Thursday 23 April 2009
OLED Based Apple Notebook ready to be released soon ?
For all potential Apple`s buyers, you might wait jusr a while to have a new super aerodynamic-Notebook from Apple. Rumous has spreaded every where and it become a great marketing for Apple. By using Organic Light Emitting Diode (OLED) technology, the current hard-rock keyboard will be replaced by shiny-tiny-bright keyboard, together with highly interactive touch screen on the laptop.
The Best Thing About OLEDs?
So what’s the big whoop about OLEDs? Well, if you’re not familiar, the acronym stands for “organic light-emitting diode” technology, which some have been predicting for more than half a decade now will eventually displace LCD displays for computers and flat-panel televisions. The technology is also sometimes called light emitting polymer (LEP) or organic electro luminescence (OEL).
OLED technology could theoretically enable fabrication of display screens 1,000 times thinner than a human hair using organic light-emitting diodes that can be printed on a sheet of plastic and should be cheaper to manufacture — costing only an estimated 60 percent as much as LCDs to produce.
Other benefit of this technolgy is that , OLED could reduce up 60% off the manufacturing cost and we do hope the price of the new laptopn/notebook generation will be lesser. OLED is also believed to contribute much more less power consumption and again we will have longer spending time in playing laptop together with battery dependency.
But, the most important is that , could you imagine how interactive is your itune application when the start spacebar turn to stop function once we click to start. Moreover, this type of keyboard would really shine for media work, since applications like Photoshop, Logic, and Final Cut could be significantly simplified by displaying more information about (and on) each key . Apple has spent around US 500 Million on the OLED R & D together with LG to produce the OLED-based product.
OLED Based Apple Notebook ready to be released soon ?
For all potential Apple`s buyers, you might wait jusr a while to have a new super aerodynamic-Notebook from Apple. Rumous has spreaded every where and it become a great marketing for Apple. By using Organic Light Emitting Diode (OLED) technology, the current hard-rock keyboard will be replaced by shiny-tiny-bright keyboard, together with highly interactive touch screen on the laptop.
The Best Thing About OLEDs?
So what’s the big whoop about OLEDs? Well, if you’re not familiar, the acronym stands for “organic light-emitting diode” technology, which some have been predicting for more than half a decade now will eventually displace LCD displays for computers and flat-panel televisions. The technology is also sometimes called light emitting polymer (LEP) or organic electro luminescence (OEL).
OLED technology could theoretically enable fabrication of display screens 1,000 times thinner than a human hair using organic light-emitting diodes that can be printed on a sheet of plastic and should be cheaper to manufacture — costing only an estimated 60 percent as much as LCDs to produce.
Other benefit of this technolgy is that , OLED could reduce up 60% off the manufacturing cost and we do hope the price of the new laptopn/notebook generation will be lesser. OLED is also believed to contribute much more less power consumption and again we will have longer spending time in playing laptop together with battery dependency.
But, the most important is that , could you imagine how interactive is your itune application when the start spacebar turn to stop function once we click to start. Moreover, this type of keyboard would really shine for media work, since applications like Photoshop, Logic, and Final Cut could be significantly simplified by displaying more information about (and on) each key . Apple has spent around US 500 Million on the OLED R & D together with LG to produce the OLED-based product.
OLED Based Apple Notebook ready to be released soon ?
For all potential Apple`s buyers, you might wait jusr a while to have a new super aerodynamic-Notebook from Apple. Rumous has spreaded every where and it become a great marketing for Apple. By using Organic Light Emitting Diode (OLED) technology, the current hard-rock keyboard will be replaced by shiny-tiny-bright keyboard, together with highly interactive touch screen on the laptop.
The Best Thing About OLEDs?
So what’s the big whoop about OLEDs? Well, if you’re not familiar, the acronym stands for “organic light-emitting diode” technology, which some have been predicting for more than half a decade now will eventually displace LCD displays for computers and flat-panel televisions. The technology is also sometimes called light emitting polymer (LEP) or organic electro luminescence (OEL).
