How to defeat viruses, or April 1, 2002 from the Nativity of Christ

How to defeat viruses, or April 1, 2002 from the Nativity of Christ

Today we will touch upon a topic that has not been raised in our newsletter for a long time, but it does not lose its relevance. This issue is about Internet security. And in other words – about what periodically prevents us from happily and happily enjoying communication with the computer. So, about the VIRUSES!

First a brief educational program, for those who do not know. What is a computer virus?

In a nutshell, it is a program created in such a way that, when activated in a computer environment, it damages the user. This damage can be from harmless (say, at a certain time you will have some kind of informational message on the screen, usually a joking nature) to the horrible when irreparably lost important files or simply erased all the information contained on your computer’s hard drive.

The viruses are systematized both by the nature of the impact on the system and by the type of distribution. There are countless malicious codes, including Trojans, Internet worms, dangerous Java applets, Active X, macro viruses and others. And the sources of viruses penetration into the computer are: the Internet, e-mail, diskettes, other mobile media, archived and compressed files, and so on and so forth.

Despite the “youth” of this problem, a lot has been written and said about the viruses, so we will not dwell on the story of the “traditional” malicious programs. If you are interested, you can read on the website of Kaspersky Lab. Our today’s story is not about that.

Few people yet know that along with the ways listed above to get your computer a virus, most recently, a new, directly say, alternative. Incidentally, the “information noise”, created recently by jokers-goodwillers, seriously hinders the dissemination of information about this, except jokes, a dangerous undertaking. Many of us received e-mail letters with “warnings” about the emergence of a new dangerous, p-r-rashny virus. That there is a run-down virus with RuNet, which provokes users to delete the system file SULFNBK.EXE. Remember, you did not receive a letter with a message about the contents of this file terrible e-mail? And the story about ANTICRISTO? Or WAZUP? In a word, for such “jokes”, as in a fairy tale about a boy who lied to fellow villagers about ostensibly attacking wolves on a herd, and then laughed for a long time when those, rushing off, carried the aforementioned herd. Do you remember how the fairy tale ended? When the danger was not comic, the boy was not believed!

But I return to a new, “alternative” way of getting viruses. To put it bluntly, this was to be expected. Despite the rapid growth in the number of users connected to the Internet in the CIS countries, so far the majority, according to some sources, up to 98% of them, use a direct dial-up connection!
Inventive hackers have long been struggling with the question of how to use wires that are always accessible to them (!!!), permanently and directly connected to the computer. That’s where the space for inventive imagination and rolled (forgive) head.

And the way was found. Using a technology such as ADSL (software technology for sealing the telephone cable used by many telephony service providers), a qualified hacker is now able to launch a virus into your computer directly via telephone wires. The most unpleasant thing is that for this, due to the use of ADSL, it does not matter if the telephone line is busy or free. It does not matter whether your computer is turned on or off, which, you will agree, is completely unpleasant.

Fortunately, a solution to this issue was found. A number of anti-virus laboratories (in which, by the way, often work re-educated hackers) has already proposed solutions to this problem. As a rule, they propose to install the software components developed by them, which almost or absolutely will protect them from attacks through telephone wires.The minus of these developments in their “dampness” and the possible presence of “holes” in the defense, as well as … in the free.

However, recently (which, incidentally, was the reason for this release), a group of programmers from St. Petersburg found a new schematic diagram, which allows to guarantee with 100% guarantee against the described misfortune. Moreover, it is extremely simple and does not require the installation of any new programs.

Since the sending style does not include the citation of dry technical texts, I, with the permission of the developers, laid out the description of the protection against “phone attacks” on the mailing list. Scheme tested for Windows 95, 98, 2000, NT, XP

Who is warned – that is protected.
Well, and finally … – From the first of April you, friends!

Leave a Reply

Your email address will not be published. Required fields are marked *