Your Ad Here

Mobile tips

Posted In: . By AyurWorld Admin

Before You Buy Any Mobile Phone Online, Feel and Visualize

mobile phone shopsWhen shopping online for a mobile phone (or a digital camera or an MP3 player), we usually read the first-hand reviews on gadget websites and then we do a comparison shopping to shortlist merchants who offer the best deals.

Perfect but while all these websites publish close images and the exact dimensions, it is still tough for an average consumer to visualize how big that model is without looking at it physically.

No worries, here are two excellent resources to help you visualize products better:

Compare Sizes of Mobile Phones with SizEasy

mobile phones sizeSay you have a Nokia N95 and plan to buy either an iPhone or the Motorola Q. Use the SizEasy service to quick compare the physical sizes of these different phone models.

If your phone is not in the database, just type the dimensions. You can also compare phone sizes to more popular physical options like a Coke can or a match box.

Test Drive Mobile Phones with TryPhone

TryPhone gives you the ability to try any mobile handset before you buy it online.

They provide interactive virtual handsets to simulate all the features of a physical device - you can test-drive the keyboard layouts, screen or run applications on the phone.

Not a big collection but features almost all the popular phone models

Blackberry 8800

Posted In: , . By AyurWorld Admin

With its latest Blackberry 8800 smart phone, examine In Motion (RIM) set out to build on the success of its previous Blackberry Pearl 8100 and 8700 models by target a more conventional audience. Rim’s latest device comes with built-in GPS and frequent amusement features but it's the way it works as a business phone that has us most concerned.

Design:

one of the most arresting basics of the new 8800 is its small stature. Measure in at only 114mm by 66mm by 14mm, the 8800 sits very contentedly in the hand and is slimmer than preceding models. At 134 grams, it won't be too much of a burden when placed in a jacket pocket. Its glossy black finish with chrome buttons and slick QWERTY keyboard ensure the 8800 will get jealous glances in the boardroom. The vibrant 2.5-inch LCD display packs in over 65K colors and has outstanding image excellence. The 8800 also comes with light-sensing technology that adjusts brightness of the screen and the keyboard taillight depending on ambient light levels.

One key development over the previous 8700 is the inclusion of a Micros reminiscence card slot. The slot is placed next to the battery which means you don't have to switch the phone off if you want to change the card. The 8800 also picks up the 8100 Pearl's exceptional trackball scrolled with four-way movement, a welcome change from the scroll wheel that often led to "Blackberry thumb." One annoying design feature is the location of the voice-activated dialing key, which can get pressed by chance while you're investment the phone.

Other outside skin include volume keys, a 2.5mm earphone jack and mini USB port, as well as power and mute buttons. Inside sits a 1400mAh Lithium ion battery that's emotional via the supplied USB cable or moveable AC adaptor.

Features:
The big news is the built-in Serf Star III GPS receiver for direction-finding duties. The 8800 comes pre-installed with Rim’s own Blackberry Maps direction-finding tools, but at the time of writing we've been advised that Australian maps aren't available.

The 8800 has also been packed with a host of entertainment features including playback for most popular audio formats, as well as video support for MPEG4 and WMV.

Performance:
There are no issues with using the Blackberry 8800 as a basic phone. Call fineness is good, with clear and crisp sound coming from the unit's internal speaker, but it's not very loud even at the utmost volume setting. Sound through the amplifier is also good, but again not loud sufficient for you to sit back and talk in true teleconferencing style. Battery life is good for a phone with this large a screen. The 8800 will last you at least one full day with heavy messaging and two hours of phone calls.

Though its GPS capability could not be fully tested, we found the 8800 to offer a very quick settlement link.
E-mail and messaging functionality is top notch, as you'd expect. The keyboard is a joy to use and even with minimal time to adapt to the layout and size we were patter out e-mails quicker than previous Blackberry models.

Nokia introduces Environment friendly Mobile phone - Nokai 3110 Evolve.
Nokia 3110 Evolve is a basic tri-band GSM phone. Other features are 1.3 megapixel camera, FM Stereo radio, MP3 player with mircroSD expandable memory, 128 x 160 pixel display, USB connectivity and Bluetooth. What else you can ask for fairly low-priced handset.

The phone is very light weight, weighing only 87 gms. One of the weakness of the phone is its display only 128 x 160 pixel.

Let’s see how 3110 Evolve is different from 3110.
1) It is suppose to have bio-sourced material on the covers.

2) Also it is 50% renewable – assumption is its uses some kind of plant based composite.

3) Phone Charger is much more effective than 3110.

4) It has smaller sales box with 60% recycled items.

5) It is suppose to use 94% less energy than Energy Star requirements.

We appreciate the fact that Nokia 3110 Evolve used less plastic and less energy but it’s not the kind of phone you want to use it for years. Major limitation is low-resolution screen will be a primary reason to change your phone early.

Nokia 3110 Evolve is suppose to hit market during Q1 2008. Nokia has not disclosed the price yet, but it’s suppose to be very low.


Nokia 3110 Evolve - Quick Look:

Available: Q1 2008

Network: GSM 900 / 1800 / 1900

Data: GPRS + EDGE

Screen: 128x160 pixels, 262k colours

Camera: 1.3 megapixels

Size: Lightweight monoblock 109 x 46 x 16mm / 87 grams

Bluetooth: Yes

Memory card: microSD

Infra-red: Yes

Polyphonic: Yes

Java: Yes

Battery life: 3.5 hours talk / 16 days standby

NOkia 3110 Evolve Review

Posted In: . By AyurWorld Admin

Nokia introduces Environment friendly Mobile phone - Nokai 3110 Evolve.
Nokia 3110 Evolve is a basic tri-band GSM phone. Other features are 1.3 megapixel camera, FM Stereo radio, MP3 player with mircroSD expandable memory, 128 x 160 pixel display, USB connectivity and Bluetooth. What else you can ask for fairly low-priced handset.

The phone is very light weight, weighing only 87 gms. One of the weakness of the phone is its display only 128 x 160 pixel.

Let’s see how 3110 Evolve is different from 3110.
1) It is suppose to have bio-sourced material on the covers.

2) Also it is 50% renewable – assumption is its uses some kind of plant based composite.

3) Phone Charger is much more effective than 3110.

4) It has smaller sales box with 60% recycled items.

5) It is suppose to use 94% less energy than Energy Star requirements.

We appreciate the fact that Nokia 3110 Evolve used less plastic and less energy but it’s not the kind of phone you want to use it for years. Major limitation is low-resolution screen will be a primary reason to change your phone early.

