The,Move,New,Anti-Virus,Model, DIY The Move to a New Anti-Virus Model


When starting a new work at home business it is very easy to become consumed by it. We spend so much time trying to get the business up and running that we may end up becoming burned out and lose our motivation. There is so much to learn and Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-parent:"";mso-padding-alt:0in


This is the first in a series of articles highlighting reasons why today’s anti-virus security solutions don’t work. Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday’s methods for solving today’s problems: they wait for the next virus to wreak havoc and then produce a solution. That worked for a long time when a virus would take years to traverse the world. But in this fast-paced Interet-crazed world we live in today, this type of solution is no longer applicable. Now a virus can traverse the world and infect millions of computers in minutes.In the good old days a virus traveled by floppy disk. Put a floppy in your computer and save some data to it and the virus would infect the floppy. Then unwittingly put the infected floppy in another computer and presto the new computer would become infected. (I’m skimming over a lot of detail here to make a point). So the virus’ progress was slow and steady. Anti-virus vendors had time on their side. They had the time to get a copy of the virus, dissect it, run it through a series of tests to come up with a signature string (see below for definition), put the string into a database of strings to search for when scanning your hard drive (and floppies) and release the new database to the public. Ten years ago this system worked very well.But now everyone is connected via the Internet. Now, using email as a transport point, it doesn’t take years to gather momentum, instead it takes a matter of minutes. And here is where the model breaks. Step back and ask yourself the following question: if vendors can catch “known and unknown viruses” as their literature states, how then is it that we continue to have virus problems?The answer lies in the fact that virus authors have been more creative in coming up with new ways to infect and wreak havoc and the software industry has not responded in kind, preferring to stay embedded in its old fashioned methodologies.Why don’t the old ways work any more, you might ask? It’s relatively simple. Let’s go through the steps. A virus author unleashes NewVirus via email. He mass mails his virus to thousands of people. Some, not all, unwittingly open the attachment thinking it’s from a friend or the subject is so enticing that they are fooled into opening it without thinking it’s a problem (cf. nude pictures of Anna Kournikova). The email attachment immediately starts emailing everyone in his contact list and embeds itself into his operating system so that it’s activated every time he turns on his computer.The folks he emails in turn get fooled into thinking the email is valid and they open the attachment. Very quickly all hell breaks loose. Agencies which monitor Internet traffic see problems arising with the sudden spikes in email traffic and they begin to get calls or emails alerting them to the fact that there’s a new problem. Samples are obtained and sent off to anti-virus vendors. They pass the emails through a series of tests to analyze what exactly the virus does and how it does it. Additionally analysis is performed to extract a unique string of 1’s and 0’s to identify this attachment as none other than NewVirus. This is called the signature string. It’s important that whatever string is arrived at does not exist in any other program or piece of software; otherwise, you will get what is commonly called a false positive.Quick digression on “false positives”: if a vendor arrives at a unique string that just happens to be embedded in Microsoft Word, then every time a user runs a scan of their hard drive, Microsoft Word will be identified as being infected with NewVirus. Users will uninstall Word and re-install only to learn that they are still infected. There will be complaints; the vendor will be forced to re-assess the signature string and re-release his list of strings and admit the error.Typically signature strings are matched against a whole boatload of commonplace software just to protect against this occurrence, but it still happens and vendors learn to add new software to their test beds.OK, so the vendor has arrived at a signature string. Next? Implement the string into their string database so that when their scanners are scanning they will match what’s on your hard drive to what’s in the database. After the database has been updated they release the database to their customers in what’s commonly called a “push” where they send the updates to their primary users.If you did not buy into this service, you must know enough to log into your anti-virus vendor and update your software so that you stay current.So where are we? The bad guy –or problem teenager- has unleashed NewVirus. NewVirus has infected thousands of computers; vendors have been alerted; NewVirus continues to infect; solutions are achieved and “pushed” to corporate clients; NewVirus continues to infect hundreds and thousands of computers; corporate clients breathe a sigh of relief and alert their users as to the new threat.Thousands, if not millions, of computers become infected and need to be cleaned because the best way to solve the virus problem is to wait for each new virus to come along and solve on a case by case basis.But if you sat back and said: what if? What if you categorized all the things a virus can do (or could do), built a series of computers to allow any email attachment or program to have full rein of a computer (much like it would have on your own computer – such a computer is called “honeypot”) and then analyze that computer for unwelcome behavior?That would be a true pre-emptive strike against all malicious software. This is the behavior-based model. Such a model would actually protect you unknown viruses, along with all the known 70,000 viruses.In part 2 we’ll discuss the risks and security failures of having distributed vendor software on your desktop.

