its advanced features . The virus infect a computer through an e-mail message and replicates itself and then sent itself to people in victim address book .Moreover it can also use a contact name from the victim address book in From field to send itself .so as to tempt recipient to open that email. This is called email spoofing.
Code Red:- This virus emerged in 2001 exploits the vulnerabilities of operating system mainly found in Windows 2000 and Windows NT . The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. This virus creates a backdoor in computer so that a remote user can access the infected computer and also can use it to commit crimes.
Nimda:- Nimda virus when spelled backwards become admin emerged in 2001 spread rapidly over the internet at that time . This virus create a backdoor and give the attacker same level of functions of the account which is currently logged in . If the victim is logged in account with limited functions, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.
Slammer Virus:- Slammer Virus also Known as Sapphire Virus emerged in 2003 was created to attack mainly web servers . It used a SQL program to attack several important systems like The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. The estimated damage caused by this virus was of $1 billion. It mainly effected South Korea By cutting it off internet
MyDoom Virus:- MyDoom Virus like another worm searched victim computers for e-mail addresses as part of its replication process. It also use search engine to found emails and used the email addresses found in the search results. Search engines like Google began to receive millions of search requests from corrupted computers. These attacks slowed down search engine services and even caused some to crash.
Leap-A/Oompa-A Virus:- This Virus is special because it’s the Mac Virus instead of being a PC Virus and show that even a Mac computer could be infected with a virus . It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.
Wednesday, September 16, 2009
Most Deadly Computer Viruses of All Times
Every Computer user has faced a computer virus attack in his/her lifetime. That’s why the first thing we do after installing an operating system is to install an Antivirus Program on our computer. Don’t we? So in this article we are not going to discuss about all antivirus programs and which one should you use. Instead of that,I am going to write of the most deadly computer virus of all times in the history of Computer Viruses.
Now Let’s Start our Journey of Viruses:-
Melissa:- The Virus created in 1999 by David L. Smith based on Microsoft Word macro. This Virus tempts its recipients to open a document with an e-mail message like "Here is that document you asked for" Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
ILOVEYOU:- The virus with a sweet name but of nasty nature created by Onel de Guzman of the Philippines . This virus spread in the same way like Melissa .It copied itself several times and hid the copies in several folders, added new files to the registry keys, replaced several different kinds of files with copies of itself, sent itself through Internet Relay Chat clients as well as e-mail,it downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address. According to studies , It is assumed that this virus had caused damage of $10 billion.
The Klez Virus:- This Virus established new standards in the virus technology due to its advanced features . The virus infect a computer through an e-mail message and replicates itself and then sent itself to people in victim address book .Moreover it can also use a contact name from the victim address book in From field to send itself .so as to tempt recipient to open that email. This is called email spoofing.
Code Red:- This virus emerged in 2001 exploits the vulnerabilities of operating system mainly found in Windows 2000 and Windows NT . The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. This virus creates a backdoor in computer so that a remote user can access the infected computer and also can use it to commit crimes.
Nimda:- Nimda virus when spelled backwards become admin emerged in 2001 spread rapidly over the internet at that time . This virus create a backdoor and give the attacker same level of functions of the account which is currently logged in . If the victim is logged in account with limited functions, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.
Slammer Virus:- Slammer Virus also Known as Sapphire Virus emerged in 2003 was created to attack mainly web servers . It used a SQL program to attack several important systems like The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. The estimated damage caused by this virus was of $1 billion. It mainly effected South Korea By cutting it off internet
MyDoom Virus:- MyDoom Virus like another worm searched victim computers for e-mail addresses as part of its replication process. It also use search engine to found emails and used the email addresses found in the search results. Search engines like Google began to receive millions of search requests from corrupted computers. These attacks slowed down search engine services and even caused some to crash.
Leap-A/Oompa-A Virus:- This Virus is special because it’s the Mac Virus instead of being a PC Virus and show that even a Mac computer could be infected with a virus . It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.
Now Let’s Start our Journey of Viruses:-
Melissa:- The Virus created in 1999 by David L. Smith based on Microsoft Word macro. This Virus tempts its recipients to open a document with an e-mail message like "Here is that document you asked for" Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
ILOVEYOU:- The virus with a sweet name but of nasty nature created by Onel de Guzman of the Philippines . This virus spread in the same way like Melissa .It copied itself several times and hid the copies in several folders, added new files to the registry keys, replaced several different kinds of files with copies of itself, sent itself through Internet Relay Chat clients as well as e-mail,it downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address. According to studies , It is assumed that this virus had caused damage of $10 billion.
The Klez Virus:- This Virus established new standards in the virus technology due to its advanced features . The virus infect a computer through an e-mail message and replicates itself and then sent itself to people in victim address book .Moreover it can also use a contact name from the victim address book in From field to send itself .so as to tempt recipient to open that email. This is called email spoofing.
Code Red:- This virus emerged in 2001 exploits the vulnerabilities of operating system mainly found in Windows 2000 and Windows NT . The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. This virus creates a backdoor in computer so that a remote user can access the infected computer and also can use it to commit crimes.
