<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pacific LANWorks Pte Ltd - System/Network Integrator, Accounting, HelpDesk Support &#38; Maintenance &#187; malware</title>
	<atom:link href="https://www.pacificlanworks.com/tag/malware/feed" rel="self" type="application/rss+xml" />
	<link>https://www.pacificlanworks.com</link>
	<description>Singapore&#039;s network and system integrator and solution provider for small businesses</description>
	<lastBuildDate>Thu, 26 Mar 2020 12:26:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Malicious Worm Hiding In PDF File Send In Spam Mails</title>
		<link>https://www.pacificlanworks.com/news/malicious-worm-hiding-in-pdf-file-send-in-spam-mails</link>
		<comments>https://www.pacificlanworks.com/news/malicious-worm-hiding-in-pdf-file-send-in-spam-mails#comments</comments>
		<pubDate>Fri, 30 Apr 2010 07:15:19 +0000</pubDate>
		<dc:creator>Pacific LANWorks</dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">http://pacificlanworks.com/?p=777</guid>
		<description><![CDATA[We've detected a spam attack today that spreads as an email and tricks our customer into opening a malicious PDF file, which in tandem with an embedded VBScript may penetrate a victim’s computer and drop a so-called WORM and rootkit components. ]]></description>
				<content:encoded><![CDATA[<p>We&#8217;ve detected a spam attack today that spreads as an email and tricks our customer into opening a malicious PDF file, which in tandem with an embedded VBScript may penetrate a victim’s computer and drop a so-called WORM and rootkit components.</p>
<p>The WORM component spreads through computer devices that are detected by infected systems and will automatically execute an autorun.inf file as soon as a user activates an infected device. In addition, the malware deploys a stealth technique by using a rootkit component to prevent itself from being discovered.</p>
<p>The main payload of this attack is an URL to establish a connection to a malicious website that may enable cyber-criminals to gather information and to further compromise an infected system.</p>
<p>If you have receive such an email, please delete the mail without opening the attachment. If you suspect your system is already infected or you have already open the attachment and not sure whether your system is infected, please <a href="http://pacificlanworks.com/contact-us" target="_blank">contact us</a> so that we can schedule our technician to check your system.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.pacificlanworks.com/news/malicious-worm-hiding-in-pdf-file-send-in-spam-mails/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computer Virus Masqueraded As UPS And DHL Delivery Failure</title>
		<link>https://www.pacificlanworks.com/general/computer-virus-masqueraded-as-ups-and-dhl-delivery-failure</link>
		<comments>https://www.pacificlanworks.com/general/computer-virus-masqueraded-as-ups-and-dhl-delivery-failure#comments</comments>
		<pubDate>Fri, 15 Jan 2010 07:57:57 +0000</pubDate>
		<dc:creator>Pacific LANWorks</dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[avg]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[spyware]]></category>

		<guid isPermaLink="false">http://pacificlanworks.com/?p=683</guid>
		<description><![CDATA[Since I'm receiving these emails, I'll presume that everybody will be receiving too, either sooner or later, but definitely will be, and therefore I'm writing this post to alert everybody about it. Please ensure that  your system is protected with an anti-virus software  and that it is updated to the latest version with the latest virus definition file.]]></description>
				<content:encoded><![CDATA[<h2>The Morning Ritual</h2>
<p>During my daily morning working ritual, that is, clearing emails, answering queries, replying to <a href="http://pacificlanworks.com/go/delsonmoo-twitter" target="_blank">Twitters</a> and checking out my <a href="http://pacificlanworks.com/go/delsonmoo-facebook" target="_blank">Facebook</a> account, all done with multiple windows on my 2 laptops and 3 screens using Synergy, an email from UPS suddenly caught my attention and all work was put on hold to check out this email. I&#8217;m usually a multi-tasker (who&#8217;s not), but in this case, nothing is more important than to read this email.</p>
<h2>What&#8217;s The Story?</h2>
