Threats on Internet (Cyber Hygiene) - Tips4ever


Hi this is Mahesh, Tips4ever is my IT Journey to technology, computers, software, Internet and much more....

Sep 13, 2007

Threats on Internet (Cyber Hygiene)

Threats on Internet, operation System update, Anti-Virus software’s Installation, Personal firewall, Pop-up blocking, Spy ware removal tools.

Types of Internet threats:

  • Viruses
  • Network worms
  • Trojans
  • Spyware / Adware
  • Other Malware
  • Other Threats

Viruses, worms and Trojan horses:

A virus is a program that replicates itself, usually by attaching itself to other files and program. A worm is a program that does not infect other programs but makes copies of itself. Trojan horse programs do not replicate nor make copies of themselves, but rely on other “manual” method of distribution. We use the term “Virus” on this page to cover all forms of infections.

Virus are spread in a variety of ways. Some Examples:

  • Email attachments (such as klez, Badtrans, myparty)
  • Instant messages links and attachments (such as Aplore)
  • Compromised web services (such as Nimda)
  • Usenet news groups
  • Internet relay Chart channels
  • Floppy diskettes
  • File downloads (many backdoor Trojans are embedded with other files)

All viruses are different. Some activate on a certain day, but remain dormant until then. Others being the attack as soon as the machine has been infected. Viruses can be very damaging and some are just annoying.

More than 1,00,000 known viruses exists in the world today several hundred new

Viruses are discovered every month

Protecting from viruses:

A good way to protect yourself is to have virus protection program and keep it up-to-date. Before running a download from an unknown site, or opening an email attachment, always be sure to scan it to ensure that it is not infected. If you do not know that source of a file does not open it. Even it you know the person who sent you a file, if you were not expecting it you may want to contact them before opening it. This is because many viruses automatically send themselves out to addresses it finds in file on the infect computer.

Anti-Virus program:

An anti-virus program designed to protect your computer from possible viruses infection. Most viruses are designed to operate in the background in a that the user will not notice. Virus protection program search for, detect, and attempt to remove these viruses. Anti-virus program must be kept upto date in order for them to provide adequate protuction. New viruses are being created every day and your antivirus program can’t always predict what they will be able todo or how they will work.

Due to the nature of the operating system, Linux, and other UNIEX-kinks operating system are not as susceptible to viruses. Thus an anti-virus program is not necessary.

Network Word:

  • Self-replicating Viruses that residw in the active memory of a computer.
  • Worms send themselves out to the Internet from infected system.
  • Either include tiny e-mail servers or search for unprotected shared network

Trojan Programs:

  • Programs that installed themselves stealthly via Internet & provide access for malicious use
  • Threats enabled by (/through) Trojans
    • DDos attacks
    • Data stealing
    • Distributed spam emails
  • Do not replicate

Spyware / Adware:

  • Cookies-Track you online
  • Browser Hijackers-Changes default home page
  • Tracking Cookies-Gathers info of web usage
  • Trickles-Reinstalls spyware when dected
  • Keyloggers-Records anything you type….Etc,.

Other malware:

  • Dos & DDos attacks
  • Flooders
  • FilwCryptors & poluCryptors
  • Nukers …Etc.

Other Threats:

  • Phishing
    • Confidential information stealing by fraud emails & web sites (author falsified)
    • Several millions of phishingg messages have been sent world wide
    • Fastes growing threat today
  • SPIM
    • Instant message SPAM
    • Estimated: 4 billion Spam’s during 2004

Diagnosing (or) Detecting Infections:

  • Slow computer, System reboots
  • Mouse moves by itself
  • Browser goes to unexpected web sites
  • Slow internet access
  • Endless popup ads
  • New desktop toolbars


  • Disabled antivirus scanner or firewall
  • Check startup programs groups regulation for software you didn’t install
  • Add/Remove programs for software’s you didn’t install (make a list of install items on a new machine and check the list regularly)
  • Check running services monthly
  • Check running processes in task manage
  • Monitor open ports
  • Monitor outgoing and incoming connections.

Methods against Threats:

  • Updating
  • Antivirus software’s
  • Antispyware Tools