Nimda:- Nimda virus when spelled backwards become admin emerged in 2001 spread rapidly over the internet at that time . This virus create a backdoor and give the attacker same level of functions of the account which is currently logged in . If the victim is logged in account with limited functions, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.
Slammer Virus:- Slammer Virus also Known as Sapphire Virus emerged in 2003 was created to attack mainly web servers . It used a SQL program to attack several important systems like The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. The estimated damage caused by this virus was of $1 billion. It mainly effected South Korea By cutting it off internet
MyDoom Virus:- MyDoom Virus like another worm searched victim computers for e-mail addresses as part of its replication process. It also use search engine to found emails and used the email addresses found in the search results. Search engines like Google began to receive millions of search requests from corrupted computers. These attacks slowed down search engine services and even caused some to crash.
Leap-A/Oompa-A Virus:- This Virus is special because it’s the Mac Virus instead of being a PC Virus and show that even a Mac computer could be infected with a virus . It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image.
EMAIL SECURITY, PC SECURITY »
EMAIL SECURITY, PC SECURITY »
How to Protect an Email Account from SPAMThu, 6/08/09 – 17:07 | No Comment
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising [...] Continue Reading…
Popularity: 21% [?]
ShareThis A Virus Program to Disable USB Ports
In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
ShareThis
Sun, 19/07/09 – 17:42 | 15 Comments
ShareThis
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
ShareThis
Sat, 18/07/09 – 20:41 | 14 Comments
ShareThis
Domain Hijacking – How to Hijack a Domain
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the …
ShareThis
Fri, 3/07/09 – 17:39 | 5 Comments
ShareThis
Cell Phone Spy – How to Spy on Cell Phones
Cell Phone Spy – How to Spy on a Cell Phone
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Sun, 21/06/09 – 22:10 | 13 Comments
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Which Spy Software to Choose?
Today there exists hundreds of Spy softwares available on the market. Because of this huge diversity of choice, people often get confused about which spy software to choose. Also because of this confusion there is no …
ShareThis
Fri, 5/06/09 – 11:17 | 25 Comments
ShareThis
Tips to Find Unauthorized Activity on Your Email Account
Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have …
ShareThis
Wed, 27/05/09 – 11:46 | 11 Comments
ShareThis
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
ShareThis
Thu, 7/05/09 – 22:27 | 59 Comments
ShareThis
Speed Up PC – Top 5 Ways to Speed Up Your Computer
5 Best Ways to Speed Up your PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
Mon, 20/04/09 – 19:48 | 16 Comments
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
A Closer Look at a Vulnerability in Gmail
Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the …
ShareThis
Thu, 9/04/09 – 17:56 | 16 Comments
ShareThis
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
ShareThis
Sun, 5/04/09 – 18:41 | 81 Comments
ShareThis
EMAIL SECURITY, PC SECURITY »
How to Protect an Email Account from SPAMThu, 6/08/09 – 17:07 | No Comment
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising [...] Continue Reading…
Popularity: 21% [?]
ShareThis A Virus Program to Disable USB Ports
In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
ShareThis
Sun, 19/07/09 – 17:42 | 15 Comments
ShareThis
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
ShareThis
Sat, 18/07/09 – 20:41 | 14 Comments
ShareThis
Domain Hijacking – How to Hijack a Domain
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the …
ShareThis
Fri, 3/07/09 – 17:39 | 5 Comments
ShareThis
Cell Phone Spy – How to Spy on Cell Phones
Cell Phone Spy – How to Spy on a Cell Phone
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Sun, 21/06/09 – 22:10 | 13 Comments
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Which Spy Software to Choose?
Today there exists hundreds of Spy softwares available on the market. Because of this huge diversity of choice, people often get confused about which spy software to choose. Also because of this confusion there is no …
ShareThis
Fri, 5/06/09 – 11:17 | 25 Comments
ShareThis
Tips to Find Unauthorized Activity on Your Email Account
Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have …
ShareThis
Wed, 27/05/09 – 11:46 | 11 Comments
ShareThis
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
ShareThis
Thu, 7/05/09 – 22:27 | 59 Comments
ShareThis
Speed Up PC – Top 5 Ways to Speed Up Your Computer
5 Best Ways to Speed Up your PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
Mon, 20/04/09 – 19:48 | 16 Comments
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
A Closer Look at a Vulnerability in Gmail
Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the …
ShareThis
Thu, 9/04/09 – 17:56 | 16 Comments
ShareThis
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
ShareThis
Sun, 5/04/09 – 18:41 | 81 Comments
ShareThis
EMAIL SECURITY, PC SECURITY »
How to Protect an Email Account from SPAMThu, 6/08/09 – 17:07 | No Comment
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising [...] Continue Reading…
Popularity: 21% [?]