<p>The reason why it gets my 100% attention is because we&#8217;ve recently help a customer to dismantle their server appliances from their Singapore office and ship them to their Belgium office, using UPS as our courier service. That job alone cost around S$4,900 for the shipping fees and the cargo itself is estimated to be around S$90,000. We almost make a loss for this job because another vendor who estimates the weight of the cargo for us miscalulated the total weight by a difference of over 90kg, meaning that the buffer charges we impose on the customer plus our profits have almost all gone down the drain, and if includes the manpower to do the migration, this definitely is a loss job. Any hiccups for this shipping is therefore not tolerated and that&#8217;s why my heart sinks and my mind froze when I read the first sentence from the email.</p>
<h2>What&#8217;s In The Mailbox?</h2>
<p>For your viewing pleasure, I&#8217;ve pasted the image of the email below:-</p>
<div id="attachment_684" class="wp-caption aligncenter" style="width: 510px"><img class="size-full wp-image-684" title="Computer Virus Masqueraded As UPS And DHL Delivery Failure" src="http://pacificlanworks.com/wp-content/uploads/2010/01/ups-email.png" alt="Computer Virus Masqueraded As UPS And DHL Delivery Failure" width="500" height="361" /><p class="wp-caption-text">Computer Virus Masqueraded As UPS And DHL Delivery Failure</p></div>
<p>If you can&#8217;t see it, below is the exact mail from &#8220;UPS&#8221;:-<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<blockquote><p>Hello!</p>
<p>The courier company was not able to deliver your parcel by your address.<br />
Cause: Error in shipping address.</p>
<p>You may pickup the parcel at our post office personaly!</p>
<p>Please attention!<br />
The shipping label is attached to this e-mail.<br />
Please print this label to get this package at our post office.</p>
<p>Please do not reply to this e-mail, it is an unmonitored mailbox.</p>
<p>Thank you.<br />
United Parcel Service of America.</p></blockquote>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p>If you are in my shoe, will your heart pound fast and your brain starts to go berserk when you see this email?</p>
<p>Congrates if you don&#8217;t, you have a very steady heart <img src='https://www.pacificlanworks.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<h2>What&#8217;s The Give?</h2>
<p>Thanks to my years of training as a I.T. professional, I&#8217;m able to recollect myself and start to think and work logically after the initial shock. The few things I noticed amissed are:-</p>
<ol>
<li>The email was send to me via my delson(at)pacificlanworks.com account, which I immediately knows something was wrong because our UPS account is not linked to this email!</li>
<li>I&#8217;ve corresponded with UPS multiple times before and the format and structure of this email seems not to be the same as those I&#8217;ve received from UPS previously.</li>
<li>The tracking number seems to be shorter than usual for UPS, again, this is based on our frequent shipping experience with UPS itself.</li>
</ol>
<p>With these 3 doubts that I have, I begin to suspect this is more of a rogue email rather than a legitimate one. I blew a breather and starts to relax myself a bit. At least right now I can &#8220;rest in peace&#8221; knowing that nothing was wrong with my recent shipping ;p</p>
<h2>Don&#8217;t Do This At Home</h2>
<p>It&#8217;s been a long while since I&#8217;ve gotten myself so exited, especially receiving any official email from anybody, I decided to kill my curiosity cat and open the attachment.</p>
<p>By doing so, I can learn more about this type of fraudulent email and secondly, to test my new version of <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG Internet Security</a> software <img src='https://www.pacificlanworks.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>I look for my AVG icon on my bottom-right taskbar and double-click to open it and make sure it is updated and running properly. This is especially important because what I am going to attempt to do will have a very avast result if my <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG Internet Security</a> software is not running properly.</p>
<p>I double-click on the attachment (please be reminded again NOT to attempt this action if you are not prepared for any disastrous result and if your data are not backed up) and the zip file was opened to show an .exe file embedded in it. See image below:-</p>
<div id="attachment_685" class="wp-caption aligncenter" style="width: 510px"><img class="size-full wp-image-685" title="Rogue .exe File In Email Attachment From UPS" src="http://pacificlanworks.com/wp-content/uploads/2010/01/ups-attachment.png" alt="Rogue .exe File In Email Attachment From UPS" width="500" height="363" /><p class="wp-caption-text">Rogue .exe File In Email Attachment From UPS</p></div>
<p>When I double-click on the .exe file, AVG kicks in and flagged it as a trojan and immediately blocked the access to the file and safely quarantined it away from me.</p>