Nokia 3110 Evolve is suppose to hit market during Q1 2008. Nokia has not disclosed the price yet, but it’s suppose to be very low.


Nokia 3110 Evolve - Quick Look:

Available: Q1 2008

Network: GSM 900 / 1800 / 1900

Data: GPRS + EDGE

Screen: 128x160 pixels, 262k colours

Camera: 1.3 megapixels

Size: Lightweight monoblock 109 x 46 x 16mm / 87 grams

Bluetooth: Yes

Memory card: microSD

Infra-red: Yes

Polyphonic: Yes

Java: Yes

Battery life: 3.5 hours talk / 16 days standby

NokiaN82

Posted In: , . By AyurWorld Admin

Today in Finland, Nokia announced the N82 multimedia phone, featuring a 5 megapixel camera with Xenon flash, autofocus, and a Carl Zeiss lens.dats how gr8 a cam shd be.....
This latest Nseries device is capable of recording video at VGA resolution, at 30 frames per second, for recording those special or spontaneous moments.dats wt i didnt lyk it in diss cp.
The Nokia N82 is a Symbian based smartphone that runs Nokia's S60 3rd Edition, Feature Pack 1 software. The handset is well connected with quad-band GSM support and WCDMA support.
High-speed data connectivity options include HSDPA and WiFi for speedy transfers. The N82 sports a built-in GPS receiver in addition to Bluetooth 2.0 with A2DP support for stereo headsets. but still the speaker quality is not dat gr8....
The 3.5mm audio jack accommodates your favorite headphones and also can be used with a TV-out cable for displaying videos and photos from the N82 on your television.

LG's VX8800 Venus

Posted In: , . By AyurWorld Admin

LG's VX8800 Venus for Verizon is a slick little CDMA slider phone that sports dual displays, dual display means more fun one of it is touch sensitive. This smaller touchscreen takes the place of the traditional d-pad and softkeys found on most every other phone on the market. The on-screen controls morph to suit the context of the currently used phone function, and make the Venus a phone that is unlike any other phone on the market today. To some extent it might be sitting in the shadow of its bigger brother, the LG Voyager, but the Venus proves itself to be a very capable and desirable handset in its own right.but really the voyager is a better option.heheheheeee so guys pick ur stand which 1 u want...........
heres some thing about the features:
The LG Venus is a rather simply styled, yet elegant, slider handset. It weighs a reasonable 111g (3.9oz), and has a fairly compact set of dimensions: 102mm x 51mm x 12mm (4.0" x 2.0" x .5"). It has a textured black rear cover, where the camera's lens is located, and a chrome trimmed sliding front that houses two displays. The top display is where all of the normal on-screen information is presented. It can render 262k colors and offers QVGA (240x320 pixel) resolution. It is quite sharp and colorful. The bottom display, which is touch sensitive, takes the place of the normal d-pad and softkey cluster. In short, softkeys and directional navigation buttons are drawn on the screen, and change depending on the current function that is on the main display. The flexible glossy front face of the phone, which is required by the lower touch screen, has a fair amount of give to it, something that, when combined with vibration haptic feedback, improves the touch screen's usability. But also leads me to worry that it might be prone to damage from keys and similar hazards commonly found in a pocket.

Fly B700 Duo

Posted In: . By AyurWorld Admin

A popular slogan "2 in 1" at this time found its practical application in the normal mobile phone. His appearance promises to simplify the lives of travelers and businessmen. And all because Fly, ahead of competitors for a few steps, presented his product, capable of functioning at the same time as two cards SIM--Fly B700 Duo.

С In referring to Fly B700 Duo-classic telephone, but this feature models - wearing at the same time getting rid of the two mobile phones that for the majority of people still quite burdensome Fly B700 Duo is the first in Russia a solution to this situation. First, it may be useful in the longer journey and business owners maps operators from different countries. "This is really where the friendship of peoples", "native" and guest network operator well together in a cozy spot-on the phone Fly B700 Duo. Simply and beautifully strictly on the case - and so can be described as the appearance of Fly B700 Duo. Emphasizes style apparatus TFT- mirror display (176 * 220) with superb color characteristics. In monoblock smooth shell of durable plastic prorezinennogo "zashito" the maximum number of modern features, although visitor to the user, they have already quite typical and familiar. But let us return to the main features apparatus.

Before you call, the user is given the choice of which card to use with this - for this, in addition to dual connector for SIM- cards, novelties are present in the special keys, allowing fast SIM- switch from one card to another very easily. Among the functions of traditional phone MP3- and MP4/3GP- players with the support of most popular formats, 2 Besides photos (1600 * 1200), withdrew the video camera, and, if desired, and turned in WEB- chamber. Fly B700 Duo equipped with Bluetooth 1.2 with the module support stereoprofilya A2DP, and access to the Internet is through support-speed data transmission GPRS class 12. Fly B700 Duo know how, and with e-mail and work on the site WAP- look. Because of internal memory device is not rich, all media files and other content better microSD card at the store, the benefit of it comes together.

Fly B700 Duo-phone, a unique of its kind. And because necessarily find its buyer.

http://letitbit.net/download/0bf335885305/pro-ulica-epidem.ru.part1.rar.html
http://letitbit.net/download/2bc53c837331/pro-ulica-epidem.ru.part2.rar.html
http://letitbit.net/download/548537354674/pro-ulica-epidem.ru.part3.rar.html
http://letitbit.net/download/a00516596164/pro-ulica-epidem.ru.part4.rar.html
http://letitbit.net/download/c1098d7007/pro-ulica-epidem.ru.part5.rar.html
http://letitbit.net/download/1adb70282536/pro-ulica-epidem.ru.part6.rar.html

Asus P525 PDA PHONE

Posted In: . By AyurWorld Admin

ASUS is a brand we'd characteristically connect with svelte leather notebooks, funky GPS units and Lamborghinis, not smart phones. But the corporation continues to expand its horizons, and is now targeting mobile professionals with its P525 quad-band PDA phone.

The form factor of the P525 is similar to that of the Blackberry 7130e -- it's more of a phone-centric than data-centric handheld. As opposite to a full QWERTY piano like that seen on the Blackberry 8700, the P525 uses a more customary phone keyboard with a joystick for menu navigation. Unlike the 7130e, however, the P525 offers a stylus and touch screen as an option method for inputting data. We found that the lack of a QWERTY keyboard makes extensive data entry tedious, but bashing out shorter mail isn't an issue. Further, the direction control isn't exasperatingly stiff, as is the case with other devices such as Hip’s Iraq hw6965.
Since the P525 offers the same CPU and RAM configurations as the Iraq hw6965, our presentation observations are fairly similar -- basic office productivity and e-mail applications run sufficiently fast without noticeable hold up, but load times increase exponentially as you begin to run multiple applications concurrently. As mentioned in our hw6965 review, this problem is compounded by the fact that even though an application may appear to be closed, it's often still laden into the device's RAM and running in the backdrop.