OLED technology could theoretically enable fabrication of display screens 1,000 times thinner than a human hair using organic light-emitting diodes that can be printed on a sheet of plastic and should be cheaper to manufacture — costing only an estimated 60 percent as much as LCDs to produce.
Other benefit of this technolgy is that , OLED could reduce up 60% off the manufacturing cost and we do hope the price of the new laptopn/notebook generation will be lesser. OLED is also believed to contribute much more less power consumption and again we will have longer spending time in playing laptop together with battery dependency.
But, the most important is that , could you imagine how interactive is your itune application when the start spacebar turn to stop function once we click to start. Moreover, this type of keyboard would really shine for media work, since applications like Photoshop, Logic, and Final Cut could be significantly simplified by displaying more information about (and on) each key . Apple has spent around US 500 Million on the OLED R & D together with LG to produce the OLED-based product.
Wednesday 22 April 2009
Windows 7 Sucks
for gizmodo’s install, they used a leopard retail dvd with [type11]’s bootloader. they’re breaking the eula, but at least it’s not piracy. they had to use both a dvd drive and a usb hard drive because device recognition was flakey. despite this, the actual install process doesn’t appear to be too difficult. they say all the hardware works, “the mini 9 is a beautiful os x machine
what you will need:
• Dell Mini 9 With 16GB SSD or higher (8GB SSDs will techincally work, but it will take some fiddling not covered by this guide)
• Retail copy of OS X 10.5.x (NOT an OEM copy that comes with a new Mac)
• A USB flash drive 8GB or higher
• An external USB DVD drive
• The “Type11″ Bootloader: DellMiniBoot123v8.01.iso.zip (download link here)
• Blank CD to burn bootloader image (I actually used version 8.0 of Type11 on my CD-if your boot process with 8.01 is different than what’s spelled out in this guide, you can download 8.0 here. Both should work.)
• Windows PC for preparing the flash drive (if DVD drive works fine, this is optional)
Related source :comprehensive guide for the dell mini 9
Windows 7 Sucks
for gizmodo’s install, they used a leopard retail dvd with [type11]’s bootloader. they’re breaking the eula, but at least it’s not piracy. they had to use both a dvd drive and a usb hard drive because device recognition was flakey. despite this, the actual install process doesn’t appear to be too difficult. they say all the hardware works, “the mini 9 is a beautiful os x machine
what you will need:
• Dell Mini 9 With 16GB SSD or higher (8GB SSDs will techincally work, but it will take some fiddling not covered by this guide)
• Retail copy of OS X 10.5.x (NOT an OEM copy that comes with a new Mac)
• A USB flash drive 8GB or higher
• An external USB DVD drive
• The “Type11″ Bootloader: DellMiniBoot123v8.01.iso.zip (download link here)
• Blank CD to burn bootloader image (I actually used version 8.0 of Type11 on my CD-if your boot process with 8.01 is different than what’s spelled out in this guide, you can download 8.0 here. Both should work.)
• Windows PC for preparing the flash drive (if DVD drive works fine, this is optional)
Related source :comprehensive guide for the dell mini 9
Windows 7 Sucks
for gizmodo’s install, they used a leopard retail dvd with [type11]’s bootloader. they’re breaking the eula, but at least it’s not piracy. they had to use both a dvd drive and a usb hard drive because device recognition was flakey. despite this, the actual install process doesn’t appear to be too difficult. they say all the hardware works, “the mini 9 is a beautiful os x machine
what you will need:
• Dell Mini 9 With 16GB SSD or higher (8GB SSDs will techincally work, but it will take some fiddling not covered by this guide)
• Retail copy of OS X 10.5.x (NOT an OEM copy that comes with a new Mac)
• A USB flash drive 8GB or higher
• An external USB DVD drive
• The “Type11″ Bootloader: DellMiniBoot123v8.01.iso.zip (download link here)
• Blank CD to burn bootloader image (I actually used version 8.0 of Type11 on my CD-if your boot process with 8.01 is different than what’s spelled out in this guide, you can download 8.0 here. Both should work.)
• Windows PC for preparing the flash drive (if DVD drive works fine, this is optional)
Related source :comprehensive guide for the dell mini 9
Monday 20 April 2009
Test attack WPA-PSK and WPA2-PSK by using pyrit
WPA was designed with the small-office/home user in focus; while the protocol allows a sophisticated key-exchange to take place, most implementations like DSL/Cable/LAN-routers prefer the “Pre-Shared Key” mode. Exchange of the Pairwise Master Key (we will hear that term a lot) is simplified by using a common password that is known to all communicating parties
Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocol that today de-facto protects public WIFI-airspace. The project’s goal is to estimate the real-world security provided by these protocols. Pyrit does not provide binary files or wordlists and does not encourage anyone to participate or engage in any harmful activity. This is a research project, not a cracking tool. Pyrit combines the power and convenience of Python with the high performance of modern Graphics Processing Units (GPUs).
Pyrit’s implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol’s security. Exploiting the computational power of GPUs, this is currently by far the most powerful attack against one of the world’s most used security-protocols.
for more info : ERM Blog
Test attack WPA-PSK and WPA2-PSK by using pyrit
WPA was designed with the small-office/home user in focus; while the protocol allows a sophisticated key-exchange to take place, most implementations like DSL/Cable/LAN-routers prefer the “Pre-Shared Key” mode. Exchange of the Pairwise Master Key (we will hear that term a lot) is simplified by using a common password that is known to all communicating parties
Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocol that today de-facto protects public WIFI-airspace. The project’s goal is to estimate the real-world security provided by these protocols. Pyrit does not provide binary files or wordlists and does not encourage anyone to participate or engage in any harmful activity. This is a research project, not a cracking tool. Pyrit combines the power and convenience of Python with the high performance of modern Graphics Processing Units (GPUs).
Pyrit’s implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol’s security. Exploiting the computational power of GPUs, this is currently by far the most powerful attack against one of the world’s most used security-protocols.
for more info : ERM Blog
Test attack WPA-PSK and WPA2-PSK by using pyrit
WPA was designed with the small-office/home user in focus; while the protocol allows a sophisticated key-exchange to take place, most implementations like DSL/Cable/LAN-routers prefer the “Pre-Shared Key” mode. Exchange of the Pairwise Master Key (we will hear that term a lot) is simplified by using a common password that is known to all communicating parties
Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocol that today de-facto protects public WIFI-airspace. The project’s goal is to estimate the real-world security provided by these protocols. Pyrit does not provide binary files or wordlists and does not encourage anyone to participate or engage in any harmful activity. This is a research project, not a cracking tool. Pyrit combines the power and convenience of Python with the high performance of modern Graphics Processing Units (GPUs).
Pyrit’s implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol’s security. Exploiting the computational power of GPUs, this is currently by far the most powerful attack against one of the world’s most used security-protocols.
for more info : ERM Blog
Sunday 19 April 2009
Securing Wireless Network
The security of wireless local area network (WLAN) solution works better with Wi-Fi Protected Access (WPA) WLAN protection compared to Wired Equivalent Privacy (WEP).
Currently, ITD have to admit there are some potential difficulties faced by IIUM user with using WPA, which include:
• Manual configuration of WPA settings: The support for setting Windows XP client WPA settings using group policy is not available in the versions of Windows earlier than Windows Server™ 2003 Service Pack 1. Until Service Pack 1 is available and you have deployed it in your organization, you will have to configure your clients manually (there is no way to script WLAN settings for Windows XP). You need to install Service Pack 1 only on the server on which you are editing the WLAN settings Group Policy object (GPO); it is not required on the clients, domain controllers, or IAS servers.
• Restricted availability of WLAN clients: At the time of writing, Microsoft only provides WPA support for Windows XP Service Pack 2 and later. PDA and Smart Phone operating systen running on Windows Mobile and Symbion does not support WPA yet. The only operating system that really support secured wireless environment is MacOS for iPhone and iPod. For those who want to get connected through SSID iium-gadgetmust comply with WPA requirement.
• Availability of WPA compliant hardware: Although WPA support is now mandatory for all Wi-Fi certified hardware, existing network equipment may need to be upgraded to support WPA. You will need to obtain firmware updates for any access points or network adapters that do not currently support WPA. In some (rare) cases, you may need to replace equipment if the manufacturer does not produce WPA updates. Again, it is a common problem to the low-end Microsoft product.
Manually Configuring Windows XP WLAN Settings for WPA
Until GPO support becomes available in Windows Server 2003 Service Pack 1, you must configure WPA settings on the client manually. WPA is supported on Windows XP Service Pack 1 with the WPA client download installed (or on Windows XP Service Pack 2).
Note: When GPO support becomes available, you can also use the following procedure to create a Wireless Network Policy using the same settings.
To manually configure WPA WLAN settings:
1. Open the properties of the Wireless Network interface. If the WLAN is displayed in the Available Networks list, select it, and click Configure…, otherwise click Add (in the Preferred Networks section).
2. Type the WLAN name into the Network Name (SSID) field (if it is not already displayed there) and, in the Description field, enter a description of the network.
Note: If you have an existing WLAN and you intend to run this side–by–side with the 802.1X–based WLAN of this solution, you must use a different Service Set Identifier (SSID) for the new WLAN. This new SSID should then be used here.
3. In the Wireless Network Key section, select WPA (not WPA PSK) as the Network Authentication type and TKIP as the Data Encryption type. (If your hardware supports it, you can choose the higher strength Advanced Encryption Standard (AES) in place of TKIP).
4. Click the IEEE 802.1x tab, and select Protected EAP (PEAP) from the EAP Type drop–down list.
5. Click the Settings… button to modify the PEAP settings. From the Trusted Root Certificate Authorities list, select the root CA certificate for the CA.
Important: If you ever need to re–install your CA from scratch (not just restore from backup), you will need to edit the client settings and select the root CA certificate for the new CA.
6. Ensure that Secured Password (EAP-MS-CHAP v2) is selected in the Select Authentication Method and check the Enable Fast Reconnect option.
7. Close each properties window by clicking OK.
Configuring Pocket PC 2003/PDA/Smart Phone for WPA
WPA was not supported natively in Pocket PC 2003 using Windows Mobile and Symbion at the time of writing; however, this may be implemented in the future. Support for WPA on other type of Pocket PC available from other vendors such Mac OS (iPhone and iPod),
Original Post : ERM Blog
Securing Wireless Network
The security of wireless local area network (WLAN) solution works better with Wi-Fi Protected Access (WPA) WLAN protection compared to Wired Equivalent Privacy (WEP).
Currently, ITD have to admit there are some potential difficulties faced by IIUM user with using WPA, which include:
• Manual configuration of WPA settings: The support for setting Windows XP client WPA settings using group policy is not available in the versions of Windows earlier than Windows Server™ 2003 Service Pack 1. Until Service Pack 1 is available and you have deployed it in your organization, you will have to configure your clients manually (there is no way to script WLAN settings for Windows XP). You need to install Service Pack 1 only on the server on which you are editing the WLAN settings Group Policy object (GPO); it is not required on the clients, domain controllers, or IAS servers.
• Restricted availability of WLAN clients: At the time of writing, Microsoft only provides WPA support for Windows XP Service Pack 2 and later. PDA and Smart Phone operating systen running on Windows Mobile and Symbion does not support WPA yet. The only operating system that really support secured wireless environment is MacOS for iPhone and iPod. For those who want to get connected through SSID iium-gadgetmust comply with WPA requirement.
• Availability of WPA compliant hardware: Although WPA support is now mandatory for all Wi-Fi certified hardware, existing network equipment may need to be upgraded to support WPA. You will need to obtain firmware updates for any access points or network adapters that do not currently support WPA. In some (rare) cases, you may need to replace equipment if the manufacturer does not produce WPA updates. Again, it is a common problem to the low-end Microsoft product.
Manually Configuring Windows XP WLAN Settings for WPA
Until GPO support becomes available in Windows Server 2003 Service Pack 1, you must configure WPA settings on the client manually. WPA is supported on Windows XP Service Pack 1 with the WPA client download installed (or on Windows XP Service Pack 2).
Note: When GPO support becomes available, you can also use the following procedure to create a Wireless Network Policy using the same settings.
To manually configure WPA WLAN settings:
1. Open the properties of the Wireless Network interface. If the WLAN is displayed in the Available Networks list, select it, and click Configure…, otherwise click Add (in the Preferred Networks section).
2. Type the WLAN name into the Network Name (SSID) field (if it is not already displayed there) and, in the Description field, enter a description of the network.
Note: If you have an existing WLAN and you intend to run this side–by–side with the 802.1X–based WLAN of this solution, you must use a different Service Set Identifier (SSID) for the new WLAN. This new SSID should then be used here.
3. In the Wireless Network Key section, select WPA (not WPA PSK) as the Network Authentication type and TKIP as the Data Encryption type. (If your hardware supports it, you can choose the higher strength Advanced Encryption Standard (AES) in place of TKIP).
4. Click the IEEE 802.1x tab, and select Protected EAP (PEAP) from the EAP Type drop–down list.
5. Click the Settings… button to modify the PEAP settings. From the Trusted Root Certificate Authorities list, select the root CA certificate for the CA.
Important: If you ever need to re–install your CA from scratch (not just restore from backup), you will need to edit the client settings and select the root CA certificate for the new CA.
6. Ensure that Secured Password (EAP-MS-CHAP v2) is selected in the Select Authentication Method and check the Enable Fast Reconnect option.
7. Close each properties window by clicking OK.
Configuring Pocket PC 2003/PDA/Smart Phone for WPA
WPA was not supported natively in Pocket PC 2003 using Windows Mobile and Symbion at the time of writing; however, this may be implemented in the future. Support for WPA on other type of Pocket PC available from other vendors such Mac OS (iPhone and iPod),
Original Post : ERM Blog
Securing Wireless Network
The security of wireless local area network (WLAN) solution works better with Wi-Fi Protected Access (WPA) WLAN protection compared to Wired Equivalent Privacy (WEP).
Currently, ITD have to admit there are some potential difficulties faced by IIUM user with using WPA, which include:
• Manual configuration of WPA settings: The support for setting Windows XP client WPA settings using group policy is not available in the versions of Windows earlier than Windows Server™ 2003 Service Pack 1. Until Service Pack 1 is available and you have deployed it in your organization, you will have to configure your clients manually (there is no way to script WLAN settings for Windows XP). You need to install Service Pack 1 only on the server on which you are editing the WLAN settings Group Policy object (GPO); it is not required on the clients, domain controllers, or IAS servers.
• Restricted availability of WLAN clients: At the time of writing, Microsoft only provides WPA support for Windows XP Service Pack 2 and later. PDA and Smart Phone operating systen running on Windows Mobile and Symbion does not support WPA yet. The only operating system that really support secured wireless environment is MacOS for iPhone and iPod. For those who want to get connected through SSID iium-gadgetmust comply with WPA requirement.
• Availability of WPA compliant hardware: Although WPA support is now mandatory for all Wi-Fi certified hardware, existing network equipment may need to be upgraded to support WPA. You will need to obtain firmware updates for any access points or network adapters that do not currently support WPA. In some (rare) cases, you may need to replace equipment if the manufacturer does not produce WPA updates. Again, it is a common problem to the low-end Microsoft product.
Manually Configuring Windows XP WLAN Settings for WPA
Until GPO support becomes available in Windows Server 2003 Service Pack 1, you must configure WPA settings on the client manually. WPA is supported on Windows XP Service Pack 1 with the WPA client download installed (or on Windows XP Service Pack 2).
Note: When GPO support becomes available, you can also use the following procedure to create a Wireless Network Policy using the same settings.
To manually configure WPA WLAN settings:
1. Open the properties of the Wireless Network interface. If the WLAN is displayed in the Available Networks list, select it, and click Configure…, otherwise click Add (in the Preferred Networks section).
2. Type the WLAN name into the Network Name (SSID) field (if it is not already displayed there) and, in the Description field, enter a description of the network.
