ads

all about virus


"A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect Reviews their programs. Every programs that gets infected can also act as a viral infection that grows :: Fred Cohen "

introduction 
----------------- 

Are You never heard what it was a virus, do you know what the virus is, here I will try to interpret what the virus. virus better known in medical terms as a virus or meaning of "biological virusses" also proved popular in the world of these electrons. these things happen because of the similarity in the distribution mechanism. 

Computer viruses can be interpreted clearly is an ordinary computer program. but have fundamental differences with other programs, which he made ​​to infect other programs, convert, manipulate even damage it. 

but there needs to be noted here, the virus will infect only when the trigger program or programs that have been infected earlier executed, where it differs from the "worm". I'm not going to try to discuss the worm because it will divert us from the discussion of this virus.

origin of virus 

1949, John Von Neuman, expressed "self-altering automata theory" which is the result of research mathematicians. 

1960, lab BELL (AT & T), the experts in the lab BELL (AT & T) to dabble theory expressed by John V Neuman, they play around with the theory for a type of game / games. The experts have made ​​a program that can reproduce itself and can destroy the opponent artificial programs. The program is able to survive and destroy all the other programs, it will be considered the winner. This game eventually became a favorite game each and every lab computer. the longer they were aware and cautious start this game because the program created more and more dangerous, so they do surveillance and tight security. 

1980, the program is eventually known as "virus" was successfully spread beyond the lab environment, and began circulating in cyberspace. 

1980, the virus began spreading viruses known in the cyber world. 

Types of Viruses 
----------------- 

To further refine our knowledge about the virus, I will try to give an explanation of the types of viruses that often roam the cyber world. 

1. Macro Virus 
   
I think we all have very often heard about this virus. The virus is written in the programming language of an application rather than the programming language of an Operating System. The virus can be run if the constituent applications can run well, that is if the computer can run applications mac word then this virus works on Mac computer operating system. 

examples of viruses: 
  • W97M-variant, eg W97M.Panther 1234 bytes long, it will infect and infect the Normal.dot document when opened. 
  • WM.Twno.A; TW :: 41 984 bytes, will infect Ms.Word document that uses a macro language, usually with extension *.DOT and *.DOC
  • etc 

This paper therefore I do not type in the word (:p) 

2. Boot Sector Virus 

Boot sector viruses are common once spread (frankly often formatted my hard drive because of a virus because of this: P, but because he was I am friends with him, :)). This virus will reproduce itself in a move or replace the original boot sector to boot virus program. So when there is a boot virus will be loaded into memory and then the virus will have the ability to control the standard hardware (ex :: monitor, printer, etc.) and from this memory is also the virus will spread throughout the existing drive and connected to computer (ex: floppy, drive other than c:\) 

virus samples :: 
  • Wyx virus variants (I am subscription :) ex: wyx.C (B) infect the boot record and floppy; length: 520 bytes; characteristics: memory resident and encrypted) 
  • Variant of the V-sign: infect: Master boot record; length of 520 bytes; characteristics: living in the memory (memory resident), encrypted and polymorphic) 
  • Stoned.june 4th / bloody !: infect: Master boot record and floppy; length of 520 bytes; characteristics: living in the memory (memory resident), encrypted and displays the message "Bloody june 4th 1989" account after booting the computer 128 times) 

3. Stealth Virus 
 
This virus will master DOS interrupt table table that we often refer to as "Interrupt interceptor". This virus capable to control instruction DOS level instructions and usually they are hidden as well as a full name or size. 
   
examples of viruses: 
  • Yankee.XPEH.4928, Infect files *.COM and *.EXE; length of 4298 bytes; characteristics: resident in memory, the size of the hidden, has a trigger 
  • WXYC (Which includes boot record category was due to enter the stealth category also included here), infects the master boot record and floppy; 520 bytes long; settled in the memory; size and hidden viruses. 
  • Vmem (S): infects files *.EXE, *.SYS, and *.COM; file length of 3275 bytes; characteristics: resident in memory, the size of the hidden, encrypted. 
  • etc 
4. Polymorphic Virus 

The virus is designed to fool antivirus programs, meaning the virus is always trying to avoid being recognized by antivirus fox by always changing the structure after each infected file/other programs. 

examples of viruses: 
  • Necropolis A/B, infects file *.EXE and *.COM; file length 1963 bytes; characteristics: resident in memory, and the size of a virus hidden, encrypted and can change its structure 
  • Nightfall, Infects files *.EXE; file long 4554 bytes, characteristics: resident in memory, and the size of a hidden virus, has a trigger, encrypted, and can change its structure 
  • etc
5. Virus File/Program 
 
This virus infects files that can be executed directly from the operating system, be it an application file (*.EXE), and (*.COM) usually results from infection with this virus can be identified by changing the file size is attacked. 

6. Multi Partition Virus 
 
This virus is a combination of boot sector viruses and file viruses: means work performed resulted in two, that he can infect files *.EXE and also infect the boot sector.

criteria Virus 
-------------- 

A virus, it can be said is completely true virus when at least have 5 criteria ( the criteria I get from a reliable source :)) 
  1. ability of a virus to obtain information 
  2. ability to check a program 
  3. ability to replicate and infect 
  4. ability to manipulate 
  5. ability to hide itself. 
Now I will try to briefly explain what is meant by each of the capabilities and why it is needed. 

Now I will try to briefly explain what is meant by each of the capabilities and why it is needed. 

The ability to obtain information 

In general, a virus requires a list of the names of the files in a directory, for what? so that he can recognize what programs would he infect, such as macro viruses that will infect all files ending in (* doc) after the virus was found, where the ability to gather the necessary information so that the virus can create a list/data of all files, then sort by searching for files that can be infected. This data is usually created when a program is infected or infected with the virus program or even executed. The virus will be to collect the data and put in RAM (usually: P), so that when the computer is turned off all the lost data but will create every program run normally made ​​hidden infected by a virus (so not plasticity). 

Examine the ability of a program

A virus should also be able to check a program to be infected, for example, he served infect extension program (*.doc), he should check whether the document file has been infected or not, because if it is then he will be useless infecting 2 times. It is very useful to improve the ability of a virus to infect a speed in terms of file/program.Yang virus is commonly performed by a mark on the file / program which has infected so easy to be recognized by the virus. Examples of marking is for example provide a unique byte in every file that has been infected.

Ability to replicate itself 

the core of the virus is the ability to duplicate itself by infecting other programs. A virus has found a potential victim (either a file or a program) then it will recognize the look, if not infected then the virus will begin to infect the action by writing byte identifier in the program / ​​file, and so on to write virus code above object files / infected program. Some common ways are done by the virus to infect / reproduce itself are: 
  1. File/program to be infected deleted or renamed. then created a file using the name by using the virus (the virus changed his name with the name of the deleted file) 
  2. Virus program already in execution/load memory to be directly infect other files by means riding all files/programs that exist. 
The ability to double the manipulation 

Routine (routine) owned by a virus will be executed after the virus infects a file / program. contents of this routine can range from mild to destruction. This routine is commonly used to manipulate programs and popularizing the author! (: P) This routine utilizes the ability of an operating system (Operating System), so it has the same ability to that of the operating system. 

eg:
  1. Creating an image or message on the monitor 
  2. Replace / change the change the label of each file, directory, or the label of the drive in pc 
  3. Manipulating programs / files are infected 
  4. Undermine the program / ​​file 
  5. Disrupting the work printer, etc. 
The ability to hide themselves

Hiding away this ability to be possessed by a virus that all the good work from the beginning to the success of transmission can be accomplished. usual steps are: 
  • The original program code is stored in the form of machines and combined with other programs that are considered useful by the user. 
  • Program Boot Record virus or placed on a track that is rarely noticed by the computer itself 
  • The virus program is made as short as possible, and the results do not change infected file     size 
  • The virus does not change the description of the time a file 
  • etc 


Here's How Hackers Steal Nude Photos of Jennifer Lawrence


Internet universe yesterday shocked by the spread of nude photos of hundreds Hollywood celebrities, including Jennifer Lawrence, Selena Gomez, Ariana Grande, Rihanna and Kate Upton. Strong suspicion that the photo spread by hackers who managed to break into the victim's iCloud account. 


The assumption is becoming stronger after in the afternoon, appeared iBrute tool that uses a Python script on GitHub site. iBrute can be used to steal user passwords Apple iCloud. The script exploit security holes in anti-theft feature Find My iPhone.

Attacks by a method called the Brute-Force iPhone users to guess a password repeatedly to find the correct password. The attacker can do since Find My iPhone does not restrict the error to enter a password, also did not remind any suspicious activity to the one underway when the user tries to access his personal account.


When an attacker successfully find the desired password, they can access freely iCloud because most iPhone users synchronize cell phone with the service. When connected to iCloud, iPad, iPhone or your Mac will automatically synchronize, photos, videos, contact number and e-mail addresses to iCloud. 

The Next Web reported that a Twitter user successfully using the tool of the GitHub users to access multiple iCloud accounts, but the gap was finally closed Apple on Monday (1/9) yesterday.

Today, when we enter the wrong password five times, Apple will disable our Apple ID automatically. To The Next Web, the creator of these tools, Haackapp, claimed to have seen evidence that the Brute-Force method used to hack into accounts of Hollywood celebrities, but it could be someone already using it.


Interestingly, Hackapp also explain another drawback of iCloud are very open to hackers exploited. Against this problem, Apple explained that they are still investigating.


"We take user privacy seriously and we are actively investigating these reports," said Apple spokesperson Natalie Kerris

Linux History [part 1]



The Birth of "UNIX" 
 
Forerunner to the birth of Linux began in the late 1960s at a company AT & T (American Telephone and Telegraph). At that time, AT & T in collaboration with MIT (Massachusetts Institute of Technology) works by using operating system called "Multics". Multics had a lot of problems, the biggest problem is the high cost incurred to run on the mainframe General Electric (GE 645). Subsequent developments were to be unsatisfactory.

However the use of Multics retained because it offers the ability multi user (shared use). The programmers have to work together and exchange information easily, and they are eager to be able to escape from the huge cost problems. Along with the development and improved financial, the group is trying to find a suitable replacement for Multics.

Ken Thompson, one of the group members AT & T, began designing a game called "Space travel", unfortunately this game also cost you a fortune to be played. When Thompson found a digital computer the PDP-7, along with fellow student Dennis Ritchie, they rewrote the game in assembler and move it by using paper tape. In the development of the game move they have put "command interpreter" and some basic commands to copy and move files

Beginning in 1970, Brian Kerningham, a developer other than AT & T proposed the name "Unix" as a pun on Minix (equipment to teach programming). Began a forerunner to an operating system called "Unix". Unix development team is asking for the PDP-11 computer to the management of AT & T, the more powerful machine than the PDP-7, but it is cheaper than all costs to be paid in advance.

the introduction of LAN network[part 1]



Understanding and Working Principle LAN 

LAN can be defined as a network or a network of computer systems, which are located in one building is limited, a complex building or a campus and not using the common media of communication facilities such as telephone, but the owner and manager of media communications is the owner of LAN itself. From the definition above we can know that a LAN is limited by physical location. As for the use of LAN itself lead to all computers connected in a network can exchange data or otherwise related. Cooperation is growing from only the exchange of data through the use of equipment together. LAN are generally using a hub, will follow the working principle of the hub itself. In this case is that the hub does not have knowledge of the destination address so that the delivery of broadcast data, and also because the hub has only one collision domain so that if one port is busy, the other ports will have to wait.

Basic Components of LAN 
=================== 
Some of the basic components of a LAN are usually formed as follows: 
  • Workstation 

Workstation is a node or host in the form of a computer system. The computer system can be either a PC or can be in the form of a large computer systems such as minicomputers, even a mainframe. Workstations can work alone (stand-alone) can also use the network to exchange data with other workstations or users. 
  • Server 

Hardware (hardware) that functions to serve the network and workstations connected to the network. general resources (resources) such as printers, disks, and so on to be used jointly by the users at workstations reside and work on the server. Based on the type of service known disk server, file server, print server, and a server can also have multiple functions at the same service.
  • Link(association) 

