Sunday, 10 November 2013

How to Use An Antivirus Boot Disc or USB Drive to Ensure Your Computer is Clean

Why You Should Use an Antivirus Boot Disc

Antivirus boot discs deal with this by approaching the malware from outside Windows. You boot your computer from a CD or USB drive containing the antivirus and it loads a specialized operating system from the disc. Even if your Windows installation is completely infected with malware, the special operating system won’t have any malware running within it.
This means the antivirus program can work on the Windows installation from outside it. The malware won’t be running while the antivirus tries to remove it, so the antivirus can methodically locate and remove the harmful software without it interfering.
Any rootkits won’t be able to set up the tricks they use at Windows boot time to hide themselves from the rest o the operating system. The antivirus will be able to see the rootkits and remove them.
These tools are often referred to as “rescue disks.” They’re meant to be used when you need to rescue a hopelessly infected system.
create-avast-bootable-rescue-disk

Bootable Antivirus Options

As with any type of antivirus software, you have quite a few options. Many antivirus companies offer bootable antivirus systems based on their antivirus software. These tools are generally free, even when they’re offered by companies that specialized in paid antivirus solutions. Here are a few good options:
  • avast! Rescue Disk – We like avast! for offering a capable free antivirus with good detection rates in independent tests. avast! now offers the ability to create an antivirus boot disc or USB drive. Just navigate to the Tools -> Rescue Disk option in the avast! desktop application to create bootable media.
  • BitDefender Rescue CD – BitDefender always seems to receive good scores in independent tests, and the BitDefender Rescue CD offers the same antivirus engine in the form of a bootable disc.
  • Kaspersky Rescue Disk – Kaspersky also receives good scores in independent tests and offers its own antivirus boot disc.
These are just a handful of options. If you prefer another antivirus for some reason — Comodo, Norton, Avira, ESET, or almost any other antivirus product — you’ll probably find that it offers its own system rescue disk.
avast-antivirus-boot-disc

How to Use an Antivirus Boot Disc

Using an antivirus boot disc or USB drive is actually pretty simple. You’ll just need to find the antivirus boot disc you want to use and burn it to disc or install it on a USB drive. You can do this part on any computer, so you can create antivirus boot media on a clean computer and then take it to an infected computer.
Insert the boot media into the infected computer and then reboot. The computer should boot from the removable media and load the secure antivirus environment. (If it doesn’t, you may need to change the boot order in your BIOS or UEFI firmware.) You can then follow the instructions on your screen to scan your Windows system for malware and remove it. No malware will be running in the background while you do this.
avast-boot-disc-scan

Antivirus boot discs are useful because they allow you to detect and clean malware infections from outside an infected operating system. If the operating system is severely infected, it may not be possible to remove — or even detect — all the malware from within it.

Sunday, 15 September 2013

Why Does RAM Have to be Volatile?

The Answer

 it’s due to physics.
Any non-volatile memory must store its bits in two states which have a large energy barrier between them, or else the smallest influence would change the bit. But when writing to that memory, we must actively overcome that energy barrier.
Designer have quite some freedom in setting those energy barriers. Set it low 0 . 1, and you get memory which can be rewritten a lot without generating a lot of heat: fast and volatile. Set the energy barrier high 0 | 1 and the bits will stay put almost forever, or until you expend serious energy.
DRAM uses small capacitors which leak. Bigger capacitors would leak less, be less volatile, but take longer to charge.
Flash uses electrons which are shot at high voltage into an isolator. The energy barrier is so high that you can’t get them out in a controlled way; the only way is to clean out an entire block of bits.
In other words, the only way to make the RAM as high speed as we need it for modern computer operations is to keep the resistance between state changes extremely low (and thus make the RAM volatile and susceptible to data erasure in the face of power loss).

RAM Is Cheap So Why Don’t We Run Everything From It?

