This page spots MALWARE, for your eyes only, to help you get rid of it from its roots.
It provides details about the origins of the following dangers:
Malware Dabber in,
MyDoom in,
Sasser server in, and...
some other prompts
I have captured several hundreds of internet security threat prompts to attack my system by virus. Thanks to my RADAR, it sends them to hell when they attack. However, I have registered hundreds of them at my Blog. Look to take care of them.
The page with its relevant links does all of that and disclose them to help you protect your computer and your family life, while using your computer and working at home.
You can also spot dangerous IP locations easily through the linked pages using the "How to Security" in this network.
So, expect this page to build itself gradually. Just keep watching the blog and add to it using the comment form below. You can help people by providing information about those dangerous software and viruses.
My RADAR sent me an alert 20 minutes ago while I was reading my mails. The RADAR captured a mal-ware strike attempt and blocked the source. I have scanned my mails to take the following notes and details about the destinations and origins of the threats.
I read some silly subject-lines like the following:
Biggest Discount
Cartier Watches
Up to £1000 Free Bonus
Spend your night with blue
Get Your Free NFL Game Tracker
Adobe Photoshop cs3 extended Our price: $89
Lige fra hjertet af Europas fA, rende netkasino
Cialis and Viagra Directly from Authentic Manufacturer
So, I just wrote the information needed to publish a page about malware in a sheet of WordPad to get to it later and continued to spot the rest of the threats, you will read here.
This page will get you through to take action to save your computer and maintain your personal security at home.
Hundreds of malware are exposed, thanks to my RADAR. Here are some of those Mal-ware by IP addresses.
In the log files, I found all the following information, my RADAR has captured during the attacks' attempts:
** Direction: Inbound
Protocol: tcp
Services: MyDoom in
Remote address: 212.227.23.158
Remote port: 57283
DNS name: p15168073.pureserver.info
** Direction: Inbound
Protocol: tcp
Services: Malware - MyDoom in
Remote address: 69.13.230.1
Remote port: 3856
DNS name: 1-230-13-69.cust.propagation.net
** Direction: Inbound
Protocol: tcp
Services: Malware - Dabber in
Remote address: 222.147.4.102
Remote port: 2807
DNS name: p3102-ipbf1007hodogaya.kanagawa.ocn.ne.jp
** Direction: Inbound
Protocol: tcp
Services: Malware - MyDoom in
Remote address: 91.121.121.111
Remote port: 64451
DNS name: ks355373.kimsufi.com
** Direction: Inbound
Protocol: tcp
Services: Malware - MyDoom in
Remote address: 85.84.112.90
Remote port: 3288
DNS name: 90.85-84-112.dynamic.clientes.euskaltel.es
** Direction: Inbound
Protocol: tcp
Services: MyDoom in
Remote address: 69.182.111.5
Remote port: 2215
DNS name: 69.182.111.5.adsl.snet.net
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote address: 222.141.50.175
Remote port: 1690
DNS name: hn.kd.ny.adsl
** Direction: Inbound
Protocol: tcp
Services: Malware - Sasser server in
Remote address: 125.203.163.149
Remote port: 1026
DNS name: i125-203-163-149.s02.a010.ap.plala.or.jp
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote address: 218.102.110.124
Remote port: 9898
DNS name: pcd578124.netvigator.com
** Direction: Inbound
Protocol: tcp
Services: MyDoom in
Remote address: 122.116.17.119
Remote port: 10625
DNS name: 122-116-17-119.HINET-IP.hinet.net
** Direction: Inbound
Protocol: tcp
Services: MyDoom in
Remote address: 212.227.23.158
Remote port: 57283
DNS name: p15168073.pureserver.info
** Direction: InboundProtocol: tcp
Services: Sasser server in
Remote address: 217.87.88.16 (DE) Germany
Hamburg, Hamburg, Deutsche Telekom Ag
Remote port: 4411
DNS name: pD9575810.dip.t-dialin.net
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote address: 89.170.59.92
Remote port: 4076
DNS name: 92.59.170-89.rev.gaoland.net
Direction: Inbound Protocol: tcp
Services: MyDoom in
Remote address: 122.116.17.131
Remote port: 10804
DNS name: 122-116-17-131.HINET-IP.hinet.net
** Direction: Inbound Protocol: tcp
Services: Dabber in
Remote address: 86.205.50.191
Remote port: 4722
DNS name: ASt-Lambert-153-1-91-191.w86-205.abo.wanadoo.f
** Direction: InboundProtocol: tcp
Services: MyDoom in
Remote address: 218.10.111.119
Remote port: 12200
Description: Inbound malware probe
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote port: 4007
Remote address: 219.162.171.77
DNS name: p6077-ipad25osakakita.osaka.ocn.ne.jp
ISP: Open Computer Network
Remote Address: 219.91.68.9
** MyDoom in
Remote Port: 5780
DANS Name: NK 219.91.68.9.adsl.dynamic.apol.com.tw
Description: Inbound malware probe
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote port: 6500
Remote address: 64.40.242.100
Description: Inbound mal-ware probe
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote port: 64111
Remote address: 60.27.64.153
DNS name - www153.ads.tj.cn
Description: Inbound malware probe
** Direction: Inbound
Protocol: tcp
Services: Dabber in
Remote port: 2308
Remote address: 221.125.19.142
** Subject: F-Secure Radar Level 2 Alert
Details: Zhelatin.CQ email worm started spreading late on April 8th, 2007. The worm spreads in e-mails with war-related subjects and several different attachment names.
** Radar Alert - Level 2
Subject: Information on a worm exploiting the "ANI" vulnerability.
Details: An internet worm using the new zero-day ANI exploit has been found. It modifies HTML pages to contain a link to a malicious ANI file. It also tries to spread via USB sticks and Chinese-language emails.
In addition to malware, you may also be interested in the articles in the Ezine Acts Web Security (site map 24), along with the articles in the Ezine Acts Internet Marketing (site map 20) and the Ezine Acts Articles (site map 9 A), with its extension into Ezine Acts Articles Section (site map 9 B), Ezine Act Articles Index (site map 9 C), Ezine Articles (site map 9 D), Submit Articles (site map 9 E) and Submit Ezine Articles (site map 9 F):
Beware of Add-ons| Internet Security News| Leads Generating| No One Cares of Privacy Nowadays| Online Security| Privacy|
If you found the security information on Malware useful, please tweet and like it using the small buttons at the top and the bottom of the page. Pin one of the Ezine Acts Pictures at the Ezine Acts Galleries, Ezine Acts Photo Gallery and Pictures for Your Website. Thank you.
The Solo Build It website building tools on the image below are all combined in one place to help you learn and build a home based business and secure it to improve your life. They empower this page about malware and the entire of Khalid Osmans Network at the Ezine Act, Politics, Business and Love and update it automatically at the Ezine Act Blog.
They also empower other sites at HOA Political Scene, 100 Beautiful Sites in the World and iwatchbestv.com.
© All rights reserved. HOME-BIZ-TRENDS.COM is one of Khalid Mohammed Osman's Networks.