Sunday, November 30, 2014

Binary I

To get into field of any software engineering you must know a few number systems. You guessed it right; one of them is binary!




  • Binary is a numeric system which uses two numerals to represent all real numbers.: typically 0 (zero) and 1 (one).
  • Binary number systems are usually represented in octets, meaning that there are 8 binary numbers per octet for example: 00000000 or 10101011
  • Binary is useful in resolving IP addresses, decoding decimal values and more. 

  • In the binary numbering system, the radix is 2. Therefore, each position represents increasing powers of 2. In 8-bit binary numbers, the positions represent these quantities:
    • 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 = 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1

  • A 1 in a certain position means we add that value to the total. A 0 means we do not add that value. For example the binary number 0110000 has a 1 in the 2^6 position (decimal value 64) and a 1 in the 2^5 position (decimal value 32). The remaining bits are all 0 so we do not add the corresponding decimal values. The result of adding 32+64 is 96, the decimal equivalent of 01100000.
  • Each octet is made up of 8 bits or 8 binary numbers and each bit has a value, either 0 or 1. The four groups of 8 bits have the same set of valid values in the range of 0 to 255 inclusive.
Overview


  • If there is a 0 in a position, do not add the value.
  • If all 8 bits are 0s, 00000000, the value of the octet is 0.
  • If all 8 bits are 1s, 11111111, the value of the octet is 255 (128+64+32+16+8+4+2+1)
  • If the 8 bits are mixed, the values are added together. For example, the octet 00100111 has a value of 39 (32+4+2+1)

Monday, November 10, 2014

New updates & topics

Greetings, it has been a while since my last post, however, I am back!
  • Since the last topic which was Deep web, we will go to the genera of networking and Cisco internet work operating system.
  • There will be posts about packet tracer tutorials to set the user up for practicing with such interfaces.
  • Fortunately there will be a post about CG&P in which is mainly relevant to networking applications.
  • Expect posts  starting 2015, cheers!

Friday, May 30, 2014

Deep Web 10 And Final! Recent Developments

For Previous Post Click Here

Even though Deep Web has become popular, many sites maybe as many as 50% has been taken off from the space.

      It was alleged that Marques was the founder of Freedom Hosting, which hosted many of the .onion sites found on the deep web, utilising 550 servers all over Europe and offering space to anyone who wanted it, with a promise never to look at the contents personally – and it later came to light that he was perhaps one of the most important men on the deep web, at least in terms of the distribution of  pornography. However, Marques and his family are protesting his innocence, claiming that all Marques did was rent web space and it was nothing to do with him that it so happened that this webspace was used for illegal activities.

The deep Web is only getting deeper. Its store of human knowledge and trivialities grows more massive every day, complicating our efforts to make sense of it all. In the end, that's perhaps the biggest challenge behind the Internet that we've created.

And of course, its darker side will always be lurking, too, just as it always does in human nature. The deep Web speaks to the fathomless, scattered potential of not only the Internet, but the human race, too.

More Info? HowStuffWorks

Tuesday, May 20, 2014

2500 Milestone!

Greetings, This Blog [virtual world] has reached 2500 views after  fourth month since  its launch. I have come to thank you all for your support, in about a month or so, I will release the give always and the perks for subscribers of this blog.Happy Browsing!


  • Good news & Bad news
There's going to be a deep web post soon, since it is the most viewed content of this Blog, but sadly it would be the last post about Deep Web.

Monday, May 12, 2014

Deep Web 9 Hidden Wiki & others

for previous post click here.

Like the wikipedia in surface world there's a Wiki in the Deep web; it explains everything in deep web, MUCH more detailed than this, and has complete .onion site reference that you can visit at anytime. But be careful, there are some things that you don't want to visit t any cost!
Hidden wiki also describes the types of the site: password protected, bit-coin entry, and so on.
Some General Statement:

  • If you thought torrenting at piratebay was the best thing you could do, then it's little to nothing how severe deep web is.
  • You are not 100% anonymous at the Deep web, you still can be tracked by your IP address or by the FBI if they want to do so.
  • Best [known] Stable browser is TOR.
Next post will wrap up the Deep web  post series, and we will move to a new topic.

Tuesday, May 6, 2014

Deep Web 8 Major Services IV

For last post click here.

As you may already know that there are a lot of things going on in deep web, but you can always expect more from it.

All you have to do is to sign your fixed match in and they'll do the res for you, however you will share 50% of your winnings back!