<p>Well, this proves that my hunch was correct and that my <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG Internet Security</a> software is working fine too.</p>
<p>I then delete this email from UPS and pops comes the next email from DHL, same format, same structure. See below:-</p>
<div id="attachment_686" class="wp-caption aligncenter" style="width: 510px"><img class="size-full wp-image-686" title="Fraudulent Email From DHL Regarding Shipping Failure" src="http://pacificlanworks.com/wp-content/uploads/2010/01/dhl-email.png" alt="Fraudulent Email From DHL Regarding Shipping Failure" width="500" height="360" /><p class="wp-caption-text">Fraudulent Email From DHL Regarding Shipping Failure</p></div>
<p>Even the attachment contains the same type of .exe file too, see below:-</p>
<div id="attachment_687" class="wp-caption aligncenter" style="width: 510px"><img class="size-full wp-image-687" title="Fraudulent Email Attachment From DHL Regarding Shipping Failure" src="http://pacificlanworks.com/wp-content/uploads/2010/01/dhl-attachment.png" alt="Fraudulent Email Attachment From DHL Regarding Shipping Failure" width="500" height="362" /><p class="wp-caption-text">Fraudulent Email Attachment From DHL Regarding Shipping Failure</p></div>
<p>Since I&#8217;m receiving these emails, I&#8217;ll presume that everybody will be receiving too, either sooner or later, but definitely will be, and therefore I&#8217;m writing this post to alert everybody about it. Please ensure that  your system is protected with an anti-virus software  and that it is updated to the latest version with the latest virus definition file.</p>
<h2>Which AntiVirus Software I recommend?</h2>
<p>For me, I&#8217;ll recommend <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG software </a>(almost 95% of our customers are using AVG software and some has already renewed it twice since their first usage.)</p>
<p>Do note that <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG software</a> comes with 2 years subscription and when my customer has renewed it twice, it means that they have been using it for more than 4 years already.</p>
<p>If  you are having a  little budget problem, feel free to download your free copy of <a href="http://pacificlanworks.com/recommend/avg-free-version" target="_blank">AVG Anti-Virus Free Edition 9.0</a>. There is absolutely no charge for this edition of AVG software but do note that this is just an antivirus software and do not have any firewall or antispyware to protect your system.</p>
<p>Alternatively, you can get <a href="http://pacificlanworks.com/news/free-mcafee-internet-security-software-for-all-facebook-users-675.html" target="_blank" class="broken_link">FREE McAfee Internet Security software</a>, which includes firewall and antispyware, with <a href="http://pacificlanworks.com/news/free-mcafee-internet-security-software-for-all-facebook-users-675.html" class="broken_link">FREE 6 months of subscription just by becoming McAfee&#8217;s Official Facebook Fan</a>.</p>
<p>Whichever you choose is not important, they are all great software, as long as you MUST choose one and get it installed in your system will do.</p>
<p>Good luck and have a great day.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.pacificlanworks.com/general/computer-virus-masqueraded-as-ups-and-dhl-delivery-failure/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Free McAfee Internet Security Software For All Facebook Users</title>
		<link>https://www.pacificlanworks.com/news/free-mcafee-internet-security-software-for-all-facebook-users</link>
		<comments>https://www.pacificlanworks.com/news/free-mcafee-internet-security-software-for-all-facebook-users#comments</comments>
		<pubDate>Wed, 13 Jan 2010 11:22:12 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">http://pacificlanworks.com/?p=675</guid>
		<description><![CDATA[McAfee, the wold's leading dedicated security company, and Facebook announced an unprecedented collaboration in which McAfee will offer for FREE their flagship McAfee Internet Security to all of Facebook 350 million users, irregardless of your country of origin and irregardless whether you are a previous McAfee customer or not.]]></description>
				<content:encoded><![CDATA[<p>Great news for everybody, especially Facebook users.</p>
<p>McAfee, the wold&#8217;s leading dedicated security company, and Facebook announced an unprecedented collaboration in which McAfee will offer for FREE their flagship McAfee Internet Security to all of Facebook 350 million users, <del datetime="2010-02-23T08:44:10+00:00">irregardless</del> regardless of your country of origin and irregardless whether you are a previous McAfee customer or not.</p>