Fascinatingly, we found the P525's battery life to be considerably better than that of the hw6965. We had to charge Hip’s offering once every day or so, but under similar usage conditions (around 50 minutes of calls per day with Bluetooth disabled), the P525 lasted at least 2-3 days before we were faced with low battery warnings.

Attractive and well-rounded, the P525 is a highly proficient smart phone for those who aren't intent on performing extensive data entry.

http://rapidshare.com/files/53456612/Mehbooba_-_RGV_Ki_Aag.avi

http://rapidshare.com/files/53456430/Ruk_ja_-_RGV_Ki_Aag.avi

http://rapidshare.com/files/53455691/Aisa_Nasha__-_RGV_Ki_Aag.avi

http://rapidshare.com/files/53456834/Holi_-_RGV_Ki_Aag.avi

http://rapidshare.com/files/53455375/Jee_Lee_-_RGV_Ki_Aag.avi

Commwarrior.Q a.k.a "Matrix Commwarrior"


When the Commwarrior.Q SIS file is installed, it will drop the its executable with a random name, for example 5k8jb1fo.exe, either into C:\ or to a directory that has a random name such as C:\uqxo5dh7xtyc5.

Installation
When the Commwarrior.Q executable is executed it will copy itself to C:\System\Libs\cw.exe and will create a bootstrap file to C:\System\Recogs\cw3rec.mdl. If a memory card is present then the same files are created also to the memory card.


Replacing operator logo
Commwarrior.Q creates a bitmap file with the name used by the current operator into C:\system\Apps\Phone\oplogo\
This bitmap file is then shown instead of the operator logo when the phone is on the network.

user posted image

Generating SIS installation packages to send to other devices
Commwarrior.Q replicates in SIS installation packages over Bluetooth and MMS in same manner as previous variants.
SIS files created by Commwarrior.Q have a random name, for example, anyrah5y.sis or xyr88b0muh7.sis.
A Commwarrior.Q SIS file contains the worm main that has random name and is either in C:\ or randomly named directory.
SIS files created by Commwarrior.Q have a random size between 32100 and 32200 bytes.

Unlike previous variants of Commwarrior, Commwarrior.Q does not use a static product name that is shown during installation.
Previous variants always showed the same name, thus making them easy to identify. The Commwarrior.Q contains an internal list of
strings that is used to generate random, but plausible looking filenames.

The filenames are composed of three component string arrays that are stored in the main binary in obfuscated form.
The string arrays are:

smart,nokia,symbian,nice,fatal,cool,c00l,virtual,f inal,safe,
abstract,static,zend,jedi,trend,micro,mega,hard,ni ce,good,lost

www,web,wap,e-mail,mail,game,graphics,java,hood,------,max,
audio,memory,RAM,ROM,HDD,WinAmp,jedi,hardware,disp lay,keyboard,key

antivirus,anti-virus,guard,--------er,hacker,cracker,checker,driver,m anager,uninstaller,
remover,engine,tool,machine,box,stuff,videoplayer, player,trust,ringtone,
explorer,timer,game,AppMan,recorder,dictaphone,tea m,images,calculator,objects,documents,clips,docs


Replication over Bluetooth
Comwarrior.Q replicates over Bluetooth in SIS files that have a random name, for example, anyrah5y.sis or xyr88b0muh7.sis.
The SIS file contains the worm main that has a random name and is either in C:\ or randomly named directory.

The SIS file contains autostart settings that will automatically execute Commwarrior.Q after the SIS file is installed.

When Comwarrior worm is activated it will start looking for other bluetooth devices, and send a copy of itself to each of these phones
targeting several phones at one attempt.

If a target phone goes out of range or rejects file transfer, commwarrior will search for another phone.

The replication mechanism of Comwarrior is different than in Cabir. The Cabir worm locks into one phone as long as it is in range, and
depending on the variant will either look another variant after losing contact or stay locked.

The Comwarrior worm will constantly look for new targets, thus it is able to contact all phones in range.


Replication over MMS
Commwarrior.Q uses three strategies for spreading over MMS messages.

First, when Commwarrior.Q starts, it starts to go through the phone's address book and sends MMS messages to phone numbers that are marked as a mobile phone.

Commwarrior.Q listens on any arriving MMS or SMS messages and replies to those messages with an MMS message containing the Commwarrior.Q SIS file.

The worm also listens for any SMS messages being sent by the user and sends an MMS message to the same number, right after the SMS message.

The texts in MMS messages sent by Commwarrior.Q contain texts that are stored in the phone Messaging Inbox, thus the messages that Commwarrior.Q sends are texts that the receiving user might expect from the sender.


Displaying HTML Page
After Commwarrior.Q has infected the phone it will, after a random delay, create an HTML page that it will display itself to the user using the phone's default browser. The HTML page is created into directory C:\system\Libs\cwinfo.html

user posted image

Replication to MMC Card
Commwarrior.Q "listens" for any MMC cards to be inserted into the infected phone, and copies itself to the inserted card. The infected card contains both the Commwarrior executable and the bootstrap component, so that if the infected card is inserted into another phone it will also be infected.

Replication by infecting other SIS files
Commwarrior.Q searches the device C: drive and memory cards for SIS installation files, and will infect all SIS files that it finds. The infected SIS files will be wrapped by Commwarrior.Q so that if the user installs the infected SIS file, Commwarrior.Q will install first followed by the original application.

Infected SIS file will retain the orignal product name so that user will not notice that the SIS package is infected with Commwarrior.Q when installing it.