Image Taken from Sick Chirpse
  • Even though you can't be sure that anything is real in deep web, you can't trust that these sites are safe to use. But there should be some true because who would bother to spend few thousand dollars for creating such website, right?!
  • Worth the risk? probarly not because there is no way to trace them down, an if you do your reputation would soon be drained!
We haven't even touched the dark places of the deep web yet, Many things happen there that it's better to just ignore them.

Monday, April 28, 2014

Deep Web .7 Major Services III

It's been a while since the last Deep Web post, however we will continue where we have left off, "Major services".
The Market of the Deep web doesn't stop at human experimenting and purchasing worldwide "illegal" products, you can also buy guns and credit card information.


  • Guns
This service is mainly available in europe, since purchasing gun is legal in the U.S., you can order any type of gun, but the ammo is sold separately. But if you are in europe, don't by a gun!



  • Credit Card Information 
Thanks to sickchirpse
Thanks to sickchirpse

You can buy stolen Credit card information f, if you are willing to get your hands on  specialize in fraud, and for $80 why not? Thanks to deep web you can access to unlimited credit card information and by unlimited I mean unlimited! You can  Pay more to access the premium version by getting their details and other passwords.

More info at SickChripse.com

Tuesday, April 22, 2014

The Heartbleed Bug

It might be  little late to talk about this bug, but it's still worth the time.

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL  software library. This  allows stealing the information that is  protected; under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging and some virtual private networks(VPNs).


  • What is this Bug?
-A vulnerable SSL,  which allows the hacker to steal your information leaving NO trace!
  • How long was it out there?
-About Two Years
  • Am I Affected by this?
-Most likely, if you use major sites such as social networking, you're probably infected, you should change your password if you haven't already!
  • Which Websites have been attacked by this bug?
Many, I'll give you a shortened list:
  1. FaceBook
  2. Instagram
  3. Any Google related Website i.e. Youtube
  4. Yahoo
  5. Minecraft 
  6. NetFlix
  7. Drop Box
  8. More... 
For more detailed list click here!

Tuesday, April 15, 2014

Netflix Scam

Most of you might have used to or have Netflix to stream videos at your houses, however many sites are trying to "trick" you by making their site similar to the original Netflix web site.
 A scam was found earlier this month, which a pop-up message or an e-mail directed the user to the "fake web site", making them thinking that they're signing into a legit website.




  • Here's what happens: 
  1.  You log on to their site, and they inform you that "your account has  been suspended". So far  they've got your email and your Netflix password, still it's a good time to leave and ignore the phishing site, they haven't got much information... yet!
  2. There's and phone number provided, which leads you to tech support scam, they ask you from some of your basic info, and then a REMOTE access to your computer, how crazy is that?
  3. They'll download loads of malware and steal pretty much everything you have on your computer..
  4. If you are steal on the phone they'll ask for your credit card info, from there, you just have to hang up the phone, because they know everything about you. so a simple add could be pretty dangerous, Be careful!!!

**More info can be found here.  **

Friday, April 11, 2014

Deep web . 6 Major Services II

Now you might think that trading drugs, and hiring hit-mans are pretty brutal factors in deep web, but there's more: for Major Services I click here!


  1. HUMAN EXPERIMENT

    The Human Experiment is a deep website that details medical experiments that are performed on homeless people, usually unregistered citizens. They’re picked up off the street, experimented on and then usually die, "it’s the perfect crime". 
    Here's a preview of their web site:
    Thanks to sickchirpse






    2. You can also hire people to steal items for you, why?  Maybe you can't afford a particular item or you don't want a specific person to own it. You'll give him the product information, in exchange of required bitcoins. Some times he has some pre-stolen items  because some customers  ask for the product but are unwilling to pay for it, or he's just doing it for "fun"! 


Wednesday, April 2, 2014

Deep Web 5. Major Services.


           Before you continue, you might want to check out the last D.W. Post about ,How to get to the Deep Web itself, here; or find out the Major Factors!

  • As you  may know, being in deep web makes you "anonymous"; therefore you can find unlimited amount of things that you wont find on the regular internet. Here's some common things that you'll found on the D.W.note most ,if not all, of these transaction work with the BitCoin!]