<p>The only disappointing news is that this FREE software is only for PC users and is not extended to Mac users (as if you need it &#8230; ;p )</p>
<p>The software will come with 6 months of FREE subscriptions to the McAfee Internet Security and you can decide to keep the software after that or hopefully wait for any other offers then.</p>
<p>Once you join McAfee as their fan in their <a href="http://pacificlanworks.com/go/mcafee-facebookpage" target="_blank">Official Facebook Page for McAfee</a>, you are entitled to their FREE software from their website.</p>
<p>Do note that you will need to submit your credit card details in order to get your FREE copy of the software, and they will not charge you until 6 months later, which you MUST remember to cancel it if you decide not to continue with using McAfee Internet Security.</p>
<p>If you decide to continue with the software, do nothing and they&#8217;ll automatically credit the software cost from you then. No such thing as totally free lunch <img src='https://www.pacificlanworks.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>Head on over to <a href="http://pacificlanworks.com/go/mcafee-facebookpage" target="_blank">McAfee&#8217;s Official Facebook Page</a> and claim your FREE copy now!!!</p>
<div id="attachment_676" class="wp-caption aligncenter" style="width: 585px"><a href="http://pacificlanworks.com/go/mcafee-facebookpage" target="_blank"><img class="size-full wp-image-676" title="Free McAfee Internet Security Software For All Facebook Users" src="http://pacificlanworks.com/wp-content/uploads/2010/01/McAfee6mth.jpg" alt="Free McAfee Internet Security Software For All Facebook Users" width="575" height="527" /></a><p class="wp-caption-text">Free McAfee Internet Security Software For All Facebook Users</p></div>
]]></content:encoded>
			<wfw:commentRss>https://www.pacificlanworks.com/news/free-mcafee-internet-security-software-for-all-facebook-users/feed</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>10 Steps To Protect Yourselves On A Public Computer</title>
		<link>https://www.pacificlanworks.com/general/10-steps-to-protect-yourselves-on-a-public-computer</link>
		<comments>https://www.pacificlanworks.com/general/10-steps-to-protect-yourselves-on-a-public-computer#comments</comments>
		<pubDate>Wed, 13 Jan 2010 04:50:49 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[spyware]]></category>

		<guid isPermaLink="false">http://pacificlanworks.com/?p=532</guid>
		<description><![CDATA[I've received a panic call from my customer claiming that someone might have hacked into his system and sending out emails without his knowledge.]]></description>
				<content:encoded><![CDATA[<p>Recently I&#8217;ve received a panic call from my customer claiming that someone might have hacked into his system and sending out emails without his knowledge.</p>
<p>He was very sure that it is a stolen identity hacking activity and he claims that he knows when it happened, which he believes is during the time when he was in Malaysia for a business meeting and should be during the time when he was using a public computer in a cyber cafe in Kuala Lumpur. He was very certain it is during there and then when it happened.<br />
<span id="more-532"></span><br />
<img class="alignright size-full wp-image-533" style="margin: 10px;" title="10 Steps To Protect Yourselves On A Public Computer" src="http://pacificlanworks.com/wp-content/uploads/2010/01/cybercafe.jpg" alt="10 Steps To Protect Yourselves On A Public Computer" width="303" height="200" />I asked him how he knows about the &#8220;stolen identity&#8221; incident and he starts to shed more light into it. In the end, I discovered that his so-called &#8220;stolen identity&#8221; incident was nothing more than his business associates and friends receiving mails from him recommending them to buy &#8220;some enlargement device&#8221; or &#8220;prolonging pills&#8221; and such, basically, he was just another spam victim being masquerated as the originator. That&#8217;s all!!</p>
<p>I explained to him that someone from somewhere had managed to get a hold of his email address and using their email system to send out spam mails, but using random email addresses as the original sender, and in this case, his email address, to send out thousand of spam mails. Some of which belongs to his associates and friends.</p>
<p>To be on the safe side, however, I did a thorough check on his system looking for worms, viruses, spywares and any other rootkit malware or such, and his system is cleaned, very clean in fact, as we just did our maintenance for his system just 3 weeks ago!</p>