Workstations and servers can not function when the equipment is not physically connected. These relationships are known as the LAN transmission medium which is generally in the form of cable. As for some examples of the link is: 
1. Twisted Pair Cable 
  • The cable is divided into two, namely Shielded Twisted Pair and Unshielded Twisted Pair(UTP) 
  • More widely known as a telephone cable 
  • Relatively inexpensive 
  • Short distance 
  • Easily influenced by disturbances 
  • Data rate that can be supported is limited, 10-16 Mbps 

2. Coaxial Cable 
  • Commonly used on television 
  • Relatively more 
  • Data transmission speeds higher than the Twisted Pair, 30 Mbps 
  • Prices are relatively inexpensive 
  • The size is larger than Twisted Pair 

3 Fiber Optic Cable 
  • The long distance 
  • High data speed, 100 Mbps 
  • The size of the relatively small 
  • Difficult influenced disorders 
  • The price is still relatively expensive 
  • Installation is relatively difficult 

  • Network Interface Card(NIC)

A workstation is not connected directly to the cable or transceiver cable networks, but through an electronic circuit that is designed specifically to handle network protocol known as the Network Interface Card(NIC).

  • Network Software

Without the software network then the network will not work as desired. This software also allows one computer system to communicate with other computer systems. 

LAN Support Tools 
============== 
a. Repeater 
  • In OSI, working at the Physical layer 
  • Continue and strengthen the signal 
  • Widely used in bus topology 
  • Its use is easy and relatively cheap price 
  • Not to have knowledge of the destination address so that the delivery of broadcast data 
  • Only have one collision domain so that if one port is busy, the other ports will have to wait. 

b. Hub 
  • Work on the Physical layer 
  • Forwarding signal 
  • Not to have knowledge of the destination address 
  • Its use is relatively easy and affordable prices 
  • Only have one collision domain 

c. Bridge 
  • Working in the Data Link layer 
  • Have used the addresses to forward the data to its destination 
  • Automatically create a table translator for each port received 

d. Switch 
  • Working in the Data Link layer 
  • Each port in the switch has its own collision domain 
  • Have a central translation table that has a list of interpreters for all ports 
  • Allows the transmission in full Duplex (two-way) 

e. Router 
  • Router or filter function to filter the data traffic 
  • Determine and select the alternate path to be traversed by the data 
  • Connecting the LAN inter-networking, even with the WAN

LAN topology 
========== 
Understanding Network topology is the arrangement of the data flow path in the network that physically connects one node to another node. The following are some of the existing network topology and used to date, namely: 
  • Star topology 

Some node / nodes connected by the central node / host, which form a physical network such as stars, all communications are handled directly and managed by a mainframe host computer.



  • Hierarchical Topology 

Shaped like a branching tree that consists of a host computer(host) connected to the node/other nodes in stages. Higher level serves as a regulator of the underlying employment levels.



  • Bus Topology 

Some node/nodes connected by data path(bus). Each node can perform the tasks and operations that are different but all have the same hierarchy.



  • Loop Topology 

Is the relationship between the node/nodes serially in the form of a closed circle. In this form there is no central node/host, all have the same hierarchy.



  • Topology Ring 

This shape is a combination of form and bus loop topology, if one node/node is damaged, it will not affect other communication nodes as separate from the data path.


  • Topology Web 

Is a form of topology, each node/nodes in the network can be interconnected with other nodes through some links. A web form network with n nodes, will use as many links as n (n-1)/2.



By using all the advantages and disadvantages of each configuration, allows the development of a new configuration that incorporates several new technologies that accompanied topology ideal conditions of a network system can be fulfilled.

[WANT TO BE A HACKER]



To be a hacker, which is needed first of all is the desire. Because the question is not 'Will I become a hacker?', But 'Do I want to become a Hacker?'. If you have the desire, then you have to have a capital base as your foundation you in step. 

Everything must start from a dream, and certainly if you have a dream, you will try to make it happen. In essence, before stepping make sure that you have had the desire. 

[*] Learn the programming language. 

The first thing you should learn is the programming language. Currently in the distribution of the Linux operating system, there are a variety of useful tools that will support you to learn to program. 

To get Linux is now very easy, you can buy it online or get a copy of his CD's from a friend. Or if you have good internet access, you can directly download linux distributions its official website, or through www.linuxiso.com. 