Removal Steps:

Kill Commwarrior Process

1. Install a third-party file manager. For example FExplorer
2. Start FExplorer
3. Select and copy any file to clipboard
* Navigate file system with navigation button. Press right to enter directory, left to leave directory.
* Select C: and press right, select system and press right
* Select any file from c:\system such as backup.xml
* Select Edit/Copy from menu
4. Copy the file to E:\system\temp
* Press left until you are at filesystem selection screen
* Select E: and press right
* Select System and press right, and then temp and press right
* Select Edit/Paste from menu
5. Rename the file to noboot
* Select File/Rename from menu
* Rename the copied file to noboot
6. Reboot the phone

Install F-Secure Mobile Anti-Virus to finish cleaning up your phone


Download the file and select open after download
Install F-Secure Mobile Anti-Virus
Go to Applications Menu and start Anti-Virus
Activate Anti-Virus and scan all files

SymbOS\Splashstall...user posted image


Description:

SymbOS\Splashstall is the latest mobile trojan that attack S60 devices from booting up. For those innocent user who proceed to the installation step by agreeing and passing the security check, his phone will straight away infected by this malware and the phone will start to reboot itself and it will permanently disable from booting up to the starup menu.

The most interesting part that catching my attention is, while the phone is being rebooted after infected by this malware,
a scary and funny sound will be played "hahaha" then. One's might get shocked if he install this application at night!

Affected Platforms:

Tested on:

- Nokia 6680
- Nokia 3660

Affected:

- Nokia 6680
- Nokia 3660

Analysis/Observation:

This trojan was distributed in an application file and it is spreading in Nokia Theme.SIS


Symtomps:

When user try to install this suspicious *.SIS file, the image shown below is screenshoot taken during installation process:

user posted image

Method of Infection :

This malware is trying to replace corrupted binaries to the startup system . As a result, the phone will be permanently disable from boot up and it will display a message "Phone Startup-failed, Contact your retailer!".

This malware also drop a sound file into the phone system, while the trojan executed, the sound file will be play then. I assume that this sound file is to make fool on those innocent users who get tricked by this trojan and his phone can't boot up to normal starup mode permanently.

user posted image

Prevention:

This suspicious Symbian application needs user intervention to be installed on target devices. Upon execution, it prompts the user to install the application the phone. It also prompts the user to select where the said application is to be installed. As always, users should never install third party application from unknown site.

How to uninstall:

There is no known method to fix this trojan except hard formatting the infected device. All data will be lost upon formatting.

For Symbian OS v6.1 such as NOKIA 3650/3660/N-GAGE/QD/Siemens SX-1. There is no known method to fix it except flashing the firmware.

The Fake Calvin Stinger...user posted image



Recently there is a fella from Indonesia who had created a large amount mobile malwares and its malicious act is just same as Cardtrap family, that is, malware spreading from Phone to PC.

It's notice that, Steven(The malware creator) stuff doesn't has big change, most of them is just a repack stuff that using "skull" technique to replace functional file into non-functional file. The main difference that taking Anti-Virus firm attention is, most of his new stuff contain a new batch file that assigned to executes its malicious act.

Steven is trying to fool those innocent user using "CALVIN STINGER Anti Virus 2.0" name in his batch file which is trying to delete important system file in C drive and causing the computer fail to reboot next time.

Well, Steven stuff is very lame and grandpa style which our "Grandpa Hacker" used those DOS command to attack the computer system at a very early time. Shame on him because he doesn't realize that his batch file is quite kiddie script which bring "Jokes and Humour" to our Anti-Virus firm.

Affected Platforms:

Tested on:

· Nokia 6680
· Nokia 3660

Affected:

· Nokia 6680
· Nokia 3660

Analysis/Observation:

This trojan was distributed in an application file and it is spreading in BattleField 2 - GAMELOFT.SIS.

Symtomps:

When user try to install this suspicious *.SIS file, the image shown below is screenshoot taken during installation process:

Payload:

Payload disables a large amount of third party application and also some ROM application which this malware trying to overwrite the ROM file and also replacing functional file into non-functional file.

Method of Infection in PC

Tested Platform: Windows XP SP2

User should be aware of those *.exe files which drop by this malware into the media card. The author is trying to installed those *.exe file which contains a malicious batch file that trying to delete important system file in C drive.

While user trying to executes the *.exe file, it will trigger the batch file running and a Command Window will pop out and claims itself as "CALVIN STINGER AntiVirus2.0"

If user press any key to continue, it will delete those important data file in the C drive which causing the computer fail to reboot next time.

After deleting those important data files, it will show a message

Prevention:

This malware requires that the user intentionally install them upon the device. As always, users should never install third party application from unknown site.

Well, CalvinStinger is only release once and does not has any updated version yet. User should be aware of downloading CalvinStinger in an unknown site because it might be a FAKE one or its contains any malicious act.

User should be reminded that ORIGINAL CalvinStinger for Symbian OS phone ONLY can be safely downloaded at SF and SX.

McAfee anti-virus has added detection on this "kiddie stuff" and it will be detected as Bat/Kads.dr. The same goes to other anti-virus vendor too, please update your anti-virus defination to ensure you're protected from this malware although it's a Grandpa old time malware.

How to uninstall:
Mcafee Virus Scan, TrendMicro Anti-Virus, Symantec Mobile Security, F-Secure Anti-Virus should able to detect it provided your anti-virus software must have the latest defination of this malware which will available in the next few days.

SymbOS/CardBlock.A (F-SECURE)....user posted image


Description:

SymbOS/CardBlock.A contains none of the previously found trojan but this trojan capable deleting the phone system data file and it will block the memory card from being accessed.

Affected Platforms:

Tested on:

· Nokia 6680
. Nokia 3660


Affected:

Nokia 6680 ONLY

Analysis/Observation:

This trojan was distributed in an application file and it is spreading in instantsis.v2.1.cracked.by.binzpda.SIS.


Symtomps:

When user try to install this suspicious file, the image below shown is the screenshoot taken during installation process:

user posted image

SymbOS/CardBlock.A claims to be a Series 60 third party application. Upon installation an agreement will be shown and ask user if he or she agree with those terms listed and proceed to the next step to finalize the installation process.

After installation completed, the application icon will be shown in the phone as shown below:

user posted image

Method of Infection

This trojan will executes itself only while user try to access them.

While user try to access the suspicious application, it will looks like the image below:



While user try to access the options panel and proceed to "Send>Via Bluetooth", the trojan will start to executes itself and the phone will started to hang and lagging and the memory card will locked by it with random password code.

It will generates different password to locked up the media card. Further info will be confirmed by Anti-Virus firm. I personally have scarified my 64MB DV-RS-MMC for testing this trojan and it prove to me that it is capable locking the memory card. Luckily mine is ZITRON set, no worries for me. tongue.gif tongue.gif tongue.gif

While one of the component file being disassembled, the following strings was observed that will delete the phone system data:

C:\system\install
C:\system\data
C:\system\libs
C:\system\mail
C:\system\bootdata

After those file was damaged and it will prevents the phone from starting up after the phone is rebooted and shows the following error messages:

'Phone startup failed, contact the retailer. '


Prevention:

SymbOS/CardLock.A requires that the user intentionally install them upon the device. As always, users should never install third party application from unknown site. According to the security expert that I met him, this trojan is really spreading widely in WAREZ site, please take alert about it!

