Featured

Top 5 Damaging Computer Viruses of all time and prevention

Introduction

In this article we are going to discuss about some computer viruses that are very dangerous for the computer users while browsing internet the user should be very careful. these viruses can be in the form of links or some attracting doodles. Before clicking on the link make sure that the link is safe if you find some doubt don’t click on link.A computer virus is a program that can copy itself and infect a computer without the permission or the knowledge of the user.

A computer virus has two major characteristics the ability to replicate itself and the ability to attach itself to another computer file. How do I know if I been infected virus there are many different symptom of a virus infected computer a few telltale sign that your computer may have a virus include slow response response time random hard drive crashes and extensive pop-up ads.

1. MyDoom

MyDoom has myriad of names including “W32.mydoom@mm” , NOVARG , MIMAIN.R and SHIMGAPI. This computer worm affect Microsoft windows and was first spotted on January 26th 2004 .known as the fastest–spreading e-mail worm to date, the worm is believed to have spread from Russia through the actual location and even creator are unknown. The virus would come in an  e-mail starting “Andy;  I am just doing my job , nothing personal ,sorry”. The virus is another that spam our e-mails and its believed that it was created to target the “SCO Group” as 25 % of the infected hosts targeted www.sco.com in January of 2004 Microsoft offers a reward of $250,000 leading to the arrest of the creator which again has still to be claimed “Mydoom” and its variants are said to have caused $38.5 billion in damages. Making it the worst reported computer worm in history.

Prevention

The easiest way to protect a computer or oneself from computer viruses such as MyDoom is to not open attachments from unknown email addresses. Also, computer security systems should be upgraded and updated regularly and computer activity should be monitored closely on a regular basis.

Many computer viruses by nature are sneaky and new viruses are being created all day, every day. An investment in anti-virus software with a subscription for updates and monitoring is an investment worth making. The cost of avoiding future damage by buying an anti-viral program will cost far less than suffering the consequences of contracting a computer virus or similar problematic program known as malware.

It is important to protect one’s computer by installing and updating anti-viral software programs such as www.safebytes.com.

-Don’t let curiosity kill the computer

2. Slammer Worm

The slammer worm is also called SQL worm, this one being a bit misleading as it did not utilize the SQL language and sapphire worm. The SQL slammer worm forced denial of service on certain internet host’s and exploited a buffer overflow bug in Microsoft’s flagship. SQL server and desktop engine database product which in turn greatly reduce the speed of general internet traffic. It was first notice on January 25th 2003 and spread at an unprecedented speed, infecting most of it’s estimated 75,000 victims within 10 minute of the initial launch and caused roughly $1 billion in damages.

Prevention

The worm can be removed by rebooting an infected system, however that solution does not guard against infection again at a later time. The underlying Server Resolution service buffer overrun flaw exploited by SQL Slammer was first reported in June 2002 and patched in MS02-039. Additional information is available in the SQL Elevation of Privilege patch MS02-061. Systems already patched by installing SQL 2000 Service Pack 3 are not affected. Until a patch can be installed, system administrators may block the following SQL server ports at their firewall/gateway:

ms-sql-s 1433/tcp #Microsoft-SQL-Server
ms-sql-s 1433/udp #Microsoft-SQL-Server
ms-sql-m 1434/tcp #Microsoft-SQL-Monitor
ms-sql-m 1434/udp #Microsoft-SQL-Monitor

Removal
Vendors McAfeeSymantec, and Trend Micro have removal tools available for systems infected with SQL Slammer.

3. Zeus

The Zeus virus also known as ZBOT virus ,it is a malware program that allows someone to construct their very own Trojan Horse. This toolkit was sold across the black market ranging from $3000 to $10000 , as it is so easy to use non-programmers could use to make their own horses successfully . the malware would remain document on the infected users machines until they came across a web with a form of fill out . it gained its major bit of notoriety in 2006 ,as common choice for hackers and criminals to steal online banking credential .the worms built by the Zeus toolkit are so adaptable ,that they are often time overlooked by anti-virus programs and according to a report by Trusteer nearly 77% of all PCs that are infected with Zeus Trojans have current up-to-date anti-virus programs.