The,Move,New,Anti-Virus,Model,

DIY

Soil testing as important as oil changes are for engines

When you have a vehicle that you are driving a lot, you know that oil changes are something that you need to do on a regular basis to keep your vehicle in good condition. This is the same as soil testing. Soil testing ensures that your soil ...

DIY

Foam bitumen - Sustainable Eco-friendly Roads

Dont you think it will be great if we have eco-friendly roads that will be sustainable and durable as well? If there are roads that are not harming the environment anymore? This isnt just something that is for the future. There are countrie ...

DIY

Soil Testing: It’s all about that soil

Soil testing. The success of your harvest is all about the quality of the soil. And, the only way to ensure that you have the best soil, is to know what your soil needs.Many dont think that soil testing is needed. They are only adding nutrie ...

DIY

Mobile Work and Aluminum Platforms That Fit Your Needs

There are many domestic, trade and industrial applications where an extension ladder is the best and safest choice. Although many people try to make do with tall stepladders, most don't know it's hazardous to stand on the top work platform o ...

DIY

Truck Access Platforms That suitable for you

Looking to plan and specialist a few kinds of platforms that give your workers safe access to single or multiple hatches on an assortment of Tank Trucks. In the event that your administrators are as of now getting to the highest points of tr ...

DIY

How to Choose a Custom T-shirt Printing Company?

Be it a family event, a noble cause, company event, or personal interest, wearing custom t-shirts gives importance to it. The fame of personalized shirts is soaring high with this. More and more men and women are wearing custom shirts while ...

DIY

Moving Jurney By Interm Packers and Movers

They perceive the ins and outs of transferring so it's a protected option to allow them to deal with your whole belongings as a result of they'll do it proper and do it with care. When you might be in a predicament corresponding to not havin ...

DIY

Use a Vacuum Excavation for an Unearthing Project

You may very well get yourself that you have to utilise a vacuum excavation for an uncovering venture. This can be anything from disposing of a channel that is blocked or to penetrate a gap in the ground without harming the encompassing zone ...

DIY

Detailed Information about Non-Destructive Digging

At the point when you consider digging a gap in the ground, the principal thing that rings a bell is this ordinarily winds up a total wreckage around the gap.Be that as it may, there is one technique called non-destructive digging. This is t ...

DIY

A Complete Guide to buying a Vacuum Truck

Buying a vacuum truck are something that you should consider on the off chance that you are searching for another business opportunity. There are a few advantages to having this sort of business in the event that you have a completely prepar ...

DIY

Best Methods of Underground Cable Detection!

While we are continually fabricating and remolding properties, unearthing is unavoidable and can be attempted for an assortment of reason. What we are going to discover right now while playing out an exhuming, you should discover any undergr ...

DIY

Vacuum Trucks Can Deal with Exact Unearthing Needs!

Some intriguing data about vacuum trucks. That it will have the option to give in your precise excavation and drilling needs. You may imagine that those enormous trucks won't have the option to penetrate precisely, without harming anything a ...

DIY

Utility Locators - Locating Underground Cable

There are numerous reasons why it is imperative to locate underground cables. Also, if the Cables can't be found effectively, the fiasco will be immense and can be destroying.This is the reason you have to ensure that you know however much a ...

DIY

Important Information about Hydro Excavation

Hydro excavation is the way toward expelling or moving soil with pressurized water. An air movement or vacuum is then used to move the dirt or trash to a garbage tank. This takes into account a non-damaging and progressively exact approach t ...

DIY

Foam Bitumen - Lab Tests for Pavement Construction

Foam Bitumen. Something that you probably won't have found out about. All in all, for what reason would it be advisable for you to consider what the different lab tests on bitumen for asphalt development are? But on the off chance that you a ...

DIY

Soil Testing & analysing Is Worth the Effort

There's nothing of the sort as a free lunch, even in the nursery. Contingent upon your soil's local ripeness and what you develop, your plants may perform for quite a long time without requiring extra manure. Be that as it may, at some point ...

DIY

Soil Testing For Construction

Soil testing is a significant piece of building and street development. Truth be told, no development task can continue without first ensuring the soil can bolster the heap. Subsequently, the reason for soil testing for construction is to de ...

DIY

Soil Testing Services for Construction Projects

Regardless of whether you are building your fantasy home, making an expansion to your current home or building up a business property, there is one thing that is of most extreme significance, soil testing. There are various building consulta ...

DIY

Property Insurance

Property is Peoples HopeIt is not wrong to say that property is a hope and main aim of every person. People put all their efforts and then purchase some property for time ahead reliability and safety. This property is result of a long term s ...