  1. Marijuana :

    • Here it is, the so-called "Golden nugget". Did you forget calling your dealer ? Then get on the deep web instead. Now you can do all your  ordering from the comfort of your own sofa.
      The prices varying upon  the amount of you buy. This is when your stash is dropped somewhere in ‘nature’ and hidden. 
     2.Hire a Hit-man:
Hitman[ not owned by M.E.]
    • Yes, seriously, you can hire a hitman on the deep web. Want to take out your boss,wife or that journalist who wrote that poor review for your company? Well if you've got the cash, this person will do it for you. This is taken from one website on the deep web that offers this service and includes the differing prices of a hit. These prices are dependent on who the person is and what information you need to send so the hit can take place.
                     Thanks to sickchirpse


Thursday, March 27, 2014

Quick Post

For those who have e-mailed me for how my 'haft seen' decoration looks; I've uploaded it hope you enjoy it!
Whats 'Haft seen'? 

Haft seen picture

Dont worry more posts will come about deep web, and there will be one CG&P.IV pretty soon, keep in touch!

Wednesday, March 26, 2014

Deep Web. 4 Major Factors and sites.

Before you continue, you might want to check out the last D.W. Post about ,How to get to the Deep Web itself, here.

          You can find almost anything on the deep web; from chemicals to drugs rare electronic bombs to nuclear warheads. One example of  major product exchange site  is "Silk Road"[shut down in 2013],  also known as the anonymous market,  which is pretty much set up like eBay or Amazon. It has its feedback system, it's currency[bit coin] and all the other factors that a market has, but the customer(s) are truly anonymous; and there is no way of knowing that your ordered product will arrive on time or at all in some cases, since scamming is common there.


Wednesday, March 19, 2014

Useful links + New Year



Hello Everyone, I hope everyone had a good spring break, Or at least amazing year[for those who don't have spring break] so far.

Aside from  that it's[was] spring break,  the Persian new year is also  near, or march 20th first day of spring.
Anyways happy new year to anyone that celebrates 'Eid`e Norouz' and all Iranians and Farsi speakers:       " Norouzetan Mobarak"

- Here's a link to New-year countdown.[ probably expired after the twenty first]

Lets get to the topic, I've founded a great website for those who are interested to know more about programming. Sure it may seem simple but it's a great way to start your skills from there. Code.org is absolutely free.

Sorry if this post seemed short, however more are coming late March, Expect PVC next week! Happy Holidays and Norouz!

Wednesday, March 12, 2014

Cool Gadgets & Programs III

Welcome to another Cool Gadgets and programs, I'm going to cover more programs that might be useful or fun.
Many of you probably know this, but for the ones that don't, if you have Windows 7 or later, you should be familiar with a 'Snipping Tool'. With that tool or program, you could take screen shots. It also has some useful tools such as highlighter, pen and etc. More info here.


Have you ever had an .bin file that was supposed to be an .iso file and you had no idea what to do with it?
Or have you downloaded an image file but it was with .bin? Then try bin2iso, it's light fast and easy to use. No installation required and it proved to be in "OK" reputation by Norton. To Download click Here.




More Will be coming this April.


                                                                         CGP lists



Wednesday, March 5, 2014

Deep Web. 3 how to access it?



Deep Web is not accessible with normal browsers such as Chrome Or Internet Explorer, because:

  • Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements are used; such fields are hard to navigate without domain knowledge.
  • Unlinked content: pages which are not linked to by other pages, which may prevent Web crawling programs from accessing the content. This content is referred to as pages without backlinks (or inlinks).
  • Private Web: sites that require registration and login (password-protected resources).
  • Contextual Web: pages with content varying for different access contexts.
  • Limited access content: sites that limit access to their pages in a technical way 
  • Scripted content: pages that are only accessible through links produced by JavaScript as well as content dynamically downloaded from Web servers via Flashor Ajax solutions.
  • Non-HTML/text content: textual content encoded in multimedia (image or video) files or specific file formats not handled by search engines.


To Access The Web, the search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering resources on the surface Web but is often ineffective at finding deep Web resources. 
Some so-called hidden services can be accessed only through an onion router such as Tor (which allows the user to access .onion web pages.


  • Fun Fact
Downloads of Tor soared in August by almost 100% as the general population became more and more concerned about their privacy amid revelations about US and UK intelligence agencies monitoring web traffic. In short, more and more people are turning to the deep web to get their internet fix and protect their information.
More Post will come to how to operate the hidden browser, and access .onion pages.