Prevention

A few key steps will lower the chance of you getting re-infected with Zeus (or any other virus). Here’s a look at the best methods.

  • Keep your PC up to date. Microsoft frequently releases security updates for your computer. Always keep on top of these. They’re often your first defense from virus threats.
  • Update your antivirus software and malware protection. Similarly, keep your antivirus software and malware protection up to date. New virus definitions are released regularly and these keep your PC informed on what to look for with new virus and malware based threats. 
  • Scan your system on a regular basis. With software installed, you shouldn’t ever be infected with anything, but it’s wise to run regular system scans to double check that nothing got through.
  • Be careful online. Don’t click on links you don’t recognize, and only download files from sites you feel confident about. Never click on pop-up ads. If you see a pop-up that warns of a virus or threat, make sure it’s actually coming from your antivirus software and not from a website you’re browsing. If in doubt – don’t click.

4. Sasser

A slightly newer virus then the one just mentioned those who running windows 2000 and windows XP were vulnerable to the Sasser virus. This virus first notice on April 12th 2004 this worm is yet another that exploits buffer overflow of the LSASS.it begins effecting the effected computers by scanning across different ranges of IP addresses containing to the victims computer via tcp port 445. The overall effect of this virus was Global ,including blocking all satellite communications to Agence France Presse or the APP delta Airlines canceling numerous flights , both the Nordic Insurance company if and parent company Sampo bank hitting a complete halt and closing 130 offices in Finland alone. In the end Microsoft issued a $250,000 bounty reward on the creator, which quickly led to the arrest of 18 year old German computer science student “Sven Jaschan”

Prevention

  • track and kill the worm. To do this:
  • Press control-alt-delete once,
  • Click on task manager
  • Click on the processes tab
  • Shut down all processes with the following names: avserve.exe; or 4 or 5 digits followed by _up.exe (e.g. 74354_up.exe).
  • Exit task manager.

(If you’re running Windows Me or XP, disable the System Restore feature to avoid  the computer from restoring the virus while backing up)

  •  Shut down your computer and disconnect Internet cables or wireless cards.
  • Restart the computer in ‘safe mode,’ by pressing the  F8 key when the screen displays the ‘starting Windows’ text.
  • Go to the Windows Explorer and delete the file AVSERVE.EXE from your WINDOWS directory (typically c:\windows or c:\winnt)
  • Carefully edit the computer’s ‘registry’ to wipe out the worm by
  • Click the ‘start’ button.
  • Click ‘run.’
  • Type REGEDIT and press enter.
  • Use the correct plus signs to get to this folder: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  • In the right pane, delete the value: “avserve.exe”=”%Windir%\avserve.exe”
  •  Exit registry editor by clicking on the x in the top right of the window. (Do this very, very carefully).

Finally, reboot the computer in default mode, connect to the Internet and run one of the tools from the Web sites listed earlier.

Don’t forget to turn on System Restore if you’ve switched it off.

5. Melissa Virus

 Melissa Virus is described  as macro virus, due to the fact that it’s not a standalone program needing another program to be triggered, in this case through Microsoft Word. In march of 1999 David LSmith would introduce this virus on the internet. The macro virus itself however was written by KWYJIBO also known as VICODINES or ALT-F11 . This virus is responsible for millions of dollars in damage due to the disruptive influence it had over so many networks. Infected computers would send out emails in mass to anyone in the local PCs email system. The original came under an email titled “ Important Message From….( Fill in blanks )”, and had managed to infect thousands of computers including those within government agencies. Although the virus would be minuscule today,in 1999 it had a drastic impact on computers world wide.

Prevention

Whether you have antivirus software on your PC, you can disable automatic macro execution in Word 97. Select Tools, Options, General and make sure the “macro virus protection” box is checked.