The Answer

 http://cdn.howtogeek.com/wp-content/uploads/2013/09/img_5228b7713cdf6.jpg


There are a few reasons RAM is not used that way:
  1. Common desktop (DDR3) RAM is cheap, but not quite that cheap. Especially if you want to buy relatively large DIMMs.
  2. RAM loses its contents when powered off. Thus you would need to reload the content at boot time. Say you use a SSD sized RAMDISK of 100GB, that means about two minutes delay while 100GB are copied from the disk.
  3. RAM uses more power (say 2–3 Watt per DIMM, about the same as an idle SSD).
  4. To use so much RAM, your motherboard will need a lot of DIMM sockets and the traces to them. Usually this is limited to six or less. (More board space means more costs, thus higher prices.)
  5. Lastly, you will also need RAM to run your programs in, so you will need the normal RAM size to work in (e.g. 18GiB, and enough to store the data you expect to use).
Having said that: Yes, RAM disks do exist. Even as PCI board with DIMM sockets and as appliances for very high IOps. (Mostly used in corporate databases before SSD’s became an option). These things are not cheap though.

Sunday, 11 August 2013

How to Browse the Web Anonymously On Your Android Smartphone

When you access a website on your smartphone, your cellular carrier, network operator, and government all know you accessed that website. If you’re in a country that blocks websites

, like China, you may not even be able to access certain websites. Tor allows you to browse anonymously and bypass web censorship on your desktop. Orbot brings Tor to Android, so you can do the same from your smartphone.
orbot-welcome-message
Whether you’re connected to a cellular data connection or Wi-Fi, Orbot works the same. Like the Tor browser bundle for PCs, it connects to the Tor network and allows you to browse the web anonymously.


Connect to Tor With Orbot



orbot-superuser
orbot-connect-to-tor-on-android


Bear in mind that Tor is significantly slower than a standard connection for browsing, as the routing process adds some overhead

Wednesday, 1 May 2013

[rexofcyber explain] ::What Is The Difference Between DDR2 & DDR3 RAM

RAM or Random Access Memory, is your computer’s short term memory. If your computer needs information and does not find the RAM, it then needs to journey to the hard drive to try and retrieve the data, which is far more time consuming. Many older computers that feel sluggish can be given new life if upgraded with additional RAM.
However, capacity is only one specification. RAM is also available in a variety of versions and speeds. A 2GB stick of DDR2 800 RAM is not the same thing as a 2GB stick of DDR3 1333 RAM. Understanding the difference is important because computers will generally accept only certain types of RAM.

Saturday, 27 April 2013

Kali Linux

Kali Linux is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing users maintained and funded by Offensive Security. It was developed by Offensive Security as the successor to BackTrack Linux.[1]
Kali provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option. It is a supported platform for the Metasploit Project's Metasploit Framework, a tool for developing and executing exploit code against a remote target machine.[2] It also includes the security tools Wireshark, John the Ripper, Nmap and Aircrack-ng.[2]
Kali is distributed in 32-bit and 64-images for use on hosts based on the x86 processor architecture, as well as an image for the ARM architecture for use on the Raspberry Pi computer and on Samsung's ARM Chromebook.[3]

Wednesday, 24 April 2013

REXOFCYBER Explains: What Spear Phishing Attacks Are and Why They’re Taking Down Big Corporations

spear-fishing
The news is full of reports of “spear-phishing attacks” being used against governments, large corporations, and political activists. Spear-phishing attacks are now the most common way corporate networks are compromised, according to many reports.
Spear-phishing is a newer and more dangerous form of phishing. Instead of a casting a wide net in hopes of catching anything at all, the spear-phisher crafts a careful attack and aims it at individual people or a specific department.