<p>After much tracing, we begin to suspect that these mails originate from one of his business partner. I made a quick call to the other party and asked them to check for some virus signature and voila, it is their computer that is infected and even during our teleconversation, the computer there was busy sending out more mails and generate lots more traffic.</p>
<p>I advised them to shut that system down and offered to check it for them later, chargeable of course, and yup, managed to clinch another deal the next day and probably will have our maintenance agreement signed too <img src='https://www.pacificlanworks.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  No good gestures goes unrewarded &#8230;</p>
<p>As for my panic-stricken customer, I do applaud him for calling us to check his system immediately but was quite puzzled as to why he use a public computer and not his personal laptop when he was in Kuala Lumpur. He claims that he thought of going shopping after his meeting so did not bring his laptop, and to him, it is more of a personal time out until his secretary in Singapore asked him to check something urgently, which he then has no choice but to use the public computer.</p>
<blockquote class="pullquote alignright"><p>Don&#8217;t get me wrong, it is perfectly alright to use public computers to do your stuffs or surf the web, but there are some steps you&#8217;ll need to take to protect yourselves against any potential problem in the future.</p></blockquote>
<p>I&#8217;ve outlined them below for your reading pleasure and hopefully you&#8217;ll remember to do it when you are using any public computer at any cyber cafe in any country, including Malaysia <img src='https://www.pacificlanworks.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<ol>
<li>Pay attention to your surroundings and use common sense
<ul>
<li>Beware of strangers around you, there might be potential shoulder surfers within your vicinity and always remember that a public computer is open to anyone.</li>
<li>Don&#8217;t view any sensitive documents from these computers</li>
<li>Look around and make sure no security camera are looking over your shoulder</li>
<li>Cover your hands when entering any login information, much like when you are using ATM (Auto-Teller Machines)</li>
</ul>
</li>
<li>Don&#8217;t do online banking and online shopping
<ul>
<li>Even when you are using a bank&#8217;s triple secure login, it is still not advisable to use a public computer for your banking transactions, no matter what.</li>
<li>When you shop online using a public computer, you&#8217;ll inevitably need to key in your credit card details or Paypal login information, which will then expose yourselves to unnecessary financial crimes. Therefore, it is not advisable to shop online using a public computer. If you really need to, you may  consider shopping at <a href="http://shopbug.com" target="_blank">ShopBug.com</a>, as we offer Cash-On-Delivery (COD) services, which means that you don&#8217;t need to key in any financial details and that means that you are somewhat less vulnerable. However, truth be told, if you are out of your home and in a cyber cafe, just get out of there and do some real shopping with your feet rather than a few mouse clicks <img src='https://www.pacificlanworks.com/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </li>
</ul>
</li>
<li>Don&#8217;t divulge your credit card details
<ul>
<li>As mentioned above, unless you want to be another statistics in the latest financial crime, don&#8217;t ever attempt to give your credit card details in any of these public computers</li>
</ul>
</li>
<li>Don&#8217;t save passwords
<ul>
<li>I think it&#8217;s a very common sense to know that you should never save your password in any public computer, and if you are not aware of this also, I&#8217;ll really advice you to take part in some computer courses and know more about computing before you made any regrettable mistakes in the future.</li>
<li>As for your own personal computer or laptop which you believe to be secured, I&#8217;ll also adviced you NOT to save your passwords at all. It is such a primitive security but it does help to weed out casual trouble-makers, but if you let your systems remember your passwords, you might be in for a surprise when things really cropped out.</li>
<li>To make sure passwords are not saved in Internet Explorer 7, go to Tools | Internet Options | Content. In the AutoComplete panel, click the Settings button and verify that the Prompt Me To Save Passwords check box is deselected. None of the other AutoComplete features needs to be enabled either, so deselect them as well.</li>
<li>In Firefox, choose Tools | Options | Security and deselect Remember Passwords For Sites.</li>
</ul>
</li>
<li>Don’t save files locally
<ul>