All major antivirus software companies have updates that handle Melissa. If you are running antivirus software, you should update it immediately. (Direct update links for major makers are at right.)

If you don’t have antivirus software, consider downloading the free trial software offered by many companies.

To make sure that your PC hasn’t been infected by Melissa, go the Trend Micro’s HouseCall site, which will perform a virus check on your PC via the Internet.

5 popular JavaScript libraries

1.jQuery

jQuery is the most popular library on the web today it’s a library of JavaScript function that make it easy for web developer to do common tasks like manipulating the web page , responding to the users event, getting data from their servers building effects and animations and much more. jQuery builds on top of the functionality that browsers give us via the JavaScript DOM API,

There are two versions of jQuery available for downloading:

  • Production version – this is for your live website because it has been minified and compressed
  • Development version – this is for testing and development (uncompressed and readable code)
  • Both versions can be downloaded from jQuery.com

The jQuery library is a single JavaScript file, and you reference it with the HTML <script> tag and (notice that the <script> tag should be inside the <head> section):

<head>
<script src="jquery-3.4.1.min.js"></script>
</head>

2. BackBoneJS

Bckbonejs is an interface used to synchronize various part of a web application and It is written in javascript and depends on underscore.js on javascript library some of the application based on Backbonejs are BitTorrent , Pinterest, LinkedIN mobile, wordpress.com it decouples and helps and maintenance of code Backbonejs provide its users with user interface primitives and that enables minimal data structuring its flexible and easy to use, you can also manipulate data in your application without worrying about propriety there are no drawbacks to the performance it doesn’t run loops avoid two-way binding and provides a lot of plugins and extension it also connects ones existing APIs to Backbonejs plateform using RESTFULL JSON interface.

Here is the simple example that contains all the libraries that you’ll need (jQuery, Underscore.js, Backbone.js and Backbone-localStorage.js) and the placeholders for your HTML and JS code.

<!DOCTYPE html>
<html>
<head>
  <meta charset="UTF-8">
  <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
  <title>Hello World in Backbone.js</title>
</head>
<body>
  <!-- ========= -->
  <!-- Your HTML -->
  <!-- ========= -->

  <!-- ========= -->
  <!-- Libraries -->
  <!-- ========= -->
  <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js" type="text/javascript"></script>
  <script src="http://cdnjs.cloudflare.com/ajax/libs/underscore.js/1.3.3/underscore-min.js" type="text/javascript"></script>
  <script src="http://cdnjs.cloudflare.com/ajax/libs/backbone.js/0.9.2/backbone-min.js" type="text/javascript"></script>
  <script src="http://cdnjs.cloudflare.com/ajax/libs/backbone-localstorage.js/1.0/backbone.localStorage-min.js" type="text/javascript"></script>  
  
  <!-- =============== -->
  <!-- Javascript code -->
  <!-- =============== -->
  <script type="text/javascript">
    // your JS code goes here
  </script>
  
</body>
</ht

3.D3.JS

D3.js is a JavaScript library that combines visualization and interaction techniques with a data-driven approach to DOM manipulation, allowing users to create the right visual interface for their data.

D3 allows you to bind arbitrary data to a Document Object Model (DOM), and then apply data-driven transformations to the document. For example, you can use D3 to generate an HTML table from an array of numbers. Or, use the same data to create an interactive SVG bar chart with smooth transitions and interaction

  1. Visit the D3 website: https://d3js.org
  2. Download the latest version of d3 (d3.zip). (At the time of writing this chapter, the latest version is 4.6.0.)
	<!DOCTYPE html>
	<html lang="en">
	<head>
	    <script src="../d3.min.js"></script>
	</head>
	<body>
	
	<script>
	    // write your d3 code here.. 
	</script>
	</body>
	</html>


4.React

React is a javascript library created by FACEBOOK that lets us build dynamic user interfaces. Lets say that we have a web app with three timers on it we have the ability to create and delete a timer when you click on a button to create a timer a form will pop up what feels free to out and when you hit enter that app will create that timer for you when you decide to delete a timer if you click the delete button the timer will remove itself from the page that is called a dynamic user interface.