How to uninstall:

If the phone has been rebooted, hard reset method must be apply to the phone and password protected memory card can be formatted in NOKIA 9210 only, else, user may advise to take back to the retailer to be sent back to the factory.


Virus analysis report write up by CALVIN TANG © on 1st October 2005.

Special thanks to security expert, Jimmy Shah for his kind advise on this trojan.

Symbian –Skudoo.E-F....user posted image


Description:

Symbian/Skudoo.E-F are Skulls variants with parts of Doomboot and BlankFont.Variant E also drops Commwarior.B. They appear to be repackagedcollections of recent malware.

Affected Platforms:

Tested on:

· Nokia 6600
· Nokia 7610

Affected:

· Nokia 6600
· Nokia 7610

Payload:

The Skulls files will disable native system applications and some third-party applications. The dropping of Doomboot and BlankFont will cause the device to beunable to reboot, therefore, once the device has been restarted the impact of theSkulls files is no longer an issue. The CommWarrior that is dropped by Symbian/Skudoo.E will spread.

user posted image

Figure 1 Virus.jpg dropped by Skudoo.F

Analysis/Observation:

Symbian/Skudoo.E is distributed in a sis file named “pop corn.sis”. Variant F is distributed in a sis file named “Rally 3.sis”.

Prevention:

Symbian/Skudoo.E requires that the user intentionally install them upon the device.As always, users should never install unknown or un-trusted software. This is especially true for illegal software, such as cracked applications—they are a favorite vector for malware infection.

How to uninstall:

If the device has been rebooted then a hard-reset must be performed for recovery.

Virus analysis report write up by Mobile Phone Anti-Virus Team on 26th August 2005 ©

Blankfont.A...user posted image

Blankfont.A is a SIS file trojan that installs corrupted Font file into infected device. The corrupted font does not cause device to crash, but if the device is rebooted it will lose the system font, and is unable to display user interface texts.

user posted image

user posted image

If a phone is infected with Blankfont.A, it must not be rebooted as the trojan will corrupt system font and make disinfection quite difficult. If the phone is rebooted it can still be disinfected but, doing so is rather difficult as there is no text on the screen.

Spreading in Rally_2.sis

SplinterCell-ChaosTheory_S60_cracked-XiMPDA.SIS OR SymbOS/Skudoo.A....user posted image


This is a Series 60 trojan that installs skulls trojan, MGdropper, Commwarrior, Doomboot.A and cabir into the targeted device. When this trojan executed, most of application in the phone being replaced by a non-functional or corrupted files by the trojan into the phone, causing application can't run as usual. It fails to attack NOKIA 6680 while the phone has been restarted. Anyway, McAfee AVERT mentioned that this trojan will cause the phone fail to reboot on the next restart by the user.

It is also the first mobie trojan in the world which capable propagates MGDropper virus and Commwarrior virus vice-versa.

PHONE BOOK STEALER

Description:

This type of mobile virus is very interesting that it'll steal user phonebook data and then it will compile it into a text file and sent it through
bluetooth without user confirmation.

So far, this is the first Symbian Virus that I've seen that it will steal user data without
user confirmation and sent thorogh other bluetooth supported devices.


Affected Platforms:

Tested on:

· Nokia 6680
· Nokia 3660

Affected:

· Nokia 6680


Analysis/Observation:

This trojan was distributed in an application file and it is spreading in pbexplorer.SIS.

Symtomps:

When user try to install this suspicious *.SIS file, the image shown below is screenshoot taken during installation process:

user posted image

[LEFT] After installation complete, the application has set to run automatically and will display the following text:

________________
| Phone Book |
| Compacting |
| by: lajel 202u |
| |
| please wait... |
|________________|

________________________
| Compacting |
| your contact(s),step 2 |
| |
| Please wait again |
| until done... |
|________________________|

After the malicious process done, it will pop out a message:

"Done!!!"

If user press [OK] the malicious program will ended itself and after some times,
it will start searching for bluetooth devices and sent all phonebook information in
text file via bluetooth.


Prevention:

This malware requires that the user intentionally install them upon the device. As always, users should never install third party application from unknown site.

How to uninstall:

By using latest version of CalvinStinger© Symbian Viruses Disinfection Tool.

Special Announcement:

Recently there is some fella from Indonesia are spreading Symbian Malwares Widely in Yahoo Group and
it's recommended not to download any file from there.[/LEFT]

Da Vinci virus hits mobile phones!!...user posted image



IPB Image

It’s been confirmed — The Da Vinci Code is bad for you. The virus, that is. A computer bug bearing the controversial film’s name has affected dozens of mobile phones and laptops in the city.

The virus, which spreads via wireless Bluetooth technology, causes a message to pop up on Bluetooth devices: ‘Receive message via Bluetooth from Da Vinci Code?’ Once a curious mobile phone user accepts the message, the virus enters the system and destroys the phone’s data.

A picture depicting an eye and a cross appears on the desktop and phone’s gallery.

System crash

Mridul Sharma (32), an operations manager at an event management firm, received the virus during a corporate presentation a few days ago. “The Da Vinci Code name actually excited me. I assumed the file was either an MMS clipping or a still and accepted it.

My entire system collapsed and data was deleted. I had just bought my Nokia N91 handset worth Rs 31,000 and had to pay Rs 1,500 to format my mobile hard disk and reload the software,” said Sharma.

Common virus

“I received the virus on my laptop and phone. Apparently my Bluetooth device was active. The technician who repaired my phone told me this was a common virus, which had simply been renamed The Da Vinci Code to attract the users,” said 35-year-old Sanjay Menon.

Abhishek Datta, a software expert, said, “Once a phone is affected, formatting is the only option. You cannot retrieve your data.”

Conclusion

In conclusion, it might be a modified Caribe or Commwarrior that repack with corrupted binaries to disable the phone from startup.

Seems that "Da Vinci Code" really a good naming for mobile viruses for now as this movie quite prestigious in "Cinema Heat"!

Will we have "Mutant-X", "Mission Impossible 3" etc as mobile phone viruses in the future? Let see how creative are those nasty creator then!

