Weak security for E-commerce servers
- Publisher
- Elsevier Science
- Year
- 2000
- Tongue
- English
- Weight
- 163 KB
- Volume
- 2000
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
networks in order to transmit the malicious SMS messages: www.free-sms.com, smslink.btn. de, www.nm-info.de, www.pcteam. de, www. mobidig.net, www.lycos.de. Kaspersky Lab specialists classify this program as a malicious code, but confirm that the program itself is not dangerous because it does not perform any destructive action and is not capable of replication. To date, the program has only been discovered in Germany, seemingly because the gateways listed above only allow SMS messages on the German mobile phone network. However, certain features of the program suggest that this is just the beginning of the creation of Trojan horses capable of attacking mobile phones.
For further information and details of the neutralization of SMS-Flooder, visit the Kasperksy website: http:// www.avp.ru.
Trojan gives hackers control
A new Trojan, TROJ_QAZ, allows hackers to access and control an infected system. Once the infected file is executed, TROJ_QAZ modifies the Windows registry so that it becomes active every time Windows is started. It also renames the original 'notepad.exe' file to 'note.com' and then copies itself as 'notepad.exe' to the Windows folder. Because of this the Trojan is launched every time a user runs Notepad. It also attempts to spread itself to other shared drives on local networks, however, it is does not mass E-mail itself to everyone in the user's address book and it is suspected that it was downloaded from a website, newsgroup, IRC or chat room. The following is recommended to remove the virus: 1. Click START|RUN. Type REGEDIT and hit ENTER key. 2. In the left panel, click the '+' to the left of the following: HKEY_LOCAL_ MACHINE Software Microsoft Windows CurrentVersion Run 3. In the right panel, search for any of the registry key that contains the data value of startIE=XXXX\ Noteoad.exe. 4. In the right window, highlight the registry key that
๐ SIMILAR VOLUMES
of basketball tournament pairings. The hackers posted racial slurs, swastikas and a white-power logo. It took information technology staff at the NCAA three attempts to successfully remove the material and counterthe break-in.