React is created because the Facebook development team wanted a better way to structure JavaScript applications and the react is allow to reuse the component and the component are huge part in react , component let you split your code into separate independent reusable pieces  

  • React requires Nodejs. If you don’t have Nodejs on your computer, you can download it from here.
  • After installing Nodejs, open your Terminal or Command Prompt and type the following command to create your React app:
npx create-react-app my-appcd my-app
  • Finally, type npm start and the application should start on your localhos

React has a few different kinds of components, but we’ll start with React.Component subclasses:

class ShoppingList extends React.Component {
  render() {
    return (
      <div className="shopping-list">
        <h1>Shopping List for {this.props.name}</h1>
        <ul>
          <li>Instagram</li>
          <li>WhatsApp</li>
          <li>Oculus</li>
        </ul>
      </div>
    );
  }
}

5.Vue.js

Vue.js is a javascript framework that makes the creation of JavaScript driven web app running in the client in the browser easier let’s take a closer look we have the client and browser and we have a server we send a request and we visit a page and we get back to some html pages with the content of the pages now if we don’t think about the client here as desktop but as a mobile phone and we consider a real mobile app downloaded from the app store the app is highly engaging because it has near instant response and no page reload everything happening vary quickly , and by using vue.js we can create the highly responsive web app

Javascript Is the only language running on the browser after the page has been loaded so we can use it to control parts of the page and change them after the has been loaded without sending a new request which gives us a nice user experience VUE.JS helps us with that and makes that easier so VUE.JS is about simplifying stuffs. It’s a collection of tools and it allows to react events ,handle user input update UI dynamically. It create an engaging Front-End with JavaScript without any problem.

The easiest way to try out Vue.js is using the JSFiddle Hello World example. Feel free to open it in another tab and follow along as we go through some basic examples. Or, you can create an index.html file and include Vue with:

<!-- development version, includes helpful console warnings -->
<script src="https://cdn.jsdelivr.net/npm/vue/dist/vue.js"></script>
or:
<!-- production version, optimized for size and speed -->
<script src="https://cdn.jsdelivr.net/npm/vue"></script>

At the core of Vue.js is a system that enables us to declaratively render data to the DOM using straightforward template syntax:

<div id="app">
  {{ message }}
</div>

var app = new Vue({
  el: '#app',
  data: {
    message: 'Hello Vue!'
  }
})

Introduce Yourself (Example Post)

This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right.

You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the “New Post” button, and tell us why you’re here.

Why do this?

  • Because it gives new readers context. What are you about? Why should they read your blog?
  • Because it will help you focus you own ideas about your blog and what you’d like to do with it.

The post can be short or long, a personal intro to your life or a bloggy mission statement, a manifesto for the future or a simple outline of your the types of things you hope to publish.

To help you get started, here are a few questions:

  • Why are you blogging publicly, rather than keeping a personal journal?
  • What topics do you think you’ll write about?
  • Who would you love to connect with via your blog?
  • If you blog successfully throughout the next year, what would you hope to have accomplished?

You’re not locked into any of this; one of the wonderful things about blogs is how they constantly evolve as we learn, grow, and interact with one another — but it’s good to know where and why you started, and articulating your goals may just give you a few other post ideas.

Can’t think how to get started? Just write the first thing that pops into your head. Anne Lamott, author of a book on writing we love, says that you need to give yourself permission to write a “crappy first draft”. Anne makes a great point — just start writing, and worry about editing it later.

When you’re ready to publish, give your post three to five tags that describe your blog’s focus — writing, photography, fiction, parenting, food, cars, movies, sports, whatever. These tags will help others who care about your topics find you in the Reader. Make sure one of the tags is “zerotohero,” so other new bloggers can find you, too.

Design a site like this with WordPress.com
Get started