[Show all top banners]

ne0
Replies to this thread:

More by ne0
What people are reading
Subscribers
:: Subscribe
Back to: Kurakani General Refresh page to view new replies
 Protect your computer! Protect your online experience!
[VIEWED 1498 TIMES]
SAVE! for ease of future access.
Posted on 08-27-13 9:49 AM     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

With a new surge of malicious conditions hampering your smooth online experience, we have re-activated the Sajha Techies interest group to keep the public aware of computer related information for those interested.

http://sajha.com/sajha/html/index.cfm?interestid=b7ab59c0-bb1c-445b-a2ea-129ea2685255

Do you find your browser automatically being redirected to unwanted websites when you click on a link? Do you find your computer taking extra time to do simple things?  If you have not already downloaded and installed Malwarebytes, I would suggest you to download it ASAP, and run a full system scan. Make sure you enable active scan so it scans all malicious activities on realtime.

Today, we heavily rely on a computer browser to do our banking and shopping, so it becomes even more important for you to be on top of these things because, otherwise without your knowledge, others can siphon your money from your bank or purchase things from your credit card.

For few other free softwares to protect your computer, visit this page: http://sajha.com/sajha/html/index.cfm?interestid=b7ab59c0-bb1c-445b-a2ea-129ea2685255&subinterestid=19#1611


In order to be more aware of your browser please review the following article:

How You Can Be Infected via Your Browser and How to Protect Yourself

In a perfect world, there would be no way for your computer to be infected via your browser. Browsers are supposed to run web pages in an untrusted sandbox, isolating them from the rest of your computer. Unfortunately, this doesn’t always happen.

Websites can use security holes in browsers or browser plugins to escape these sandboxes. Malicious websites will also try using social-engineering tactics to trick you.

Insecure Browser Plugins

Most people that are compromised through browsers are compromised through their browsers’ plugins. Oracle’s Java is the worst, most dangerous culprit. Apple and Facebook recently had internal computers compromised because they accessed websites containing malicious Java applets. Their Java plugins could have been completely up-to-date – it wouldn’t matter, because the latest versions of Java still contain unpatched security vulnerabilities.

To protect yourself, you should uninstall Java entirely. If you can’t because you need Java for a desktop application like Minecraft, you should at least disable the Java browser plugin to protect yourself.

Other browser plugins, particularly Adobe’s Flash player and PDF reader plugins, also regularly have to patch security vulnerabilities. Adobe has become better than Oracle at responding to these issues and patching their plugins, but it’s still common to hear about a new Flash vulnerability being exploited.

Plugins are juicy targets. Vulnerabilities in plugins can be exploited across all different browsers with the plugin across all different operating systems. A Flash plugin vulnerability could be used to exploit Chrome, Firefox, or Internet Explorer running on Windows, Linux, or Mac.

To protect yourself from plugin vulnerabilities, follow these steps:

  • Use a website like Firefox’s plugin check to see if you have any out-of-date plugins. (This website was created by Mozilla, but it also works with Chrome and other browsers.)
  • Update any out-of-date plugins immediately. Keep them updated by ensuring automatic updates are enabled for each plugin you have installed.
  • Uninstall plugins you don’t use. If you don’t use the Java plugin, you shouldn’t have it installed. This helps reduce your “attack surface” – the amount of software your computer has available to be exploited.
  • Consider using the click-to-play plugins feature in Chrome or Firefox, which prevents plugins from running except when you specifically request them.
  • Ensure you’re using an antivirus on your computer. This is the last line of defense against a “zero-day” vulnerability (a new, unpatched vulnerability) in a plugin that allows an attacker to install malicious software on your machine.

Browser Security Holes

Security vulnerabilities in web browsers themselves can also allow malicious websites to compromise your computer. Web browsers have largely cleaned up their act and security vulnerabilities in plugins are currently the main source of compromises.

However, you should keep your browser up-to-date anyway. If you’re using an old, unpatched version of Internet Explorer 6 and you visit a less-reputable website, the website could exploit security vulnerabilities in your browser to install malicious software without your permission.

Protecting yourself from browser security vulnerabilities is simple:

  • Keep your web browser updated. All major browsers now check for updates automatically. Leave the auto-update feature enabled to stay protected. (Internet Explorer updates itself through Windows Update. If you use Internet Explorer, staying up-to-date on updates for Windows is extra important.)
  • Ensure you’re running an antivirus on your computer. As with plugins, this is the last line of defense against a zero-day vulnerability in a browser that allows malware to get onto your computer.

Social-Engineering Tricks

Malicious web pages try to trick you into downloading and running malware. They often do this using “social engineering” – in other words, they try to compromise your system by convincing you to let them in under false pretenses, not by compromising your browser or plugins themselves.

This type of compromise isn’t just limited to your web browser – malicious email messages may also try to trick you into opening unsafe attachments or downloading unsafe files. However, many people are infected with everything from adware and obnoxious browser toolbars to viruses and Trojans via social-engineering tricks that take place in their browsers.

  • ActiveX Controls: Internet Explorer uses ActiveX controls for its browser plugins. Any website can prompt you to download an ActiveX control. This can be legitimate – for example, you might need to download the Flash player ActiveX control the first time you play a Flash video online. However, ActiveX controls are just like any other software on your system and have permission to leave the web browser and access the rest of your system. A malicious website pushing a dangerous ActiveX control may say the control is necessary to access some content, but it may actually exist to infect your computer. When in doubt, don’t agree to run an ActiveX control.

  • Auto-Downloading Files: A malicious website may attempt to automatically download an EXE file or another type of dangerous file onto your computer in the hopes that you will run it. If you didn’t specifically request a download and don’t know what it is, don’t download a file that automatically pops up and asks you where to save it.
  • Fake Download Links: On websites with bad ad networks – or websites where pirated content is found – you’ll often see advertisements imitating download buttons. These advertisements try to trick people into downloading something they’re not looking for by masquerading as a real download link. There’s a good chance links such as this one contain malware.

  • “You Need a Plugin to Watch This Video”: If you stumble across a website that says you need to install a new browser plug-in or codec to play a video, beware. You may need a new browser plugin for some things – for example, you need Microsoft’s Silverlight plugin to play videos on Netflix – but if you’re on a less-reputable website that wants you to download and run an EXE file so you can play their videos, there’s a good chance they’re trying to infect your computer with malicious software.

  • “Your Computer is Infected”: You may see advertisements saying your computer is infected and insisting you need to download an EXE file to clean things up. If you do download this EXE file and run it, your computer probably will be infected.

This isn’t an exhaustive list. Malicious people are constantly on the look-out for new ways to trick people.

As always, running an antivirus can help protect you if you do accidentally download a malicious program.


These are the ways the average computer user (and even the employees at Facebook and Apple) have their computers “hacked” via their browsers. Knowledge is power, and this information should help you protect yourself online.

 
 

 
Posted on 08-27-13 10:18 AM     [Snapshot: 41]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

Some malwares are good at locking your computer so you cannot install/run any anti virus or anti malware.

If you have experienced any slowness, or unwanted behavior on your computer and you are unable to install any anti virus or anti malware then do the following:

1. Download Malwarebytes installation file to a USB flash drive *using a different computer* from this link:  download Malwarebytes
2. Start the infected computer in "SAFE MODE" - See number 4 on how to start computer in SAFE MODE
3. After you start in Safe Mode, you can install Malwarebytes using the USB flash drive. Then run a full scan. After scan is complete it will give you option to delete all the malwares. Make sure you delete it. Also there should be a "Quarantine" tab, make sure you delete everything from the quarantine tab as well.

4. How to start in safe mode:

Safe mode starts Windows with a limited set of files and drivers. Startup programs don't run in safe mode, and only the basic drivers needed to start Windows are installed. For more information, see What is safe mode?

Safe mode is useful for troubleshooting problems with programs and drivers that might not start correctly or that might prevent Windows from starting correctly. If a problem doesn't reappear when you start in safe mode, you can eliminate the default settings and basic device drivers as possible causes. If a recently installed program, device, or driver prevents Windows from running correctly, you can start your computer in safe mode and then remove the program that's causing the problem. For more information about troubleshooting problems in safe mode, see Diagnostic tools to use in safe mode.

  1. Remove all floppy disks, CDs, and DVDs from your computer, and then restart your computer.

    Click the Start button Picture of Start button, click the arrow next to the Shut Down button Picture of Shut Down button, and then click Restart.
  2. Do one of the following:

    • If your computer has a single operating system installed, press and hold the F8 key as your computer restarts. You need to press F8 before the Windows logo appears. If the Windows logo appears, you'll need to try again by waiting until the Windows logon prompt appears, and then shutting down and restarting your computer.

    • If your computer has more than one operating system, use the arrow keys to highlight the operating system you want to start in safe mode, and then press F8.

  3. On the Advanced Boot Options screen, use the arrow keys to highlight the safe mode option you want, and then press Enter. For more information about options, see Advanced startup options (including safe mode).

  4. Log on to your computer with a user account that has administrator rights.

When your computer is in safe mode, you'll see the words Safe Mode in the corners of your monitor. To exit safe mode, restart your computer and let Windows start normally.



 
Posted on 08-27-13 11:28 AM     [Snapshot: 113]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

Thanks San bro, I need it so bad. Hijo aja masti share garyo ki virus pasi haalcha. :)
 


Please Log in! to be able to reply! If you don't have a login, please register here.

YOU CAN ALSO



IN ORDER TO POST!




Within last 7 days
Recommended Popular Threads Controvertial Threads
TPS Re-registration case still pending ..
ढ्याउ गर्दा दसैँको खसी गनाउच
lost $3500 on penny stocks !!!
Nepalese Students Face Deportation over Pro-Palestine Protest
They are openly permitting undocumented immigrants to participate in federal elections in Arizona now.
TPS Reregistration and EAD Approval Timeline.......
Trasiting through Istanbul, Turkey
Is this a progressive step?
NOTE: The opinions here represent the opinions of the individual posters, and not of Sajha.com. It is not possible for sajha.com to monitor all the postings, since sajha.com merely seeks to provide a cyber location for discussing ideas and concerns related to Nepal and the Nepalis. Please send an email to admin@sajha.com using a valid email address if you want any posting to be considered for deletion. Your request will be handled on a one to one basis. Sajha.com is a service please don't abuse it. - Thanks.

Sajha.com Privacy Policy

Like us in Facebook!

↑ Back to Top
free counters