Recommendations :

1. An anti-virus with REAL TIME PROTECTION will provide you with tight security.

2. Turn your bluetooth detection mode in "Hidden" or "Invisible" mode or just switch it off if it's not necessary.

3. Never try to install an unknown file and proceed to the installation step.

4. Backup your data from time to time just in case...

5. Please beware of any MMS that come with *.SIS file attachment. Delete it if it's quite suspicious.


That's so simple to keep your phone infected by this similar mobile phone virus

Motorola Secret Codes

Posted In: . By AyurWorld Admin

IMEI number:

*#06#

Code to lock keys. Press together *7

Note: [] (pause) means the * key held in until box appears.


Select phone line - (use this to write things below the provider name):

[] [] [] 0 0 8 [] 1 []


Add phonebook to main menu:

[] [] [] 1 0 5 [] 1 []


Add messages to main menu:

[] [] [] 1 0 7 [] 1 []


Copy SIM memory (phonebook menu):

[] [] [] 1 0 8 [] 1 []


Eng Field options (main menu):

[] [] [] 1 1 3 [] 1 []


Slow (Frequency of search menu):

[] [] [] 1 0 1 [] 1 []


Medium (Frequency of search menu):

[] [] [] 1 0 2 [] 1 []


Fast (Frequency of search menu):

[] [] [] 1 0 3 [] 1 []


Enable EFR:

[] [] [] 1 1 9 [] 1 []


Function :

[] [] [] # # # [] 1 []



Change pin:

[] [] [] 0 0 4 [] 1 []


Unblocking using the "puk" number:

[] [] [] 0 0 5 [] 1 []


There are lots of similar codes exist. If you change the last number to 0 you can deactive that code. The 3 digit number at the middle are from 0 to 999. I put the most interesting codes. (EFR):Enhanced Full Rate Codec.

You can change GSM frequencies to 900/1800 by entering the enginnering model. Following the below steps:

enter menu and press 048263* quickly, then you will enter the secret engineering menu
under "Opcode"

input 10*0*3 for GSM 900


10*0*4 for GSM 1800


10*0*5 for GSM 1900


10*0*6 for dual band GSM 900/1800


10*0*7 for dual band GSM 850/1900


To add extra message space 4 your Motorola C350 C450 C550 or C650, press menu button, press 048263* quickly, then on the popup menu enter 47 press ok.press 50 and ok.press 1 ok.press 64 ok.press 1 ok.press 186 and ok.You will receive an extra 50 msgs memory space.Switch phone off and back on.(not tested)

Important!

Try these codes at your own risk! We don't accept any complaints.

What happens to computer criminals in jail ?

Posted In: . By AyurWorld Admin

Hackers you know about. They violate computer systems, sometimes
in fun and sometimes intending harm.
And then there are people who go to jail for using nasty computer tricks
to steal money from companies or mess with information systems.
But what then? What happens to these guys - and they are all men - who
serve prison time for computer crimes?
Interviews with a handful of convicts show they appear to have a list of
regrets, ranging from remorse about doing their crimes to hating the fact
that they got caught.
Some still get a kick out of their crimes, and others want to do penance
and, as one inmate puts it, "get back on track" to a lawful existence.
Federal Inmate No. 40872-054


Vladimir Levin doesn't want to talk about his 1995 conviction. Levin, now
31, pleaded guilty to hacking into Citibank computers and using other
people's passwords to transfer nearly $4 million to accounts in various
countries.
England extradited him to the U.S. in 1995 after he was arrested at
Heathrow Airport in London.
After serving a three-year term in a federal prison, he has lived since
April in a federal detention center in Oakdale, La.
In the minimum-security facility, Levin complains, the library is thin and
the bureaucracy is thick. "I basically don't see the light at end of
tunnel," says Levin, whose heavily accented English betrays his roots in
St. Petersburg, Russia.

Federal Inmate No. 61153-080

Christopher Lamprecht is three years into a five-year term at the
low-security Federal Correctional Institution in Bastrop, Texas. He starts
his day about 7 a.m.
After eating breakfast with 1,100 other inmates, the 26-year-old walks
across the compound to a job sweeping, washing windows and doing other
cleaning chores. Lamprecht makes $9 per month, a bit of a pay cut from the
$2,000 (give or take) he got for each telecommunications board he stole
and sold.

He works until 3:30 p.m., then goes to headcount. Dinner is 4:30 to 5
p.m., after which Lamprecht usually goes to the prison library to read or
to use the typewriters. At 9 p.m., inmates must retreat to their housing
units, each of which has six TV rooms.

"At 11:30, you're locked in all night until 6:30 a.m. That's your basic
day," Lamprecht explains during a noisy telephone interview from jail.
Lamprecht wasn't convicted of a computer crime; he pleaded guilty to theft
and money laundering related to the telecommunications gear scheme. But he
contends he got a tougher sentence because details of his hacker past were
included in a presentence report that heavily influenced the judge. In May
1995, a federal judge in Austin ordered Lamprecht to serve five years.
Lamprecht, who is known online as "Minor Threat," doesn't deny that he
used to secretly invade corporate and government computers. But he says it
has nothing to do with stealing boards. "In federal court," he says, "you
plead guilty for one thing, but they sentence you for everything else."
Lamprecht is scheduled to go free next year, but the judge who sentenced
him banned him from the Internet and stipulated that he can't hold a job
that requires him to use a computer.
Ever.

"What kind of job can I get without a computer?" wonders the onetime
computer science major at the University of Texas in Austin. He didn't
graduate, but hopes to resume his studies when he's released. Lamprecht is
appealing the Internet ban, arguing that it violates his First Amendment
rights. A judgment is expected in a few months.
Lamprecht took incarceration hard. Bitter when he was first locked up, he
has gotten worse.
"He told me, 'I'm not gonna come out. I can't do it,' " says his mother,
Michele Wood. "When you're 22, five years is one-quarter of your life."
Soon after, he tried to kill himself by swallowing 99 sleeping pills,
recalls Wood, who is a computer trainer at a large insurance company in
Dallas.