According to Eric S. Raymond, a good programming language to learn for the first time is the 'Python'. 

"The design of its clean, well documented and easy enough for a beginner" 
 [ERIC S. RAYMOND] 

[PYTHON] 

$ python 
Python 2.1.1 (# 2, Sep 26, 2001, 09:32:53) 
[GCC 2.95.3-5 (cygwin special)] on cygwin 
Type "copyright", "credits" or "license" for more information. 
>>> 

>>> Print "Hello world \n" 
hello world 

>>> 

[PYTHON EOF] 

After python, you can proceed with the 'JAVA'. Java is very popular, because 'bytecode' compilation results are 'Machine Independent' that does not depend on the machine or the type of processor, but it depends on 'its Runtime Environment'. But behind his lead, 'greedy' memory is one of the weaknesses of Java. 

In the end, if you want a serious towards programming, inevitably you will be dealing with the C language used to write the Unix and Linux operating systems (as well as other operating systems). 

Assembly language is also important. Where if you master the assembly you will begin to feel the 'soul of a machine'. You will learn to program something from the ground, each part of the program, so that you will understand the 'How It Works!' 

Books or courses alone will not be enough to make you a reliable programmer. Reprogrammed to be done such as using everyday language. All you have to do is read the code and write code. 

Try to read the code (open source software) others. Learn the mindset and its problem-solving techniques. And try to find a better way. 

[*] Learn and develop one of the Unix OpenSource. 

Why Linux / Unix OpenSource so important? It all can not be separated from the spirit of OpenSource itself. By studying the codes released free in OpenSource operating system, we can study the mindset of a programmer / hacker, we can find their way in handling the problem and trying to find a method of solving problems better than what they do. OpenSource also helps us in building an application, so we do not need to be bothered with the 'research'. They have done it for us, and we can use the time left for something more specific.

"I could be far-sighted, because I am standing on the shoulders of geniuses past .." 
[Sir Isaac Newton]

[*] Learn new things. 

Many new things arise, and every thing (whatever) will give us a lesson for life and life is HACKING. Avoid to be skeptical and open-minded to start. New things all the more so radical, many of the most skeptical people, but an open mind will give you a good groove in the knowledge gain. 

Science is everywhere. Even in a considered dirty. For example, you try to compare 'dirt' cattle (herbivores) with 'dirt' cats (carnivores). We can see that the cow dung 'over mounting "of the cat feces, and not in spite of it, in general we can draw the conclusion, that the herbivores (plant eaters) than carnivores (meat eaters). The cause is most relevant to this case is a factor of 'food'. Plants consumed by herbivores (cows in this example) contains 'cellulose' or more difficult to digest fiber, so more leave residual substances. This is not true carnivores (in this example the cat). The meat is more easily digested, so just leave a little residual substances. 

With a little imagination dirty, just imagine the things dirtier to be analyzed and taken lessons. 

Within the scope of a computer, learn all new things. You can find a lot of new things through the article, journal, or the news 'nerd' in 'slashdot'. 

[*] Always use logic. 

Think with logic is needed in Hacking. In Hacking you will be dealing with a variety of circumstances to be analyzed and solved logically. 

Logic will help you to revive the lost rationality and thinking helps you to live and stay alive. 

[*] Follow the development of technology and information. 

Information technology is developing very fast. A programming language that we learn today can be quickly replaced with a new programming language or visuals that are easier to read and easier, rather than a fool. All that changed with the passage of time and when we realized we left far behind. 

A good idea to always read, or at least get a 'digest' of the sciences/latest info. You can also get information from mailing lists and newsgroups. 

With the always up-to-date, you will always be close to the information. 

[*] Know the things that have not been known. 

In anything in this world, we must reflect. Dispose of all prejudices and values​​. Discard the unilateral assumption that 'I am a wizard'. Sit down for a moment and began to think. 

What do I know? 
What do not I know? 
Would I know? 

If yes ... 

What should I do? 

Of course learning! 

Why is this so difficult? 

Because you do not have a firm grip! 

What should I do? 

Know what you know not !!!! 

To be able to understand the computer you will find something that is interconnected. To understand the first thing you have to understand a few other things. 

