TRENDING NEWS

POPULAR NEWS

Help Isolating A Mouse Affecting Computer Virus

Is it possible to get malware from a infected computer on the same wifi?

Yes. (But don't worry about it happening unless you're in charge of security at a company that operate a wireless network with direct access to business infrastructure or many other wireless clients.)Let's take a look at a couple scenarios where you can get infected. In all my scenarios, wireless client isolation is not enabled. (When it's enabled, wireless clients can't talk directly to each other. Not all routers support this feature.)Scenario 1:There are two computers on the wireless network. Computer A is clean, but severely outdated. Computer B was in the same state, until that computer visited a website that utilised a drive-by exploit kit. Computer B is now infected with a worm that attempts to infect any other computer on the wireless network, including Computer A. This happens automatically and the users of Computer A and Computer B are likely not noticing that they got compromised.Scenario 2:Instead of a worm, Computer B is compromised with a trojan that the attacker can access. The attacker creates a tunnel and pivots into your wireless network / WLAN over the Internet (via Computer B), and then identifies outdated and insecure Computer A on the network, which the attacker uses an exploit against.Scenario 3: Both computers are clean and up to date. Computer B is tricked into installing a Java applet or Executable file. Computer A is compromised through e.g. password reuse (cached passwords, or PTH attacks), or in a scenario as seen below.Scenario 4:Both computers are clean and up to date. The attacker is not on the Internet, but nearby the wireless network. After finally cracking the weak wireless password, the attacker (Computer C) associates with (i.e. logs on to) the wireless network. The attacker performs an ARP spoofing attack and redirects Computer A and B to maybe drive-by exploit kits, or modified versions of e.g. Facebook that prompts them to download an executable file which contains a trojan. Computer A and Computer B are now infected.I think that I'll hold off any other possible scenarios for now.

What makes it so difficult to create a completely protected computer system from virus attacks or hacking?

Bits and interpreters.So the main issue is that it’s very hard for a machine itself to distinguish between ‘good’ and ‘bad’. In fact, there’s only rote mechanical operations done by the CPU, altering its own state (registers), and external memory or I/O devices. So for the machine itself, things are just mechanical calculation on data. The computer doesn’t know anything of the things it does, or where they lead to.It probably comes down to fundamentals of the level of isolation, usefulness, and the definition of a ‘system’. If you have a completely isolated and electromagnetically shielded computer running somewhere, so that it’s not possible to swap any memory (RAM) contents from at-a-distance, and it originally runs a software that is fully known and trusted, you have a secure system. When you open intentional or accidental open “access vectors”, ie. data buses - that enable data flow between physical components - or when you open network interfaces, you inevitably introduce the possibility of the machine accepting a piece of data or code that somehow ends up being interpreted. An interpreter expands the power and usefulness of a computing system, but it almost inevitably also introduces the possibility for malicious activity.

Can you get a virus on your virtual machine that will infect your main computer?

Yes, this is called a “hypervisor escape vulnerability”. These are rare, because it is the worst nightmare for a hypervisor development team, so they work hard to avoid the kind of coding that leads to this kind of escape. Of course no-one is perfect; the Xen hypervisor had a couple of these in the past year with the most recent being this: Xen Patches 'Worst'-Ever Virtual Machine Escape VulnerabilityA 2014 Xen escape vulnerability was exploitable in a floppy disk driver that no-one had looked at for years: XSA-108 - Xen Security AdvisoriesKVM has had escape vulnerabilities too. VMware ESXi had a “denial of service” vulnerability where certain carefully crafted VM host names would crash the hypervisor — no escape, but it did mean an attacker could arbitrarily deny service to all VMs hosted on the same physical server, which is a very serious problem in a cloud service.

If I use a virtual PC to access the Internet, and it gets infected with malware, is there any risk that the host PC will be infected?

Yes.  A lot of Virtual PCs have tools ("guest additions") that make is easy to access the host PC.  If you mount directories on the host from the guest, the malware can reach the host the same way it could reach network shares.In the absence of add-ons, the hypervisor provides isolation of the host from the guest. However, if there are hypervisor bugs that the malware can exploit, the infected guest can manipulate the host.  I am not aware of any instances of such exploits experienced in the wild.Some malware will disable itself when it detects a VM in order to thwart anti-malware researchers.  See: Information Security

If my dog bit a field mouse would she b ill?

She is up to date with all of vaccinations especially her rabies. Is it just me bcuz she has been acting strange, like barking at us & snapp'n...???? She is a shih-tzu

Are there really fewer viruses on Macs than on Windows?

Yes. Virus and Malware developers will code their trojans for Windows as it’s the more popular Operating System. Macs still get the same viruses, but as they’re coded for Windows; they won’t affect a Mac.There is still the chance to infect other devices. So even if your mac doesn’t show signs of being infected; you could be infecting other devices on your network. This is why backups for your devices are so important. I backup my PC’s with Rollback Rx and my Mac with Time Machine.

How is animal testing relevent to the wider community?

this site tells of the pros and cons> http://en.wikipedia.org/wiki/Animal_test...

These are articles to show the importance of animal testing> http://www.writefix.com/argument/animalt...
http://www.writefix.com/argument/animalt...

Why is Tencent Gaming Buddy when there is PUBG Windows?

tencent gaming buddy is an emulatorfor running pubg androidbro not all people hav high end pcand also its very frustrating for some playersTo tilt the screen to change the viewing anglesAlso lots of ppl are playing pubg mobile using other emulators as well(Emulator players get matched to emulator players according to tencent)And pubg is 1000rsWhile pubg mobile is free

TRENDING NEWS