SoftwareTipsandTricks Forum

Go Back   SoftwareTipsandTricks Forum > General Forums > Chit Chat
User Name
Password


How to protect address book from viruses

Reply
 
Thread Tools Search this Thread Rating: Thread Rating: 3 votes, 2.00 average. Display Modes

  #1  
Old 08-26-2003, 05:29 PM
WHODOER Offline
Registered User
 
Join Date: May 2003
Posts: 28
How to protect address book from viruses

I got this in an Email from a friend and would like everyone ideas about this, if it will really work or not.

HOW TO PROTECT YOUR ADDRESS BOOK!

I learned a computer trick today that's really
ingenious in its simplicity. As you may know,
when/if a worm virus gets into your computer it
heads straight for your email address book, and sends
itself to everyone in there, thus infecting all your
friends and associates.

This trick won't keep the virus from getting into your
computer, but it will stop it from using your address
book to spread further, and it will alert you to the
fact, that the worm has gotten into your system.

Here's what you do: first, open your address book and
click on "new contact," just as you would do if you
were adding a new friend to your list of email
addresses.

In the window where you would type your friend's
first name, type in AAAAAAA. Same in space
labeled screen name.

Now, here's what you've done and why it works: The
"name" AAAAAAA will be placed at the top of your
address book as entry #1. This will be where the
worm will start in an effort to send itself to all your
friends.

But, when it tries to send itself to AAAAAAA, it will
be undeliverable because of the phony email address
you entered. If the first attempt fails (which it will
because of the phony address), the worm goes no
further and your friends will not be infected.
Here's the second great advantage of this method: If
an email cannot be delivered, you will be notified of
this in your In Box almost immediately. Hence, if
you ever get an email telling you that an email
addressed to A could not be delivered, you know
right away that you have the worm virus in your
system. You can then take steps to get rid of it! Pretty
slick huh?
If everybody you know does this then you need not
ever worry about opening mail from friends. Pass this
on to all your friends
Reply With Quote

  #2  
Old 12-12-2012, 06:57 PM
Embolism's Avatar
Embolism Offline
Registered User
 
Join Date: May 2008
Location: UK
Posts: 341
Hmm not all worms target your msn address book and operate in a multitude of differing ways depending on payload so do not think you have cured your infestation in its entirety as without good security to start with you may well be zombied or worse.

Many worms that have been created are designed only to spread, and don't attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload free" worms can cause major disruption by increasing network traffic and other unintended effects. A "payload" is code in the worm designed to do more than spread the worm–it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for the creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines. Others try to blackmail companies with threatened DoS attacks.

Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which can spread using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005,since then some really ingenious and nasty worms have sprung up so your real security lies in regular updates to O/S and the use of a good(updated) anti virus and Anti spyware application,by using a firewall suite such as comodo Internet security which sandboxes any potential threats you can stop threats before they infect your system.
Reply With Quote

  #3  
Old 12-12-2012, 07:06 PM
Embolism's Avatar
Embolism Offline
Registered User
 
Join Date: May 2008
Location: UK
Posts: 341
Zone Alarm is also good ,if I remember right the originator of the Sasser virus and 4 of its derivatives was given a very lucrative contract to work for them ,some years back,both ZA and Comodo do free security suites and both have some cool features,remember to always keep up to date with A/v definitions and do not rely on your worm fix
Reply With Quote

  #4  
Old 12-13-2012, 07:04 PM
Embolism's Avatar
Embolism Offline
Registered User
 
Join Date: May 2008
Location: UK
Posts: 341
Quote:
Originally Posted by Embolism
Zone Alarm is also good ,if I remember right the originator of the Sasser virus and 4 of its derivatives was given a very lucrative contract to work for them ,some years back,both ZA and Comodo do free security suites and both have some cool features,remember to always keep up to date with A/v definitions and do not rely on your worm fix
The sasser worm did not use emails at all but infected other systems through tcp139,445
using windows own LSASS vulnerability.

In conclusion I see the biggest flaw to this working being that a group email could be sent to everyone in your email client at once and whilst the first might fail everyone else would crash and burn,its all down to the payload
An interesting idea though =D

Given that some children like my own son of 15 who has been toying with computers since age 4 and who can write code from scratch in notebook are the next generation of potential Authors of such worms it is not infeasible that they could reverse engineer certain windows patches and exploit vulnerabilities within the network allowing for the spread of migratory worms that could given the mobile nature of win8 and it`s reputed connectivity infect every other system it chances upon,something to ponder.!!

Last edited by Embolism : 12-13-2012 at 07:31 PM.
Reply With Quote

  #5  
Old 12-13-2012, 08:33 PM
Embolism's Avatar
Embolism Offline
Registered User
 
Join Date: May 2008
Location: UK
Posts: 341
And before my friend <digerati>jumps on my back for mass posts and saying this is impossible and BS in regard to vulnerabilities in Windows networking I might have him check out Morto which uses RDP (remote desktop protocol)to infect systems as but one of many exploits other than TCP/IP and emails,where there is a will there is a way,the more connectivity the more roads of access and sooner or later even windows update service could be compromised by spoofed comms,some very clever youngsters out there that were`nt raised in a time of valves but transistors who are cleverer than us all.
There is a cure for most worms but after several years and having a cure for it Confliker is still at large and abroad in what is estimated as many millions of windows computers.

Last edited by Embolism : 12-13-2012 at 08:45 PM.
Reply With Quote

  #6  
Old 12-14-2012, 03:08 PM
Embolism's Avatar
Embolism Offline
Registered User
 
Join Date: May 2008
Location: UK
Posts: 341
Window Bashing

Just so Iam not accused yet again of window bashing since basically we are all using variants of Unix it must be said there are helpful worms such as Welchia,designed by Microsoft, it infected windows systems and updated without user consent required patches before rebooting and not leaving logs to evidence what it had done.

It must be said that ethically they should not have invaded without permission anyone's computer although within the user agreement (in the small print) it has always stated that the operating system is the sole property of the corporation,even if the user has paid several hundred dollars for the operating disc he does not own the operating system.

I recall reading Foundstone around 10 years ago and there was a chapter on ethical hacking which i believe does apply from an Engineering perspective since every good developer and Engineer has at some point done workarounds myself included in Linux whereby you have to circumvent the usual protocols to reach the desired end result in getting things to function correctly and so in Microsoft's defence the end justified the means.perhaps if they did the same with regard to confliker they could eradicate the threat who knows,but in the Cyber world there is not always a white and a black hat solution, often there is a grey.

Last edited by Embolism : 12-14-2012 at 03:12 PM.
Reply With Quote
Reply




Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
how to restore Microsoft outlook address book dskaushik Windows XP 5 11-19-2011 09:59 PM
Outlook Express Address Book Folders scottcostello Windows XP 5 02-22-2010 06:39 PM
address book inflitration by chat servers minstrelite Software Problems and Useful Utilities 2 09-30-2004 05:59 PM
Outlook - Contacts - Address Book tomwalshco Windows XP 2 08-31-2004 07:07 PM
Outlook Express Shared Address Book powellf Software Problems and Useful Utilities 0 02-01-2004 12:32 PM



All times are GMT -5. The time now is 06:14 AM.


Powered by vBulletin Version 3.5.2
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
SEO by vBSEO 2.3.2 © 2005, Crawlability, Inc.