· Klez is a computer worm that propagates via e-mail. It first appeared in the end of 2001. A number of variants of the worm exist.
· Klez infects Microsoft Windows systems, exploiting vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.
· The e-mail through which the worm spreads always includes a text portion and one or more attachments.
· The text portion consists of either an HTML internal frame tag which causes buggy e-mail clients to automatically execute the worm, or a few lines of text that attempt to induce the recipient to execute the worm by opening the attachment (sometimes by claiming that the attachment is a patch from Microsoft; sometimes by claiming that the attachment is an antidote for the Klez worm).
· The first attachment is always the worm, whose internals vary.
· Once the worm is executed, either automatically by the buggy HTML engine or manually by a naive user, it searches for addresses to send itself to.
· When it sends itself out, it may attach a file from the infected machine, leading to possible privacy breaches.
· Later variants of the worm would use a false from address, picking an e-mail address at random from the infected machine's Outlook or Outlook Express address book, making it impossible for casual observers to determine which machine is infected, and making it difficult for experts to determine anything more than the infected machine's Internet Service Provider.
What happens if you open the virus?
If you open the virus and your computer gets infected, it not only looks in your address book for additional email address, it also checks files such as temporary internet files for addresses.
What else?
….Your computer starts sending the virus out to those people. It does this WITHOUT your knowledge.
This is the HTML I used:
http://en.wikipedia.org/wiki/Klez_(computer worm)
http://www.dianestreasures.com/virus.html
Comparing Klez to Macro
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
The difference between Klez and Macro is that Klez is a worm which attacks internet stuff but unlike macro attacks programs like Microsoft word in its own language.
HTML: http://en.wikipedia.org/wiki/Macro_virus_(computing)
VIRUS CHECKING SOFTWARE McAfee
The company was founded in 1987 as McAfee Associates, named for its founder John McAfee. McAfee was incorporated in the state of Delaware in 1992. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. In 2004, a major restructuring occurred. In the spring, the company sold its Magic Solutions business to Remedy, a subsidiary of BMC Software. In the summer of 2004, the company sold the Sniffer Technologies business to a venture capital backed firm named 'Network General' - the same name as the original owner of Sniffer Technologies. Also, the company changed its name back to McAfee to reflect its focus on security-related technologies.
Among other companies bought and sold by McAfee (formerly known as Network Associates) is Trusted Information Systems, which developed the Firewall Toolkit, which was the free software foundation for the commercial Gauntlet Firewall, which was later sold by McAfee to Secure Computing Corporation. Network Associates, as a result of brief ownership of TIS Labs/NAI Labs/Network Associates Laboratories/McAfee Research, was highly influential in the world of Open Source software, as that organization produced portions of the Linux, FreeBSD, and Darwin operating systems, and developed portions of the BIND name server software and SNMP version 3.
The 2009 version costs $23.49
Subscribe to:
Post Comments (Atom)

No comments:
Post a Comment