To be able to understand how the NMAP (Os fingger Print, which utilizes sequence TCP/IP stack as an identifier) you must first understand the concept of the C programming language, you also have to understand the 'pointer', and the concept of pointers is closely related to 'stack', you should also have a good understanding of the stack! 

You also will be busy with studying the concept of TCP/IP. You also need to know first 'where can i get info about the TCP/IP'. In this way, pull the conclusion to get to know and understand everything and to find answers to things we do not know! 

[*] Keep Learning. 

The most important of all the above is always learning. Without learning you will not gain anything. Never assume if it 'has' become a hacker you would stop learning, on the contrary you will begin to learn again to be a dedicated hacker. 

Continue to learn, and remember when you stop for a moment and think back ... you have become a formidable Hacker !. 


[*] Serve the hacker culture 

Once everything is finished and you are resting after activity Hacking exhausting 37 hours. Try to remember back. 

Who introduced you to the computer? 
Who is guiding you learn it? 
Who accompany you faithfully pursue information? 

Who was the first one to introduce you to HACKING? 
Teach you the techniques of Basic Hacking? 
Teach you about behaving and thinking like a HACKER? 

Who makes Hackers operating system, Linux? 
Who developed it? 
Who made it so easy to operate with 
look so pretty? 

Who has made you EXIST in this world? 

Make them Happy ..... 
If you think the best way to please them is to pay them the money, you are absolutely wrong. If you do is say thousands of thanks to them, also WRONG. 

Just do what they have done. If you find it with this document, create a new document, create a better and share it with others! 

By doing the little things the best you can do, then you have devoted to the hacker culture. 

And when the morning came, and the sun emit light. ALREADY TIME TO GET OUT, ​​AND KNOWN THE WORLD.

Thanks to 
H3D87 a.k.a MOBY
eCHo staff: Y3DIPS, THE_DAY2000, COMEX
Thank you to my good friends (who never I know who)

[CYBER COMMUNITY]


As with real life, cyber society also form communities based on the mood and the idea of ​​equality. Some are based on the area/region. Hacker community is growing in tune with other cyber community. As a community, the community consists Hacker 'elders' along with its members. Hacker community, usually do not have a leader and the leader is not so appreciated. They believe all forms of 'mastery' is not good. But from that point on, the community elders Hackers know, 'chiefs', or someone who elevated level but is not considered a leader. 

Basically, do not either have a ruler(if the leader is defined so). And Hacker do not believe the authorities, in which individuals become ruler over himself. 

In the community, it is impossible to live without rules, also without a leader, Hacker also realized it. For that 'elders' or 'chieftain', 'elite', or 'Demigod'. They lifted up and be heard (for progress together), but unlike the real world leaders, respected elders do not deserve to excess. They are valued because of its reputation, dedication not because he is an elder. 

Hackers gather and communicate electronically via the mailing list or IRC discussions. But the real hacker community often marred by Lamer(term for people who do not have the ability Hacking, too arrogant and prides itself via IRC channels).

Community at the present time is very bad. According to a colleague of the USA that I contacted expressed "Hacking Scene is just a bunch of loosers small penis". Yes, there is truth. If we look at the reality of today's 'The Hacker' is simply a group of school children who are good at using a script, without wanting to know how the script works. Indeed, they are part of a community, but if they do not want to learn, they will not be more powerful than the 'Small Penis loosers'. 

Other than that, there remains a serious group of young people gradually learn and improve their abilities, to become a True Hacker. 

Main stream hacker's world now has much changed, they begin to destroy the infrastructure that has been initiated by his predecessor. And even worse, they were not willing to learn and be smart, so forever be a fool. 

I'm sure you do not want to be like that !!

[Conscience OF THE HACKER]


This is our world now
Its world-electron and the switch
and the beauty of the baud

We understand there is no nationality, skin color, or religious prejudice

You proclaim war, kill, and cheat, and lie to us and ensure that this is for our own good, but still we are called criminals

Yes ... I was a criminal

My crime is that of curiosity

My crime is MORE CLEVER of you, something that you did not expect

I was a HACKER, and this is my MANIFESTO

You can to stop me, but will never be able to stop us all..

ads