<li>By saving files locally on a public computer, you risk forgetting to remove it when you are done, and even if you do, traces of the file will still be lugging somewhere waiting for someone to retrieve it.</li>
<li>Use a flash drive instead to save your files and probably attach the flash drive to your key ring so you’ll be less likely to misplace it and create a new security problem.</li>
</ul>
</li>
<li>Delete your Browsing History
<ul>
<li>When you’ve finished browsing, it’s a good idea to delete your cookies, form data, history, and temporary Internet files.</li>
<li>In Internet Explorer 7, you can do this all at once under Tools | Delete Browsing History. In older versions of IE, each of these must be deleted separately, under Tools | Internet Options.</li>
<li>In Mozilla Firefox, go to Tools | Options, click the Privacy tab, and select Always Clear My Private Data When I Close Firefox. By default, this erases your browsing history, download history, saved form information, cache, and authenticated sessions. Click the Settings button and select the options to erase your cookies and saved passwords, too.</li>
</ul>
</li>
<li>Delete temporary files
<ul>
<li>If you use a public computer to surf the web only, step 6 above will help and this step may not be necessary for you. However, if you use Microsoft Office or any other applications on the public computer, then this step is very important to you.</li>
<li>Temporary files (often abbreviated to “temp files”), as opposed to temporary Internet files, are created when you use programs other than a Web browser. For instance, when you create a Word document, in addition to the actual document file you save, Word creates a temporary file to store information so memory can be freed for other purposes and to prevent data loss in the file-saving process. These files are usually supposed to be deleted automatically when the program is closed or during a system reboot, but unfortunately they often aren’t.</li>
<li>To find these files, do a search on all local drives (including subfolders, hidden, and system files) for *.tmp,*.chk,~*.*<br />
This will bring up all files beginning with a tilde or with the extensions .tmp and .chk, which are the most common temp files. Once the search is complete, highlight all and Shift + Delete to remove them. (If you don’t hold down Shift, they’ll usually be sent to the Recycle Bin, which you would then have to empty.)</li>
<li>If you did not clear these files, somebody else will be able to open the temporary files and recover your full content from it!</li>
</ul>
</li>
<li>Clear the pagefile
<ul>
<li>The pagefile is the location on the hard disk that serves as virtual memory in Windows. Its purpose is to swap out data from RAM so that programs can operate as if they have more RAM available than you actually have installed in the computer. Anything that can be stored in memory could also be stored in the pagefile.</li>
<li>To delete the pagefile, change the settings in Windows Explorer. Click View | Folder Options and the View tab, then scroll down and click Show Hidden Files And Folders. Deselect the Hide Protected Operating System Files check box. Now, find the file named pagefile.sys. It is usually (but not always) on the C: drive. Delete it; a new one will be created when the system reboots.</li>
</ul>
</li>
<li>Reboot
<ul>
<li>When you’re finished using the public computer, the final thing you should do is a hard reboot. This will not only clear the pagefile, if you’ve enabled that option, but it will also clear out everything you did from the physical memory (RAM).</li>
</ul>
</li>
<li>Boot from another device
<ul>
<li>This is a fairly advanced option, and one that is often overlooked. If you boot from either your own USB drive or from a CD, many of the problems mentioned above can be avoided. Today, many Linux distributions have the option of running completely in memory after booting from a CD.</li>
<li>If a public computer has had its BIOS options left at default (which happens more often than you would think), this could be an option. If you are able to do this and remember not to save any other files to the local hard drive, everything will be gone when you reboot.</li>
</ul>
</li>
</ol>
<p>Do remember that there is nothing you can do to make a public computer completely secure. A truly malicious owner or user could install a hardware keystroke logger that would be impossible to detect without actually opening the case and inspecting it. With that less-than-comforting thought, use common sense and use public computers only for nonsensitive tasks.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.pacificlanworks.com/general/10-steps-to-protect-yourselves-on-a-public-computer/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computer Virus Appears Originated From US CDC</title>