Phishing Explained

Phishing is the practice of impersonating someone trustworthy to try and acquire your information. For example, a phisher might sent out spam emails pretending to be from Bank of America asking you to click a link, visit a fake Bank of America website (a phishing site), and enter your banking details.
Phishing isn’t just limited to email, however. A phisher could register a chat name like “Skype Support” on Skype and contact you via Skype messages, saying that your account was compromised and they need your password or credit card number to verify your identity. This has also been done in online games, where scammers impersonate game administrators and send messages asking for your password, which they would use to steal your account. Phishing could also happen over the phone. In the past, you may have received phone calls claiming to be from Microsoft and saying you have a virus you must pay to remove.
Phishers generally cast a very wide net. A Bank of America phishing email may be sent to millions of people, even people who don’t have Bank of America accounts. Because of this, phishing is often fairly easy to spot. If you don’t have a relationship with Bank of America and get an email claiming to be from them, it should be very clear that the email is a scam. Phishers depend on the fact that, if they contact enough people, someone will eventually fall for their scam. This is the same reason we still have spam emails – someone out there must be falling for them or they wouldn’t be profitable.
Take a look at the anatomy of a phishing email for more information.

How Spear Phishing is Different

If traditional phishing is the act of casting a wide net in hopes of catching something, spear phishing is the act of carefully targeting a specific individual or organization and tailoring the attack to them personally.
While most phishing emails aren’t very specific, a spear-phishing attack uses personal information to make the scam seem real. For example, rather than reading “Dear Sir, please to click this link for fabulous wealth and riches” the email may say “Hi Bob, please read this business plan we drafted at Tuesday’s meeting and let us know what you think.” The email may appear to come from someone you know (possibly with a forged email address, but possibly with a real email address after the person was compromised in a phishing attack) rather than someone you don’t know. The request is more carefully crafted and looks like it could be legitimate. The email could refer to someone you know, a purchase you’ve made, or another piece of personal information.
Spear-phishing attacks on high-value targets can be combined with a zero-day exploit for maximum damage. For example, a scammer could email an individual at a particular business saying “Hi Bob, would you please take a look at this business report? Jane said you would give us some feedback.” with a legitimate-looking email address. The link could go to a web page with embedded Java or Flash content that takes advantage of the zero-day to compromise the computer. (Java is particularly dangerous, as most people have outdated and vulnerable Java plug-ins installed.) Once the computer is compromised, the attacker could access their corporate network or use their email address to launch targeted spear-phishing attacks against other individuals in the organization.
A scammer could also attach a dangerous file that’s disguised to look like a harmless file. For example, a spear-phishing email may have a PDF file that’s actually an .exe file attached.

Who Really Needs to Worry

Spear-phishing attacks are being used against large corporations and governments to access their internal networks. We don’t know about every corporation or government that has been compromised by successful spear-phishing attacks. Organizations often don’t disclose the exact type of attack that compromised them. They don’t even like to admit they’ve been hacked at all.
A quick search reveals that organizations including the White House, Facebook, Apple, the US Department of Defense, The New York Times, the Wall Street Journal, and Twitter have all likely been compromised by spear-phishing attacks. Those are just a few of the organizations we know have been compromised – the extent of the problem is likely much greater.
If an attacker really wants to compromise a high-value target, a spear-phishing attack – perhaps combined with a new zero-day exploit purchased on the black market – is often a very effective way to do so. Spear-phishing attacks are often mentioned as the cause when a high-value target is breached.

Protecting Yourself From Spear Phishing

As an individual, you’re less likely to be the target of such a sophisticated attack than governments and massive corporations are. However, attackers may still attempt to use spear-phishing tactics against you by incorporating personal information into phishing emails. It’s important to realize that phishing attacks are becoming more sophisticated.
When it comes to phishing, you should be vigilant. Keep your software up-to-date so you’re better protected against bring compromised if you click links in emails. Be extra cautious when opening files attached to emails. Beware of unusual requests for personal information, even ones that seem as if they could be legitimate. Don’t re-use passwords on different websites, just in case your password does get out.
Phishing attacks often try to do things that legitimate businesses would never do. Your bank will never email you and ask for your password, a business you’ve purchased goods from will never email you and ask for your credit card number, and you’ll never get an instant message from a legitimate organization asking you for your password or other sensitive information. Don’t click links in emails and give out sensitive personal information, no matter how convincing the phishing email and phishing site is.
dangerous file

Like all forms of phishing, spear-phishing is a form of social engineering attack that is particularly hard to defend against. All it takes is one person making a mistake and the attackers will have established a toehold in your network.