 

Monday, February 24, 2014

Mini - Game

Enjoy a Game Created By M.E. Most Contests Are based on the Games similar to this Easy right? you get to have fun AND Win Prizes!

Freeze Tag

Click the Button at the bottom to start the Game!




'Big Day'

If you have Checked out my old Blog-ID, you must have wondered what is 'the major event'. We've Passed 2000 Mile Stone On New year; With the great support from you viewers, there are going to be some Change here sooner or later. On Mid-June[preferably 23rd], I have the Opportunity to change my Domain; Doing so allow me to put advertisement and make this blog A Commercial Type. However Here's a Catch! Every month I'll have Giveaways and Contests, Hopefully by then i'll be able to finish my code for it.

  • What Are The Give-Away?
      - Giveaways are not limited but including: Amazon/Game Stop/Skype Membership/ Tango/ And Much More...!
  • Awesome,How to we get them?
    - Alright be patient, I'll post The rules there, for Count Down click Here. Stay Subscribed for Up Coming Info.

Count Down Until Major Change



For more Info Click Here

Friday, February 14, 2014

PhotoShop VS Paint.net PVC

This is the Second Pro Versus Con blog post:
You all love photo editing, programs such as Photoshop are popular in the market, you can use these softwares for unlimited amounts of things; as if for today, february 14th, as you may know it's valentine. Therefore Photo editing and creating wonderful images can help you for the 'process' of the day! However, though, these featuers come in a price. If an individual wants to install or purchase the latest Adobe P.S.  CS6, They have to pay at least few hundreds of dollars for it. How ever there are some freeware such as Gimp or Paint.net with some fewer features. But it all comes down which program worth is the better deal to impress your loved ones?














  • Built in Application
  • Can be downloaded from internet, it does not take much hard drive space, and it does not occupy much of RAM or the CPU capacity, however in long uses it might affect your  over all performance.
  • This Application is absolutely free to use, no restriction ads or trial period.
  • This Application needs the operating systems below, so it's not loyal to every Operating system.  
    Windows 8 or 8.1,
   or Windows 7 SP1,
   or Windows XP SP3,
   or Windows Vista SP1

  • Is compatible and loyal to most if not all systems.
  • Photo shop needs much more system capacity, and it's not recommended on older versions of system. This program is not free and only can be obtained via monthly membership or complete purchasing.
Winner: P.E.
  • Features
    • P.net
  • Has basic needs, it's much more advanced than regular windows paint. However the graphical features are no way close to Photo Shop.
  • Can undo  work for unlimited amounts of times.
  • Supports multi language pack.
    • Photo Shop
  • Has very complex graphical textures and tools that a master artisan needs.
  • undo limited amount of time.
  • Support of multi language, and customer service.
Winner: P.S.

After math: Adobe Photo Shop.
With high prices come high performance and features! If you really use Photo editing for a major part of your lifetime, then PhotoShop is for you... however don't be discouraged, you can have one month free at Photo Shop CC; but for a casual user Paint.net is recommended.

Thursday, February 13, 2014

Deep Web.2 BitCoin


Like any modern Country, Deep Web has its own currency! The Currency as you may have guessed it is called BitCoin!
Bitcoin is a peer-to-peer payment system and digital currency introduced as open source software in 2009 by pseudonymous developer Satoshi Nakamoto. It is a cryptocurrency, so-called because it uses cryptography to control the creation and transfer of money. Conventionally, "Bitcoin" capitalized refers to the technology and network whereas lowercase "bitcoins" refers to the currency itself.
Bitcoins are created by a process called mining, in which participants verify and record payments in exchange for transaction fees and newly minted bitcoins.Users send and receive bitcoins using wallet software on a personal computer, mobile device, or a web application. Bitcoins can be obtained by mining or in exchange for products, services, or other currencies.
Bitcoin has been a subject of scrutiny due to ties with illicit activity. In 2013, the US FBI shut down the Silk Road online black market and seized 144,000 bitcoins worth US$28.5 million at the time. The US is considered Bitcoin-friendly compared to other governments, however. In China, new rules restrict bitcoin exchange for local currency, the European Banking Authority has warned that Bitcoin lacks consumer protections, and the Canadian government announced that they intend track and regulate large virtual currency transactions as part of an update to laws on money laundering and terrorism prevention. Bitcoins can be stolen, and chargebacks are impossible.

