Mine has been going absolutely scatty last two days. Had a whole herd of trojan horses banging on the door, what would be considered a normal number of hits in a day??
I don't know whether this is relevant but my work network has had several virus attempts over the last few days - viruses that made it through their security (whatever that is!) into our mailboxes! One was a worm, but I don't know about the others. Seems the nerds that create these things are trying very hard :twisted:
Hi Kat,
I think the problem at the moment tends to be associated with the worms that are about. Apparently one way in which they operate is to scan "local" IP addresses, so if people in the same "block" as you become infected your machine would be found before the rest of the world. If you know your IP address you should be able to tell the local addresses from the logs, because the the first two dotted quads, ie the first two sets of up to three numbers in the address, will be the same. So if your IP address was you could expect to get more worm attacks from the range.
If it's of interest, I've started using:
It's a tiny application that sits on my computer, takes my firewall logs (ZoneAlarmPro in my case) and uploads the relevant logs to the site. Once there, the logs are analysed, along with many other users logs, and abuse reports filed and tracked automatically. You'll be able to see the domains that the attacks are coming from (if you don't get automatic resolution of the IP addresses in your logs) what the probable cause is (virus, worm or whatever) - plus the kick of seeing when other machines have been cleaned up or closed down! :twisted:
Also, personally, I've now changed our patching strategy at work - if you use Microsoft products, especially operating systems, it's well worth applying ALL critical patches and security updates via the Windows Update site.... err, I think it may be time to shut up... or I'll start banging on about making sure you (not you Kat, more a general you!) have up to date antivirus software!!
Mandy
Time to put the flirty head back on, I think!
Kat,
I'm always happy to elucidate - although I'm definitely not a true techy.. I was employed as the "human face to the IT department".. but on the plus side I don't say things that I don't understand, and I can talk in relatively plain English! ;)
Feel free to take enquiries to PM, email or whatever...
Mandy
A minor correction... i think I'm right, but if not then sorry! Worms self-propogate and therefore don't need to be executed/run on the machine to be infected, they can find open network shares, and (unpatched, with whatever the latest patch is) machines. We had some problems with the MS Blast worm at work, not because anyone received and executed it on one of our machines (all our mail is scanned by MessageLabs on the way in) but because it managed to get in through open ports on our firewall (they weren't considered a risk when it was configured by the support company).
I'd advise anyone who uses the Internet now to ensure they have a firewall on their machine, otherwise it's literally minutes of being connected before you stand a high risk of becoming infected (backed up by our latest advice from our external support company a fresh machine put online to get all the patches etc was infected within minutes). The free version of Zone Alarm from: offers a great deal of protection straight out of the box, so to speak, although some understanding is useful if you want to open things up so you can do particular things online.
Oh dear, I'm off again.. and I only wanted to say the thing about worms!
Mandy
Normal service will resume....
At the height of the recent msblast attack I was getting a hit every eight seconds. Resetting the internet conection reduced it for a while then it died down to more normal (for my system) 20/30 a day.
Don't take this the wrong way.
But will everyone please shut up!
:cry: :cry: :cry: :cry: :cry: :cry: :cry: :cry: :cry:
Kat gibbers in the corner!
OK, I'm cool.
I usually get a couple of hits a day, but I have to do my tax this month so I downloaded a tax calculation programme. To do this I had to switch of my firewall. Since then, I have had humongous amounts of hits, and I didn't know if it was a coincidence, or cos something had got in while the wall was switched off.
Now, tomorrow, when I am a little more sober, I am going to have a look through this string, and cry all over again!
But seriously, I will have a look through it all, and thanks everyone for the advice.
lhk
Pete
download Zonealarm for free. Update it reasonably regularly....
Bob's your mothers brother :-)
a) Linux is not inherently more secure than other operating systems.
The only security benefit that linux offers is it's relative lack of numbers, and therefore not as often exploited.
b) Many trojans arrive from 'friends', that's the typical purpose of a trojan. People want to spy on folk they know... not strangers. So beware folks of nice people sending you 'a cool utility to make you safer'.
c) Not all trojans / Virii arrive via Email, or file transfers. A large number of exploits have demonstrated buffer overrun errors in Web pages and RPC calls that execute code. Basically, this means that surfing some sites can be risk enough, as can merely being online. Depending on which operating system you're using the exploits vary, but the recent msblaster and derivatives can have devastating consequences on network performance.
