Monday 28 January 2019


PROTECTING YOUR COMPUTER FROM INTERNET INVADERS

Many years ago, a computer programmer improperly got into my computer and changed the text of an article I was preparing.  Years later I learned that can be easily done if you don’t have a good security system in your computer to protect what you put into your computer.

Later I asked a good friend of mine to improve a picture I had placed in my computer. While he was at his home, I watched while at my home what he was doing to make the improvements of the picture I had on my screen. My internet security firm can do the same thing when I have a problem in my internet. It is fascinating to watch their cursor moving about my screen while they are in India. That is because my screen is temporarily showing up on their screen.

It is really scary. That is why I always read my articles I publish in my blog just before I send them into the internet. Once they are in the internet, they can’t change the words in my articles.

Make sure that you have a good security system in your computer to protect what is inside your computer.

I remember years ago, when a picture of naked women kept appearing on my computer screen each day. My security firm stopped whoever was sending me those pictures. I am not a prude but having naked women appearing on my screen when I am writing articles is annoying. If I want to see pictures of naked women, I will bring them up on my screen on my own volition. Obviously I had visited a particular site in the internet and the pictures of naked women hopped into my computer. It was like trains carrying a different naked women getting off at my station (computer) each day.

What is really scary is that if an internet invader inserts child pornographic pictures on your screen while you are in bed asleep and the invader calls the police and when they see the pictures and arrest you, they won’t accept your statement that you don’t know how those pictures got into your computer.  

Cybercrime, or computer-oriented crime, is the crime that involves a computer and the network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones.

Cybercrime may also threaten a person or a nation's security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those that are hackingcopyright infringementunwarranted mass-surveillancesextortion, illegal child pornography, and child grooming. There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. Further. cybercrime can be used to target women with a motive to intentionally harm them psychologically by using modern telecommunication networks such as internet and mobile phones.   

Both governmental and non-state people engage in cybercrimes, including espionagefinancial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation state is sometimes referred to as cyberwarfare.

In 1985, the Canadian delegation attending the Tenth United Nations Congress on the Prevention of Crime held in Milan, Italy, was discussing the problems of abuses taking place in the internet. When it was my turn to address the 194 nations attending the conference, the second of my two speeches was about internet hackers. I gave them a scenario in which a twelve-year-old boy could even get into the computer that controls the sluice gates controlling the water flow of a large dam. that is thousands of miles away.  Several years later, a computer hacker did that but fortunately, the staff operating the dam managed to get control of their sluice gates thereby stopping what could have cause a real  havoc  on the town a couple of miles downstream. I also suggested very, very long prison sentences for internet hackers. Later, I wrote a short story about such an event which was published in a magazine and also in one of my books of short stories.

 Malware   is any software intentionally designed to cause damage to a computerserverclient, or  computer  network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable codescripts, active content, and other software. 

The code is described as computer viruseswormsTrojan horsesransomware,  spyware,  adware and scareware, among other   terms. Malware has a malicious intent, acting against the interest of the computer user however, it does not include software that causes unintentional harm due to some deficiency, which is typically described as a software bug.


Programs officially supplied by companies can be considered malware if they secretly act against the interests of the computer user. For example, Sony sold the Sony rootkit, which contained a Trojan horse embedded into CDs  that silently installed and concealed itself on purchasers' computers with the intention of preventing illicit copying. It also reported on users' listening habits, and unintentionally created vulnerabilities that were then exploited by unrelated malware.


One strategy for protecting against malware is to prevent the malware software from gaining access to the target computer. For this reason, antivirus softwarefirewalls and other strategies are used to help protect against the introduction of malware, in addition to checking for the presence of malware and malicious activity and recovering from such attacks.

The best-known types of malware such as viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent.  

On the other hand, a worm is a stand-alone malware software that actively transmits itself over a network to infect other computers. What can happen to your computer is when someone sends you a message from their computer, they have inadvertently sent you a worm that was already in their computer. Now your computer also has a worm of its own in it. These invaders lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself.

A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and which then usually performs a harmful action (such as destroying data).\ An example of this is a PE infection, that is a technique, usually used to spread malware, that inserts extra data or executable code into your  files.                                           

Screen-locking ransomware is actually a type of cyber police ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee to remove the illegal content such as child pornographic pictures.  Jisut and SLocker impact Android devices does more harm than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.

A Trojan horse is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.            

Trojan horses are generally spread by some form of social engineering, such as, where a user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything as many modern forms act as a backdoor, contacting the person using his or her computer  which can then have unauthorized access to the affected computer. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. That could be a sign that there is a Trojan horse inside of your computer.

Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.

In the spring of 2017, Mac users were hit by the new version of Proton Remote Access Trojan horse that was created and  trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.


Once malicious software is installed on a computer system, it is essential that it stays concealed, to avoid detection. Software packages known as Rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.               

Some types of harmful software contain the ability to evade identification and/or removal attempts to hide themselves. An early example of this behavior occurred when a pair of programs infesting a Xerox CP-V time sharing system took place.

Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (which is very difficult) or to deliberately crash your system which will cause you the loss of whatever you created in your computer.

backdoor  is a method of bypassing your regular normal authentication procedures, usually over a connection to a network such as the Internet. Once a system has been compromised, one or more backdoors may be installed by a hacker in order to allow the hacker access to your computer in the future in which the entry is unknown to you.

The solution has often been suggested that computer manufacturers pre-install backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that the US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed which were  considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, wormsimplants, or by other methods.

Since the beginning of 2015, a sizable portion of malware utilizes a combination of many techniques designed to avoid detection and analysis.

The most common evasion technique is when the malware evades analysis and detection techniques by  fingerprinting  the environment when executed.

The second most common evasion technique is confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware.

The third most common evasion technique is timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it does its stuff during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time.

The fourth most common evasion technique is done by obfuscating internal data so that automated tools do not detect the malware.

An increasingly common technique is inserting adware that uses stolen certificates to disable anti-malware and virus protection, Technical remedies are available to deal with the adware.

Nowadays, one of the most sophisticated and stealthy ways of evasion is to use information hiding techniques, namely stegomalware.

In conclusion, make sure that you have a reliable anti-virus program installed in your computer. And if you get a message stating that your anti-virus contract has expired, renew it again promptly. If you don’t, your computer may end up like the fictitious king who wore no clothes since  your computer will be as bare as that king.

No comments: