四月一日愚人節之電腦駭客

天南地北隨你聊
nicholas
系主任
文章: 2879
註冊時間: 週日 3月 15日, 2009年 9:28 am
來自: 義大利

Re: 四月一日愚人節之電腦駭客

文章 nicholas » 週四 4月 2日, 2009年 2:22 am

最近在幫義大利一家軟體公司規劃一個business model,是開發給不太會用電腦的人
可是我也不懂電腦.... :oops:
69漁業

頭像
蔡自富
系統管理員
文章: 951
註冊時間: 週五 3月 6日, 2009年 11:05 am
來自: 美國麻州
聯繫:

Re: 四月一日愚人節之電腦駭客

文章 蔡自富 » 週四 4月 2日, 2009年 10:19 am

也許這就是為什麼他們要你做?
聽起來有點趣,這business model和什麼有關?
65372 輪義 麻州獵鹿人 Karl Tsai
Line/WeChat: karltsai1961

nicholas
系主任
文章: 2879
註冊時間: 週日 3月 15日, 2009年 9:28 am
來自: 義大利

Re: 四月一日愚人節之電腦駭客

文章 nicholas » 週四 4月 2日, 2009年 3:19 pm

自富學長~等我搞清楚後再與你分享!
69漁業

頭像
張紹康
召集人
文章: 4427
註冊時間: 週六 3月 7日, 2009年 5:09 pm

Re: 四月一日愚人節之電腦駭客

文章 張紹康 » 週五 4月 3日, 2009年 9:43 am

版面有限 部分節錄 更沒空者 請只讀 :arrow: 部分:
For PC users... Article from Yahoo!
Conficker worm plays no tricks on April Fools' Day
By by Glenn Chapman - Thu Apr 2, 2009 12:33AM EDT

SAN FRANCISCO (AFP) -
The Conficker worm's April 1st trigger date came and went without the bedeviling computer virus causing any mischief but security specialists warn that the threat is far from over.

Conficker did just what the "white hats" tracking it expected -- the virus evolved to better resist extermination and make its masters tougher to find.

"There are still millions of personal computers out there that are, unknown to their owners, at risk of being controlled in the future by persons unknown," said Trend Micro threat researcher Paul Ferguson.

"The threat is still there. " "It is pretty sophisticated and state-of-the-art." Ferguson said.

A task force assembled by Microsoft has placed a bounty of 250,000 dollars on the heads of those responsible for the threat.

The worm was programmed to evolve on Wednesday to become harder to stop.
Conficker had been programmed to reach out to 250 websites daily to download commands from its masters, but on Wednesday it began generating daily lists of 50,000 websites and reaching randomly 500 of those.

The worm, a self-replicating program, :arrow: takes advantage of networks or computers that haven't kept up to date with security patches for Windows RPC Server Service.

It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another. Malware could be triggered to steal data or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies.

:arrow: Microsoft has modified its free Malicious Software Removal Tool to detect and remove Conficker. Security firms, including Trend Micro, Symantec and F-Secure, provide Conficker removal services at their websites.

The tell-tale signs that a computer is infected includes the worm blocking efforts to connect with websites of security firms providing online tools for removing the virus.

The US Department of Homeland Security (DHS) released a tool on Monday to detect whether a computer is infected by Conficker.

The agency said the worm detector was developed by the US Computer Emergency Readiness Team (US-CERT).

US-CERT recommended that Windows users apply :arrow: Microsoft security patch MS08-067 to help protect against the worm.
68航禮
張紹康

回覆文章

誰在線上

正在瀏覽這個版面的使用者:沒有註冊會員 和 4 位訪客