Wednesday, December 17, 2014

Trojan - The Most Unwanted Thing

Trojan


Trojan is MALWARE program that contains MALICIOUS code. The program that perform malicious activity that is not authorized by the user or victim.

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. 


Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

RAT (Remote Administration Tool): 

Remote Administration Tool is used to Trojans. With the help of RAT you can create Trojan easily. It is also used to control Victims PC. RAT is created by the Hackers to help Hackers.
Rat are available for both types of Trojans (Direct Connection, Reverse Connection Trojan). There are numerous RATS available over the internet.



If Trojans gets into your system then it will collect all your personal information without you being aware of it. Trojans are very difficult to remove on your own and slow down your PC. We can say Trojan as a program. This program gets installed in the background while you are doing something else on the internet. Trojans has fairly widespread because of your cable modem or DSL connection is always connected.

With the help of Trojan an attacker can get access to stored password, he can able to read your personal documents stored in your PC, delete files, and he show the images on the screen.

Difference between Virus, Worms and Trojans:




TROJAN: Trojan is a program that once executed performs a task other then expected. 

VIRUS: Virus is an application it self replicates by injecting its code into other data files. Virus spreads and attempts to consume specific targets and are normally executable.

WORMS: Worm copies itself over a network. It is a program that views the infection points of another computer rather than as other executable files on an already infected computer.

Types of Trojans:
1. Direct connection Trojan
2. Reverse connection Trojan

Trojans are transmitted in many ways:
1. Email Attachments
2. Physical Access
3. Software
4. Images
5. Advertisements
6. Fake programs


Trojan Creators looks for:
1. Confidential Documents
2. Credit Card Information
3. Account Data (Email, Password, Username, etc)
4. Financial Data
5. Using Victims PC for illegal purpose.

BEAST:
Beast is a Windows-based backdoor Trojan horse, more commonly known in the underground hacking community as a RAT. It is capable of infecting versions of Windows from 95 to XP.



Beast was one of the first Trojans to feature a reverse connection to its victims, and once established it gave the attacker complete control over the infected computer. Beast came with a built-in firewall by-passer and had the ability of terminating some Anti-Virus or firewall processes. It also came with a binder that could be used to join two or more files together and then change their icon.

It is discontinued in year 2004 and any PC infected by Beast can be easily disinfected by starting windows XP in safe-mode and than removing some infected system files. Also the system restore must be turned off to do this process.

Stay Safe !!!

Saturday, December 6, 2014

TRICK: Create Secret Folder in Windows

TRICK: SECRET FOLDER IN WINDOWS









Hello friends, today we ll show you how to make secret folders in windows PC for your personal use.
These folders are not easily visible to other and only you know it where you had created it.




NOTE: This trick is best suited for making a secret folder on desktop rather in some other place like My Documents or any other drive.

So lets start step wise process for the same.
First you go there where you to have a secret folder and then continue with the following steps:

STEP 1: First create a new folder in simple way as we all do.





STEP 2: Rename it. And when you rename it, don't press any character. Instead, just press and hold the "alt" key and then press number 2 then number 5 and again number 5. The "alt" key must be kept pressed till you press all the numbers one by one (i.e. "alt+255). Then leave the "alt" key and press Enter.





STEP 3: As you can see that you folder now don't have any name, which is not possible by normal space-bar key. Now we had created two more simple folders below the secret folder for your better understanding.





STEP 4: Now open the Properties of your secret folder and go to "Customize" tab. There click the "Choose Icon" button, and from there select any empty space or empty icon as show in image below. After this you will notice that your secret folder now don't have any icon too.






STEP 5: As your folder is still visible, lets make it "Hidden" from the Properties. And it ll go off from the list.





STEP 6: Now final step... To access your folder, just click the address bar, and add a slash and then type the same thing "alt+255", and press Enter. And you are in you secret folder now.





Here, you can notice the difference that before going in our secret folder there was not pointer arrow after "test" in address-bar. But in the last image we can see that there is an arrow, which gives the hint that we are in our secret folder but there is no name.


ALSO NO ONE CAN OPEN THIS FOLDER BY SIMPLE SPACE-BAR KEY.
THIS SECRET FOLDER WILL OPEN BY ALT+255 KEY ONLY.

Enjoy and have fun...!!!