Thursday, February 6, 2014

Deep Web.1



Internet is huge, Made up of Surface Web and Deep Web, when it comes to Deep Web,  there is a whole world comes into it; It's more like an empire but with no central authority. It has its own currency, unique market system, parties and protected files and servers.   The deep web is truly anonymous – you can’t even get on it unless you yourself are anonymous.

  • HOW DO I ACCESS THE DEEP WEB?

You can’t just access the deep web from a normal web browser – like Google Chrome for example – you can only access the deep web through a deep web browser. The most famous of these deep web browsers is called Tor and this is the one. Downloads of Tor soared in August by almost 100% as the general population became more and more concerned about their privacy amid revelations about US and UK intelligence agencies monitoring web traffic. In short, more and more people are turning to the deep web to get their internet fix and protect their information.
This is because when you’re using Tor – or any other deep web browser – you are truly anonymous and your location cannot be picked up and neither can your browsing habits. Essentially nothing you do in the deep web can be monitored and as such the deep web is becoming a more attractive option for all internet users – those who know about it at least.

  • What's in it?
With the enforced anonymity of the deep web, you would think it was full of illegal stuff and you would be totally correct in that assumption. The deep web is well known for containing some really messed up stuff (Which I'm going to try and avoid that for the most part), there is a saying  'use a proxy or say hi to FBI.' but if you successfully steer clear of all of that then you’ll find some really interesting stuff on the deep web that you would never find on the public world wide web.

Next post will be about Major sites in deep web, and there will be more detail about these information.




Sunday, January 26, 2014

Surface Web

You think Google and Bing are huge; but those are nothing compared to the internet it self. what you see with normal .com browsers is only 4% ~ 10% of the web. The rest? Well that goes to a place called 'hidden web' or 'deep web' which is going to be one next post.
What you see with your default browser like I.E or Google Chrome, is called The surface world.These browsers have bots or spiders that can only find known URL. The rest of the material on the web are either paid, restricted, or non-conventional formats. one of the most famous format is .Onion. These can be viewed by special browser called TOR. But be careful, not all materials on deep web are legal or safe to view, things can be wild out there.
People using Surface Web are not completely anonymous, the data that is being exchanged are not completely encrypted.  But things are completely different in deep web, almost everybod is completly hidden in the  web.

Thursday, January 16, 2014

Flash Player Settings

As a wrap up to security unit, we'll end it with Flash settings.

Adobe Flash does an important role in your system, from playing Videos and much more. You can change the storage and acceptability of the program.
To start, go to Control Panel, or search for flash player settings, go to System And Security, and look for 'Flash Player' Click on the link and a window with four tabs should pop-up.





  • First tab is used for storage of information. Click on 'Local Storage by Site...' and remove any storage that you don't recognize. 
  • If you only browser only at local trusted sites, then click allow sites to save information.
  • If you surf all around the internet then Click Ask me option since some malware information can be stored without your constant; check storage at least weekly.
  •  You can Click 'Block all', but it's not recommended since some sites need space to run.

  • As for the second tab, which is for Camera and Mic, it's up to you to decide if your Camera and microphone be accessed by sites, but personally it's recommended to block all.
    • Delete any Sites you don't recognize.
  • Same  goes for Playback or peer assisted networking, if you stay at local and trusted site, click ask me option.
    • Delete any Sites you don't recognize.
  • For Advance Settings, you will need administrator permission to change any required settings;
    • You can Delete all storage, change update settings, check your current installed version, and change update settings.
      • For update section, it's recommended to allow the program to install updates automatically. Not updating  may leave the system vulnerable to security threats.
    • If you are donating or selling your computer you should  'Deauthorize' your system to prevent Flash from playing any previously viewed protected  content, such as music or movies that you may have purchased.


Final Security Tips II

Part two of final Security tips
  • Do not fall for FBI or police ransom.lock they will not lock your computer and ask you for money, they will always give you a warning first. 
    • General help:
      • Reboot and press F8 while PC is booting