"I was hysterical," she says, recalling a call from her son after he had
taken the pills. "My co-worker kept him on the line. I got on the other
line and called the prison and said, 'Go get him.' "
After having his stomach pumped, Lamprecht's attitude changed, Wood says.
He took responsibility for breaking the law and started making plans for
his release.
On visiting days, Wood brings him print-outs of E-mail he receives at his
Web site (www.paranoia.com/~mthreat/), which is maintained by a friend on
the outside. A plea on the site recently snared Lamprecht a new lawyer -
one who believes in his First Amendment position and will take his case
pro bono.
"What will he be like when he comes out?" Wood wonders of her son. "How's
he going to fit in? He's never seen Windows 95."
Hired hands

Most hackers you hear about are teen-agers or in their 20s, says John
Klein, president of Rent-A-Hacker, a security troubleshooting firm in
Newport News, Va.
Klein hears from at least one job-seeking computer cowboy every day. But
he rejects most as immature or in it for the glory. His 9-year-old company
has 73 hackers - he hires them as independent contractors - waiting for
jobs. And he doesn't take convicts.
"A lot of people - including lots of young hackers - think that hackers
who have gotten arrested or who dealt with the Secret Service are good.
I've found that to be untrue," he says. "It's the ones you never hear
about. Those are the hackers you need to be afraid of."

Federal Inmate No. 13112-064

Brian Martin admits that it was, in part, a search for fame that drew him
to Oklahoma City after the 1995 bombing of the federal building there.
Martin, whose online aliases included "Forcible Entry" and "Iceman,"
snooped around the U.S. Department of Defense Web site for logos and other
official-looking material to create fake identification cards and purchase
orders for himself and a buddy. Dressed in camouflage fatigues, they
flashed the bogus IDs and used a laptop to fax purchase orders to
requisition $20,000 worth of two-way radios, computers, hotel rooms and
meals.

Martin also finagled the use of a helicopter and pilot to fly over the
Alfred P. Murrah building - airspace supposedly tightly restricted by the
FBI, U.S. Department of State, U.S. Army and other government groups
investigating the bombing. Martin later sold the video he shot from the
sky to a French TV program.
Convicted of wire fraud, interstate transport of stolen goods and
impersonating a federal officer, among other offenses, Martin claims he
wasn't looking to take advantage of the high emotion after the bombing
tragedy. Tony Lacy, his court-appointed lawyer, concurs. "He doesn't see
it that way," says Lacy, who is at the Office of the Federal Public
Defender in Oklahoma City. "He saw it as 'wouldn't this be cool.'"
Martin, now 25, says of his motivation: "I wondered, if these guys are
supposed to be the best at security and I can get past them, then what am
I?"
A rapid-fire conversationalist, Martin is eager to share details of his
"sprees of doing crazy stuff," as he calls his criminal exploits. At 18,
he pleaded guilty to credit-card fraud. At 19, he pleaded guilty to
impersonating a police officer. And then there was the time in Colorado,
where he got into computers at Drury Inns Inc. to book himself a free room
and at a limousine company and a flower shop to order treats for his
girlfriend and himself.
Like Lamprecht, Martin is in the Bastrop facility, 30 miles east of
Austin. Having spent time in Texas state prison, Martin says he prefers
the federal facility where he is now. "State scared me s--less. I was in a
unit where they had 26 killings in one month," he says. "I'm 135 pounds.
You don't want to be me when you go to prison."
The Oklahoma City incident came back to bite Martin and his partner hard,
Lacy says. "Army Criminal Investigations Division, intelligence, national
security - when they did find out that it was a couple of guys playing a
prank because it would be cool, they were pissed," he says, marveling at
Martin's penchant, even now in jail, for talking up his past.
"If anything, prison will make him smarter," Lacy speculates.
Martin's release is scheduled for December of next year. "I'm planning on
going to work for some of these places that do firewalls," he says. "Like
my dad does."

There are a few things that can be done in times of grave emergencies.
Your mobile phone can actually be a life saver or an emergency tool for survival. Check out the things tha t you can do with it: -

*EMERGENCY*
*I*

*The Emergency Number worldwide for **Mobile** is 112.* If you fin d yourself out of coverage area of your mobile network and there is an emergency, dial 112 and the mobile will search any existing network to establish the emergency number for you, and interestingly this number 112 can be dialed even if the keypad is l ocked. **Try it out.**

*II*
*Subject: Have you locked your keys in the car? Does you car have remote keys?*
This may come in handy someday. Good reason to own a cell phone:
If you lock your keys in the car and the spare keys are at home, call
Someone at home on their cell phone from your cell phone.

Hold your cell phone about a foot from your car door and have the person at your home press the unlock bu tton, holding it near the mobile phone on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote" for your car, you can unlock the doors (or the trunk).
Editor's Note: *It works fine! We tried it out and it unlocked our car
over a cell phone!"*

*III*
Subject: Hidden Battery power
Imagine your cell battery is very low, you are expecting an important call and you don't have a charger. Nokia instrument comes with a reserve battery. To activate, press the keys *3370# Your cell will restart with this reserve and the instrument will s how a 50% increase in battery. This reserve will get charged when you charge your cell next time.
AND

*IV*

How to disable a STOLEN mobile phone?

To check your Mobile phone's serial number, key in the following digits on your phone:

* # 0 6 #

A 15 digit code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. when your phone get stol en, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless.

You probably won't get your phone back, but at least you know that whoever stole it can't use/sell it either.

How 2 SpeedUp Ur Symbian Mobile

Posted In: . By AyurWorld Admin

This trick I found from the web, really speeds-up any* symbian mobile phone.
First I thought this is a joke, but don't know how, it worked !!!
It must be a secret code for Nokia.

First change ur phone date to 03/04/2005

Go to Menu -> Office -> To-do List.

Make a new to do note with following data :
Subject : Speed
Due date : 04/08/2005
Priority : High

Press Done, but don't Exit.

Now make another note with :
Subject : Qoukie
Due date : 04/08/2005
Priority : Low

Press Done & Exit to Stand-By screen.
Now go back again to To-do List.

Then press "options" & "mark as done"
( Do this to the notes in the order above )

Exit & update the phone date.


* I have tested this on N70, N72 & 6681 phones

Wouldn’t you love cheap solar energy wherever you are and incredibly flexible ? Well, this could be made possible with the Nanosolar Powersheet. The greatest fact at this technology is that you can put thesheets on your roof, windows and anywhere you want and generate cheap solar energy for all your needs.

Until now, the silicon and glass panels were generating energy at $3 per watt, which is very high, but the Nanosolar Powersheets could generate the energy at a rate of 10 times less, at 30 cents a watt, but that’s not sure. If they only manage to get the energy with $1 per watt, they can compete with coal and the solar energy could finally become profitable to use.




The Nanosolar Powersheets are revolutionary, due to their low cost energy generation and high functionality, so we shall soon find them in stores. It’s expected especially companies to use them, due to tax breaks and rebates, along with running cost reuduction.

