Internet Security and Ethical Hacking

Internet Security and Ethical Hacking

Welcome to the unique confluence of hackers , crackers and security professionals
on the world wide web.
This is your complete resource for internet security and ethical hacking.

Ethical Hacker -: The Ethical Hacker :-
Most people think that hackers are computer criminals. They fail to recognise the fact that criminals and hackers are two totally different things. Media is responsible for this. Hackers in reality are actually good and extremely intelligent people who by using their knowledge in a constructive manner help organisations, companies, goverment, etc. to secure documents and secret information on the internet.


WELCOME TO ALL VISITORS

PLEASE BOOKMARK THIS BLOG FOR DAILY UPDATES. FOR HACKING TIPS GO TO COMPUTER SECTION. FOR MORE INFORMATION CONTACT US .
Your Ad Here

SEARCH FROM HERE

Monday, November 9, 2009

TYPE OF VIRUSES

Timifonica. This virus was known in 2000. It was a virus that sent text messages from infected PCs to phones.

Trojan. It is considered the first virus sent from cell phone to cell phone. It was known in August 2004. The Trojan was created as an anti-piracy program the game Mosquito against illegal distribution. The virus sends itself through SMS text messages.

Cabir. This virus was known in July 2004. It was a creation of group 29a. This virus is spread through Bluetooth to accessible phones. It is spread as an SIS file (Symbian OS distribution file). Cabir attacks phones with Symbian OS. When the phone is infected it displays the message ‘Caribe’.

Commwarrior. This virus appeared in March 2005. It infects phones with Symbian OS. The Commwarrior worm spreads itself through Multimedia Messaging System (MMS) following the address book list.
Comwar. This virus worm is spread through MMS messages and Bluetooth. It also attacks phones of Symbian Series 60 OS.
Duts. This virus is the first to infect cell phones and Pocket PCs. The Duts attacks the .exe files and files that are bigger than 4096 bytes.

Skulls. If a cell phone is infected with this virus, then the desktop icons are replaced with images of skulls. The Skull makes all phone applications useless.

Lasco.A. This virus spreads through Bluetooth and also can be attached to files. The Lasco.A is a result of mistakes in cell phone program. It is also present in PCs.

No comments:

Post a Comment

ASK YOUR QUESTIONS


Your Name
Your Email Address
Subject
Message
SEND YOUR IDEAS
Image Verification
captcha
Please enter the text from the image:
[ Refresh Image ] [ What's This? ]

 
Home | About Owner | Tutorials | Freebies | About Us | Contact Us

Copyright © 2009 CYBERWORLD |Designed by 13551421 143 Templetemo |Converted to blogger by Dark Master