		<link>https://www.pacificlanworks.com/news/computer-virus-appears-originated-from-us-cdc</link>
		<comments>https://www.pacificlanworks.com/news/computer-virus-appears-originated-from-us-cdc#comments</comments>
		<pubDate>Thu, 03 Dec 2009 04:31:30 +0000</pubDate>
		<dc:creator>Pacific LANWorks</dc:creator>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">http://blog.pacificlanworks.com/?p=355</guid>
		<description><![CDATA[This email masquerades itself as if originated from US CDC (United States, Center for Disease Control) and is capable of planting lots of malwares into your computer system, thereby creating unwanted havoc and security issues.]]></description>
				<content:encoded><![CDATA[<p>If you receive an email that looks like it came from the United States Centers for Disease Control (U.S. CDC) about creating a profile for an H1N1 vaccination program, please ignore it and delete it straight away. Do not open the email and go to the link and please do not forward to anybody. It is a malware scam that is circulating in the Internet now, according to sources from security provider AppRiver.</p>
<p>The email should like something like this:</p>
<p><img class="aligncenter size-full wp-image-548" title="VaccineProfileEmail" src="http://pacificlanworks.com/wp-content/uploads/2009/12/VaccineProfileEmail.png" alt="" width="610" height="157" /></p>
<p>The fake alert informs recipients that as part of a &#8220;State Vaccination H1N1 Program&#8221; they need to create a profile on the CDC Web site. The link in the e-mail goes to a fake CDC page where the visitor is assigned a temporary ID and a link to a vaccination profile that is actually an an executable file containing a copy of the Kryptik Trojan targeting Windows, according to an <a href="http://blog.appriver.com/2009/12/bots-using-h1n1-to-distribute-malware.html" target="_blank">AppRiver blog post</a> on Tuesday.</p>
<p>The link was embedded on the webpage and looks like this:-</p>
<p style="text-align: center;"><a href="http://pacificlanworks.com/wp-content/uploads/2009/12/cdcpage.png"><img class="aligncenter size-full wp-image-549" title="cdcpage" src="http://pacificlanworks.com/wp-content/uploads/2009/12/cdcpage.png" alt="" width="1169" height="497" /></a></p>
<p>Once installed, &#8220;this Trojan will create a security-free gateway on your system and will proceed to download and install additional malware without your authorization,&#8221; the post warns. &#8220;It also enables a remote hacker to take complete control of your computer. This malware can log your typed keystrokes and send confidential personal and financial data (including banking information, credit card numbers, and website passwords) to a remote hacker.</p>
<p>According to AppRiver, the fake CDC email was dispatched at a rate of nearly 18,000 messages per minute, approximately 1 million in the first hour alone.</p>
<blockquote class="pullquote alignright"><p>the fake CDC email was dispatched at a rate of nearly 18,000 messages per minute, approximately 1 million in the first hour alone.</p></blockquote>
<p>The worst part of it is, according to Symantec, the landing page that the link led to contained a hidden iFrame that pointed to a site hosted in Ukraine. The iFrame checks to see if the system is running an unpatched version of Adobe Reader, Acrobat or Flash Player and if so it uses an exploit to download a file to the system.</p>
<p>Do be aware that these sort of phishing sites and emails are on the rise and there&#8217; s no way for you to know them all, and usually by the time you know it, you&#8217;ll be another statistic in the number of victims. I recommend that if you do not have a proper firewall or antivirus software install right now, please get one immediately.</p>
<p>We have been selling <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG Internet Security and Antivirus software</a> all this while and so far, lots of my customers just love it for its low cost, low maintenance and also low resource hogging. Get your <a href="http://pacificlanworks.com/recommend/avg" target="_blank">AVG Internet Security</a> now.</p>
<p>For your corporate use, please feel free to <a href="http://pacificlanworks.com/contact-us" target="_blank">contact us</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.pacificlanworks.com/news/computer-virus-appears-originated-from-us-cdc/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
<!-- WP Super Cache is installed but broken. The constant WPCACHEHOME must be set in the file wp-config.php and point at the WP Super Cache plugin directory. -->