Monday, March 17, 2008

Virus Strains

This & 39;, we must & c 39, is the Dewey Decimal to switch ...
Specifically someone a & 39; needs forsake their guard in what order it in the logic of how the virus to be sorted.
Recently, to the warnings of the Kama Sutra virus multiply quickly Cyberspace, & 39; accession to & 39; Grew.A and Nyxem.E as a serious threat to the security of the files. But only those who deal with these stem cells were able to discover that & 39; all have something in common.
They virtually the same virus.
There a single library in the world, if it is & 39; applies catalogging the millions of books contained therein, by Dewey. The weather service administrators personification their bit for breathing a little charm in the tropical storms & 39; abject its track in the awarding of names in the alphabetical order of & 39, each year. They key, of this practice, c & 39; is that someone is a & 39; designed a universal d & 39; identify something with the public to meet.
The fast times when someone needs a & 39 d & 39; go l & 39; before and put & 39, a little order in the world of Computer & 39; cheeky infections.
New virus can make, if suddenly, and for the expansion at a pace as those whose work is, after and between them to destroy the little time for the Muses, which should be appointed. With Dama Sutra, for example, the destruction of its folder program seemed about junk e-mail seductions of visiting pornographic websites. The media have contributed to this topic and gave it a catchy title manipulate; Kama Sutra, of course, the legendary love guide compiled by the creativity of the old Hindu hedonism.
Geeks however, have their own position, if it is a spin on things. How the banks must have stately names, spyware, apparently for the performance & 39; matrix as the title, in which more dark, more & 39; fear and a worthy challenge. After all, who among them do not want to cancel, the Kama Sutra? N & 39; you do not want to confirm that the images & 39 d & 39, a cyber-geek Eunuch?
Thus, titles like Grew.A and Nyxem.E be forged to look much bigger and need professional help & 39; to eliminate.
F-Secure is a hunter, and the Finnish virus broadly welcomed with applause as & 39, one of the best of its kind on the market. Their stature is such that when they identify a program, intrusive, d & 39; other opinions and & 39; the name & 39; that they give him. In this case, F-Secure on the code-sharing with certain techniques and files destructive predecessors, they found the Nyxem.E, derived from & 39; l & 39; acronym of the Mercentile Exchange in New York, whose Web site was targeted with the first guilty.
Other seller notes that the program destroyed the files, instead of overloaded, with the wrong sites. Using d & 39, a logic known only in a & 39; l & 39; Back store dwarfs their service, which means that & 39 ; Grew.A & 39; was the most appropriate. I can only think that the fact that a clarification of this decision would most d & 39; between us so hard on the head as an attempt to delete the program once they & 39; proposed our computers.
Anyway, in these times of terrorism alerts, if nobody else & 39; n & 39; willing & 39; acceptable task for the classification of viruses, the rock and Sweepers releveurs cobweb to l & 39, US Department of Homeland Security, are prepared in the arena & 39;. They have a system for naming of viruses by the Common Malware Enumeration, or FMC. The outbreaks are a random number, which in this case proved to be & 39; 24 & quot;.
We & 39; ll see if such a system begins l & 39; imagination of the audience.
This is an important point, because if a uniform system d & 39; identification of the virus in order to be effective, it has to immediately raise the awareness that the general spread of viruses can be better.
If nothing else & 39;, & quot; Kama Sutra & quot; generated enough clicks to get quickly that the word & 39; an Internet intruders was on the prowl. After the appointment, as such, a program that was in the traffic during the week, but was to destroy files on the third day of each month, finally came into & 39; attention of the public. The seller to us the time that their products and warn customers.
Incidentally, this strain is known for the bribery of documents with the help of the common file types, including & quot;. Doc & quot;, & quot;. Pdf & quot; and & quot;. Zip & quot;. It affects most versions of the Microsoft operating system Windows d & 39; what caused them, which is one more warning of the problem.
Given recent full & 39; animosity anti-trust any of the US government against the software giant, it seems that their efforts to promote public awareness of this & 39; need to virus that which & 39; They will proverbial strange household.
It appropriate that the only thing named Kama Sutra to collect. It is inevitable that & 39; they are in this position. The task now is for them --- --- and everyone else to hear & 39 n, which & 39; must call. chauncey geoffrey



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

No comments: