Security and Privacy Guide
(free antivirus, worm and trojan programs - finds these malware on your hard drive and removes them - NOD32 is currently the best antimalware program, according to Gizmo of TechSupportAlert.com - Check weekly for updates and scan your hard drive daily or weekly.)
WARNING: Antivirus, antispyware and firewall software do not protect your system from zero day / zero hour attacks and other threats.
I strongly recommend minimizing those threats with a Host Intrusion Detection and Prevention System (HIDS / HIPS).
''Anti-virus products have become much better at detecting trojans. As a result of these developments I no longer recommend for most users the routine use of a separate anti-trojan program.'' - Ian ''Gizmo'' Richards
Note: Because today's antivirus software are being programmed to detect trojans, the demand for and sale of antitrojan scanners have gone down. As a result, TDS-3, once the best antitrojan scanner for experienced users, has been discontinued.
''The term 'rootkit' originates from the Unix world. It refers to a set of tools that would hide any trace of an intruder yet maintain full, or "root," access [to the operating system].'' - CNet
''A rootkit retains access to the system that has been previously compromised, and it hides itself from someone who is authorized to use the computer,'' said Jon Orbeton, a senior security analyst at security software maker Zone Labs.
''Rootkits are malicious programs that are designed to be invisible, often replacing core operating system functionality with a version of the same functionality that provides remote attackers with a back door into compromised systems,'' says Al Huger, senior director of engineering at Symantec.
Huger also says that ''If we have seen an increase in [rootkit infections] it's not significant enough to warrant attention.'' - Rootkits: Not Real Threats?
Mikael Albrecht, product manager for F-Secure, sees it differently. ''It is...worth noting that the Windows rootkit scene is new and rapidly developing.''
If you disagree, try to reveal and / or remove a stealthy rootkit with one of the following programs.
WARNING: Removing a rootkit may corrupt and disable your operating system, and destroy personal data in the process. I strongly recommend reformatting and reinstalling Windows instead, if you want to keep using Windows. Otherwise, you might want to consider taking this opportunity to switch to an alternative and more secure operating system. | skip
Security and Privacy Guide
Get notified when this page changes.
Please read my disclaimer before visiting the following top sites.
Brent's Place at brentsplace.info
©2000-2006 All rights reserved.