    • Choose safe mode with networking
    • Launch MSConfig
    • Disable startup items rundll32 launching something from Application Data. Optionally, disable everything you do not recognize.
    • Reboot. FBI ransom-ware should not load.
  •  Pay attention to disk usage light on your computer, if there is no activity going on but the light is still flashing then something must be wrong.
  • If you notice something weird in your computer run it in safe mode. 
    • simply reboot your computer and press F8
    • chose desired option and continue
  • If your computer acts slower than usual you can go to WTM(Windows Task Manager) carefully remove any application process  that you don't recognize. 
  • Back up your computer weekly, [not a security tip but if you lose all of your information by a malware you still would have a secondary  source]
  • Remove cookies from browsers that you don't recognize.
  • When browsing at Deep web always use a proxy, and have maximum safe guards, things can be violent there.
  • Always check sites URL, some phishing sites will fool you by putting similar URL as the original one.
    • w could be changed into vv 
    • HTTPS --> HTTP
    • misspelled sites
    • incorrect domain or .com to .net or .etc
  • Be sure to have latest version of Java and only one version of it. multiple can cause security problems.
  • Check for websites or the newly installed application certificate, does it have a signature? if it doesn't or it has been expired then it's more likely to be a source of malware.
This should cover about everything fairly; next post which is on the 17th, covers about flash settings and should be a wrap up to Security Unit.

Wednesday, January 15, 2014

New updates

With New year comes with new updates! Here's some new general plans for 2014!
  1. New Terms of use and disclaimer! Check it out it has been updated!
  2. end of unit of security hopefully by the 15th 
  3. P.V.C. and new side topics
  4. Hacking and deep web!
  5. Check out January updates for  added features.
  6. former M.E Mill editor will be posting hot topics linking to this Blog, for old fans to keep in touch with new posts!
  7. Change of administration settings!
  8. A.arts galleries update.
  9. More!!! check out Blog's over view for more detailed information.

Final Security Tips I

You have learned to how to prevent your system to be infected in general and important ways; as the end of security topic of this Blog, there are going to be last tips and facts about security of your system.

  • Update all of your applications even if they take time, it's much better than re-installing the operating system because of a malware problem.
  • Get a legitimate Anti Virus + Anti spyware and Firewall program. [Windows fire wall is not as precise.]
  • Don't fall for online ransom and scams, always ask is it too good to be free? Never click on ads say "your Computer is infected, run a free scan". When you run this program it will probably create random files on your computer and call them as harmful, whats next? you got it right! they ask for amount of money to remove them, after math? your computer is not functioning better but all of your personal information has been released by you accepting the terms of service. A good Example of a scam is My Clean PC which has been advertised in media. Here's link of its reviews.
  • Scan your download, especially compressed folders such as .Rar and .Zip folders.
  • Don't click on any links you see, this is especially stressed for E-mails and social networking sites, you don't want them to take control of your account.
  • Do not make same password for everything, If a hacker finds it all of your online services is in their control. Click here for ways to make strong passwords.
  • Do not download by peer to peer, i.e torrent, you never know whats on your host computer until you open or execute it. try to download them from local server
  • The movies and songs that require you to execute a program are probably a malware, There is no .exe[ Executable ] extension for Mp3 and Mp4 files or  any media extensions!
  • Since there are many topics to cover  about this post, it will be divided into two sections.



atlassecurityservices

Friday, January 10, 2014

System Security I, S III

For previous Security sessions of  I and II Your browser is now secure and you know most of the ways that you can protect your self from malware on the internet; Though there are many ways that your system can be infected!


  1. Downloading

  • Stealth Malware/Viruses + backdoor system

 When you are downloading a file from a third party website or potentially harmful, you never can know what's in the file until you open or execute it. Many of them could be the actual program but also installing an hidden virus known as Trojan virus. This programs could be from annoying level to a sever level that your computer could turn into a bot and be controlled from another system. This method is called backdoor, your computer is monitored by other groups of people, so your personal information is in danger of published by them; on a large scale similar event happened to "P.S.N" and "Snap chat".
  • How Can you prevent it?
Well you might have already guessed, one major way is to purchase and Anti malware software that has smart download and insight intelligence, Personally I Recommend Norton Anti virus, It is pre-equipped with all of these editions. Always scan zip folders, and  test your new installed program on a test computer if you don't have one, run it on standard user account so if the program transmitted malware, it didn't have the administrator permission. Pay attention to your computer activities when you are online and offline, have anything changed after installing program?

    2. Exploits
  • Your computer can be attacked frequently if your system firmware is not updated or patched for a while. Average time a computer survives online is with out any security update is One Hour! When you don't update your programs such as windows update, java and adobe, you can have the similar if not the same experience! What could happen is when using those programs a hacker could find your vulnerability soon enough that they can insert malware codes through the opening in the program. Solution? It's easy update your software no matter how long they take. If you don't have the original software,  you can download patches on the internet, but be careful while some of them could be infected by malware.