Regarding the number of hits a firewall detects... there are a number of reasons why people get hit...
a) Firewall's are actually quite dumb.... not at all as intelligent as you're led to believe. Most cannot tell the deifference between legitimate use of your computer and misuse. So they expect YOU to tell them what's ok and what isn't.
A lot of hits on your pc are caused by 'Netbios'... basically, that's your pc booting up on trying to find other pc's on it's netwrok neighbourhood. There are thousands of computers booting up and using the same ISP as you. As a result, many of them are configured to use 'netbios' to try to search out other computers on the same network. Unfortunately, when someone's knocking on the metaphoric door of your computer, it's not possible to tell if it's a friendly face, a wrong house number, or a burglar!!
b) Recent worms cuch as msblaster / naachi do the same thing... they scan a range of network addresses in an attempt to sniff out ofhter computers that are prone to attack. Even if you're pc is nice and safe and clean, everybody elses PC might not be. Therefore, you're still prone to attack from all the other nutters (most of whom are blissfully unaware their PC's are doing this).
c) You have some seriously dodgy chat friends with a grudge or a morbid curiosity ;-)
All worms have to execute on the host machine...
The trick is getting it to execute on your machine...
Traditionally, people would would either send you a trojan (any program that pretended to be something it wasn't). The user would run it, and it would appear to do what it was supposed to... except unbeknown to the user, it would also install something nasty (e.g. a worm, or a spying application).
Once people got used to email problems, a few folk discovered that un some circumstances, you could make a webbrowser crash with malformed scripts, damaged web link addresses, or in some cases even malformed html. When this was discovered, people then found out that the way in which the browser crashed caused the browser to start executing code.
This made hackers produce specificially formatted webpages that would crash explorer, and then execute code of their choice... commonly termed 'buffer overrun' errors.
Buffer overrun errors where then carefully sought out in lots of places... especially a nice little feature that Windows offers called 'RPC' Remote Procedure Call. This feature allows computers to share computation by giving one pc some code to execute, that can call up another PC and then ask it do some computation too... basically talking to each other to get the task done. Sadly, this suffered from buffer overrun problems too. This is the exploit that msblaster uses.
msblaster works like this...
it will operate on either a random subnet, or the users subnet.
It will scan tcp port 135 on 20 blocks at a time (incrementally)
If any response is returned from a scan, it will issue an RPC request that will cause a buffer overrun on the destination pc. This will result in an administrative shell being opened on port 4444 talking to the target pc.
The target pc will issue a tftp -1 GET which will basically download the msblast worm from the host pc to the target pc.
Next the START command is issued on the target pc.. and the
infection is complete.
The process is repeated over and over for every infected pc.
The user need only be on the net running a pc that supports RPC (for Windows).
Firewalls are ONLY an aid to security, they are not a guarantee. Many firewalls can be bypassed with incredible ease... firewalls such as Norton, BlackIce, Outpost, Zonealarm etc will be oblivious to http tunneling on port 80 from any trojan in the internet explorer process space.
Fortunately, worms are harder to get through firewalls than trojans are... since worms need to replicate and need to exploit other pc's vulnerabilities on many ports. A trojan (of the spying variety) typically only ever needs to transmit to one location, with a dedicated listener at the other end. Where http tunneling might be expected.
So... keep your firewalls... they don't do any harm. Don't place blind faith in them. You'll be sorely disappointed.
Linux variants have also been found to execute code during bufffer overruns.... in some cases, kernal mode was breached.
there have been so many Linux exploits it's untrue...
The Linux Security Audit Group work their nuts off trying to keep up.
Hardware firewalls are even dumber (arguably).
Erm, the Linux statement... not at all I hold by it entirely.
You cannot make a claim that 'Linux is inherently more secure'. It's not. You cannot readily compare both operating systems as if one were more secure than the other. It's misleading in a big way.
The arguments for Linux being more stable and less prone to security holes is the very same argument used against it... open source for example, for = gets peer review on a grand scale, against = even easier to discover exploits. Security is far more complex than the O/S itself, and both Linux and Windows do rather well. However, they both suffer from different problems, and can't be compared. There's nothing 'inherently' more secure about one than the other... I'd be delighted if you can demonstrate to me an area where this is the case.
The linux lion worm managed to exploit linux as readily as did msblaster on windows.
hi there the best fire wall is zone alarm 2.6 its one of the hardest to get past and also you should run swat it bot remover and trojan tracker
good on you kit kat sex in the great outdoors is great xx lovve jane les go for it