Lunes, Enero 9, 2012

reflection of case study 1

We just have a antivirus in our computers,laptops and in our USB that have detected if we download our files in the computer. It uses flaws in Windows software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use of many advanced malware techniques. The Conficker had infected an estimated seven million government, business and home computers in over 200 countries, making it the largest known computer worm infection since the 2003.the cause of the infected computers are the computers will shut down,causing the forcing aircraft at several airbasesto be grounded because their flight plans could not be downloaded and leading to its disconnection for three days.The Conficker was  first detected in November 2008.To start itself at system boot, the virus saves a copy of its DLL form to a random filename in the Windows system folder, then adds registry keys to have svchost.eve invoke that DLL as an invisible network service.

The symptoms  of the Conficker Worm are account lockout policies being reset automatically,certain microsft windows services such as automatic updates,background intelligent transfer service(BITS),windows defender and windows error reporting disabled, domain controllers responding slowly to client requests,congestion on local area networks(ARP flood as consequence of network scan),web sites related to antivirus software or the windows update service becoming inaccessible and user accounts locked out.

Walang komento:

Mag-post ng isang Komento