Analyze Virus Attack

Posted by Admin

Jakarta - Have not bothered by a virus that attacks your computer? While we do not update antivirus programs are able to recognize the evil that mangacau. Why not try fad analyze yourself? Here's a simple step.

Taufik Juhar Adang, senior Vaksinis Vaksincom in Vaksincom seminar held at Ancol, Friday (4/12/2009), to explain how simple steps that infiltrate the virus analysis on the Windows operating bersistem computer, especially if the local virus attack.

"For the local virus itself was easy to analyze, because it would karakterisitknya same," he said. Adang said that first we must have the Internet, to find tools-tools that can be downloaded for free at some sites. Examples like the following:

- Pack and Unpack Detection Programs
PEid v0.94 www.peid.info
Security Task Manager upxshell.sourceforge.net
- VB Decompiler
www.vb-decompiler.org
- List Process Windows (Task Manager)
Security Task Manager www.neuber.com
ProceeXp technet.microsoft.com
IceSword icesword.en.softonic.com
CurrProcess www.brothersoft.com

- Registry Tools (Regedit)
Reg Watcher / Registry monitor mj-registry-watcher.en.softonic.com
RegAnalizer www.safer-networking.org


- Windows Startup list (Msconfig)
HijackThis www.filehippo.com
Autorun technet.microsoft.com

- ExplorerXP www.explorerxp.com

- Hoster www.funkytoad.com

- Live CD
MiniPE www.minipe.org
Bart PE www.nu2.nu
ReatogoXPE www.reatogo.de
Windows Live CD www.livecdlist.com

Adang also explained that we have the tools-tools, we can begin to analyze the stages that simple:

1. Understand the type of virus that had attacked: what is disguised Icon and size.
2. Understand the characteristics of the virus. Would make a duplicate file, hide files, inject files, or displaying certain messages.
3. Understand how the virus: What are modified viruses, whether the registry, created master files, or function of the blocked windows.
www.kellys-korner-xp.com
4. Understand viruses: Does the USB flash disk or folder on the share, because the local virus usually infiltrate through the media 2.
5. Prepare a few tools that are used.
Related Posts Plugin for WordPress, Blogger...

{ 0 comments... read them below or add one }