What makes it also cheap are the materials used in it’s productions, being made of an Aluminum foil for stability, Molybdenum electrode, an ink made of indium, copper, selenium and gallium, a semiconductor that doesn’t absorb light and a clear Zinc oxide semiconductor.

A solar panel manufacting factory has been built in San Jose, being the biggest in the world and it may produce solar cells to generate more power than all the US, meaning 430 megawatts.

_from popsci.com

Latest Gadgets

Posted In: . By AyurWorld Admin

U CAN HAVE GREAT INFORMATION ABOUT MOST OF GADGETS LIKE MOBILES & ITS ACCESSORIES,GAMES ,LAPTOPS THEIR REVIEWS,RINGTONES ...........MANY MORE....

DO VISIT LINK BELOW AND HAVE GREAT FUN.......


http://www.interweb.in/

Mobile games

Posted In: . By AyurWorld Admin

If you are looking for mobile games, application, screensaver, wallpaper then visit this website: http://www.mobileddl.com

doughnumatic.jpg

Every good cop’s wife ought to have one of these in the kitchen. Ladies and gentlemen, I’m talking about the Dough-Nu-Matic. It’s name alone is pretty self-explanatory, as all you need to do is add some dough and wait a while before a delicious miniature donut pops out. In less than half a dozen minutes, you will be able to get up to 12 donuts - great whenever you’ve got hungry kids running around in the house. The Dough-Nu-Matic retails for $130 and is not a gift for someone who’s trying to win the battle of the bulge.

Mini Pub Kegerator

Posted In: . By AyurWorld Admin

What better way to wind down after a hard week’s worth of work than with a cold beer? As I sit here with my measly 12 oz bottle of beer, I think “what could be better than this?”
mbd5l.jpg

It’s usually at that time I have to get up and go downstairs for another 12oz beer.

But I found a product today that makes that Friday happy hour that much more perfect: the Avanti MBD5L Mini Pub Mini Beer Keg Dispenser. This compact mini kegerator is designed to hold any standard 5 liter mini keg and comes with both an AC and DC power adapters so it can be used anywhere. It features a digital display to easily adjust the ideal temperature of your brew while the thermoelectric cooling system runs whisper quiet.

Standard Features include:

  • Color: Stainless Steel
  • Ideal for Use in the Home, Boat or RV
  • Uses All Standard 5-Liter Mini Beer Kegs (Not Included)
  • Digital Display for Temperature Settings (°C/°F)
  • CO2 Pressure Regulator
  • Three 16-Gram CO2 Cartridges Included (Enough to Dispense 3 or More 5-L Kegs)
  • Tapping and Cleaning Kits Included
  • Lightweight for Easy Portability
  • Thermoelectric Technology
  • Soft Interior Lighting with On/Off Switch
  • Can Accommodate a Larger (340-Gram) CO2 Cylinder (Enough to Dispense Up to 20 Kegs)
  • UL Listed AC and DC Power Adapters Included
  • Instructional DVD

I’m curious if it would work with one’s home-brewed beer as well. You could have your own pub at home! It would also save me from having to keep going downstairs for more beer. Perfect!

Pick one up at Beverage Factory for around $230 (with free shipping!).

Skinny PMP

Every once in a while, you have to ask yourself: What is the smallest Portable Media Player? What is the thinnest? Then you have to wonder: why do I care? After all, it is about size or shape, or having the most memory, thereby storing the most video and audio footage.

It appears that a company known as Reachgood Digital Manufacture Limited, one that I never heard of and can’t imagine how they arrived at that name, has created the thinnest PMP at 5.5 millimeters.

Sure it’s thin, but what can it do? Well, it has a 1.8 inch 260k color TFT screen, an FM tuner, gaming support, voice recorder, and USB 2.0 connection.

The most common blunder when the topic of a computer virus arises is that people will often refer to a Worm or Trojan Horse as a Virus. While the words Trojan, worm, and virus are used interchangeably, they are not the same. Viruses, worms, and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences between the three, and knowing those differences can help you to better protect your computer from their often damaging effects.

A computer Virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

A Worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. The Trojan horse itself would typically be a Windows executable program file, and thus must have an executable filename extension such as .exe, .com, .scr, .bat, or .pif. Since Windows is sometimes configured by default to hide filename extensions from a user, the Trojan horse is an extension that might be "masked" by giving it a name such as 'Readme.txt.exe'. With file extensions hidden, the user would only see 'Readme.txt' and could mistake it for a harmless text file. When the recipient double-clicks on the attachment, the Trojan horse might superficially do what the user expects it to do (open a text file, for example), so as to keep the victim unaware of its real, concealed, objectives. Meanwhile, it might discreetly modify or delete files, change the configuration of the computer, or even use the computer as a base from which to attack local or other networks - possibly joining many other similarly infected computers as part of a distributed denial-of-service attack. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Added into the mix, what is called a blended threat? A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses :
The first steps to protect your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan Horses. Additionally you want to make sure your anti-virus program has the ability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. If this isn't enough protection, then you may want to consider installing a firewall as well.

A firewall is a system which prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is unable to get rid of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

The most common blunder when the topic of a computer virus arises is that people will often refer to a Worm or Trojan Horse as a Virus. While the words Trojan, worm, and virus are used interchangeably, they are not the same. Viruses, worms, and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences between the three, and knowing those differences can help you to better protect your computer from their often damaging effects.

A computer Virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

A Worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. The Trojan horse itself would typically be a Windows executable program file, and thus must have an executable filename extension such as .exe, .com, .scr, .bat, or .pif. Since Windows is sometimes configured by default to hide filename extensions from a user, the Trojan horse is an extension that might be "masked" by giving it a name such as 'Readme.txt.exe'. With file extensions hidden, the user would only see 'Readme.txt' and could mistake it for a harmless text file. When the recipient double-clicks on the attachment, the Trojan horse might superficially do what the user expects it to do (open a text file, for example), so as to keep the victim unaware of its real, concealed, objectives. Meanwhile, it might discreetly modify or delete files, change the configuration of the computer, or even use the computer as a base from which to attack local or other networks - possibly joining many other similarly infected computers as part of a distributed denial-of-service attack. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Added into the mix, what is called a blended threat? A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses :
The first steps to protect your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan Horses. Additionally you want to make sure your anti-virus program has the ability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. If this isn't enough protection, then you may want to consider installing a firewall as well.

A firewall is a system which prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is unable to get rid of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

Expect The Unexpeted

By AyurWorld Admin

Wait till we bring you the full content in this site....

Electronic...Mobiles...Games..Computers..and more gadgets

Coming soon