ShareThis A Virus Program to Disable USB Ports
In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
ShareThis
Sun, 19/07/09 – 17:42 | 15 Comments
ShareThis
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
ShareThis
Sat, 18/07/09 – 20:41 | 14 Comments
ShareThis
Domain Hijacking – How to Hijack a Domain
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the …
ShareThis
Fri, 3/07/09 – 17:39 | 5 Comments
ShareThis
Cell Phone Spy – How to Spy on Cell Phones
Cell Phone Spy – How to Spy on a Cell Phone
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Sun, 21/06/09 – 22:10 | 13 Comments
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Which Spy Software to Choose?
Today there exists hundreds of Spy softwares available on the market. Because of this huge diversity of choice, people often get confused about which spy software to choose. Also because of this confusion there is no …
ShareThis
Fri, 5/06/09 – 11:17 | 25 Comments
ShareThis
Tips to Find Unauthorized Activity on Your Email Account
Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have …
ShareThis
Wed, 27/05/09 – 11:46 | 11 Comments
ShareThis
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
ShareThis
Thu, 7/05/09 – 22:27 | 59 Comments
ShareThis
Speed Up PC – Top 5 Ways to Speed Up Your Computer
5 Best Ways to Speed Up your PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
Mon, 20/04/09 – 19:48 | 16 Comments
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
A Closer Look at a Vulnerability in Gmail
Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the …
ShareThis
Thu, 9/04/09 – 17:56 | 16 Comments
ShareThis
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
ShareThis
Sun, 5/04/09 – 18:41 | 81 Comments
ShareThis
EMAIL SECURITY, PC SECURITY »
How to Protect an Email Account from SPAMThu, 6/08/09 – 17:07 | No Comment
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising [...] Continue Reading…
Popularity: 21% [?]
ShareThis A Virus Program to Disable USB Ports
In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
ShareThis
Sun, 19/07/09 – 17:42 | 15 Comments
ShareThis
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
ShareThis
Sat, 18/07/09 – 20:41 | 14 Comments
ShareThis
Domain Hijacking – How to Hijack a Domain
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the …
ShareThis
Fri, 3/07/09 – 17:39 | 5 Comments
ShareThis
Cell Phone Spy – How to Spy on Cell Phones
Cell Phone Spy – How to Spy on a Cell Phone
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Sun, 21/06/09 – 22:10 | 13 Comments
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Which Spy Software to Choose?
Today there exists hundreds of Spy softwares available on the market. Because of this huge diversity of choice, people often get confused about which spy software to choose. Also because of this confusion there is no …
ShareThis
Fri, 5/06/09 – 11:17 | 25 Comments
ShareThis
Tips to Find Unauthorized Activity on Your Email Account
Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have …
ShareThis
Wed, 27/05/09 – 11:46 | 11 Comments
ShareThis
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
ShareThis
Thu, 7/05/09 – 22:27 | 59 Comments
ShareThis
Speed Up PC – Top 5 Ways to Speed Up Your Computer
5 Best Ways to Speed Up your PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
Mon, 20/04/09 – 19:48 | 16 Comments
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
A Closer Look at a Vulnerability in Gmail
Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the …
ShareThis
Thu, 9/04/09 – 17:56 | 16 Comments
ShareThis
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
ShareThis
Sun, 5/04/09 – 18:41 | 81 Comments
ShareThis
EMAIL SECURITY, PC SECURITY »
How to Protect an Email Account from SPAMThu, 6/08/09 – 17:07 | No Comment
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising [...] Continue Reading…
Popularity: 21% [?]
ShareThis A Virus Program to Disable USB Ports
In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
ShareThis
Sun, 19/07/09 – 17:42 | 15 Comments
ShareThis
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
ShareThis
Sat, 18/07/09 – 20:41 | 14 Comments
ShareThis
Domain Hijacking – How to Hijack a Domain
In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the …
ShareThis
Fri, 3/07/09 – 17:39 | 5 Comments
ShareThis
Cell Phone Spy – How to Spy on Cell Phones
Cell Phone Spy – How to Spy on a Cell Phone
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Sun, 21/06/09 – 22:10 | 13 Comments
Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Which Spy Software to Choose?
Today there exists hundreds of Spy softwares available on the market. Because of this huge diversity of choice, people often get confused about which spy software to choose. Also because of this confusion there is no …
ShareThis
Fri, 5/06/09 – 11:17 | 25 Comments
ShareThis
Tips to Find Unauthorized Activity on Your Email Account
Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have …
ShareThis
Wed, 27/05/09 – 11:46 | 11 Comments
ShareThis
How to Find the IP Address of a Remote Computer
Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
ShareThis
Thu, 7/05/09 – 22:27 | 59 Comments
ShareThis
Speed Up PC – Top 5 Ways to Speed Up Your Computer
5 Best Ways to Speed Up your PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
Mon, 20/04/09 – 19:48 | 16 Comments
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
A Closer Look at a Vulnerability in Gmail
Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the …
ShareThis
Thu, 9/04/09 – 17:56 | 16 Comments
ShareThis
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
ShareThis
Sun, 5/04/09 – 18:41 | 81 Comments
ShareThis
Subscribe to:
Comments (Atom)