Note: If you have an existing WLAN and you intend to run this side–by–side with the 802.1X–based WLAN of this solution, you must use a different Service Set Identifier (SSID) for the new WLAN. This new SSID should then be used here.
3. In the Wireless Network Key section, select WPA (not WPA PSK) as the Network Authentication type and TKIP as the Data Encryption type. (If your hardware supports it, you can choose the higher strength Advanced Encryption Standard (AES) in place of TKIP).
4. Click the IEEE 802.1x tab, and select Protected EAP (PEAP) from the EAP Type drop–down list.
5. Click the Settings… button to modify the PEAP settings. From the Trusted Root Certificate Authorities list, select the root CA certificate for the CA.
Important: If you ever need to re–install your CA from scratch (not just restore from backup), you will need to edit the client settings and select the root CA certificate for the new CA.
6. Ensure that Secured Password (EAP-MS-CHAP v2) is selected in the Select Authentication Method and check the Enable Fast Reconnect option.
7. Close each properties window by clicking OK.
Configuring Pocket PC 2003/PDA/Smart Phone for WPA
WPA was not supported natively in Pocket PC 2003 using Windows Mobile and Symbion at the time of writing; however, this may be implemented in the future. Support for WPA on other type of Pocket PC available from other vendors such Mac OS (iPhone and iPod),
Original Post : ERM Blog
Wednesday 1 April 2009
IT Security Alert : Beware of "CONFICKER.C" Worm
The worm Conficker.C has been activated on 1st April 2009.
The worm when infects the PC will query about 30,000 websites for further instructions, thus when the PC queries 30,000 sites your Network most probably will be congested and users will be experiencing high latency in internet.
1. WHAT is the symptoms:
So far, the worm is new, there's no unique signature, but basically, look for these:
* task manager disabled
* regedit disabled
* user cannot view my network
* network is up, but microsoft sites and all antivirus sites cannot be open
2. HOW to avoid..
For Microsoft users, please follow link below
http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx
3.HOW to clean the worms
Refer to table below
Removal Instructions
Microsoft: http://support.microsoft.com/kb/962007
Kaspersky: http://support.kaspersky.com/faq/
BitDefender: http://www.bitdefender.com/VIRUS-1000462-en--Win32.Worm.Downadup.Gen.html
TrendMicro: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp
To be able to access Anti-Virus vendors and SANS, Microsoft and others, from an infected Conficker.C machine, TrendMicro suggests to use "net stop dnscache" from the command line.
Sophos: http://www.sophos.com/support/knowledgebase/article/51416.html
Removal Tools
Microsoft MSRT: http://www.microsoft.com/security/malwareremove/default.mspx
F-Secure: ftp://ftp.f-secure.com/anti-virus/tools/beta/f-downadup.zip
AhnLab: http://global.ahnlab.com/global/file_removeal_down.jsp?filename=12371830475821&down_filename=v3conficker.zip
Symantec: http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99
McAfee: http://vil.nai.com/vil/stinger/
ESET: http://download.eset.com/special/EConfickerRemover.exe
BitDefender: http://www.bdtools.net/
Kaspersky: http://data2.kaspersky-labs.com:8080/special/KidoKiller_v3.3.3.zip
TrendMicro: https://securecloud.com/support/sysclean
Sophos: https://secure.sophos.com/products/free-tools/conficker-removal-tool-network/download (registration required)
Other Related Post About Conficker.C : ERM Blog
IT Security Alert : Beware of "CONFICKER.C" Worm
The worm Conficker.C has been activated on 1st April 2009.
The worm when infects the PC will query about 30,000 websites for further instructions, thus when the PC queries 30,000 sites your Network most probably will be congested and users will be experiencing high latency in internet.
1. WHAT is the symptoms:
So far, the worm is new, there's no unique signature, but basically, look for these:
* task manager disabled
* regedit disabled
* user cannot view my network
* network is up, but microsoft sites and all antivirus sites cannot be open
2. HOW to avoid..
For Microsoft users, please follow link below
http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx
3.HOW to clean the worms
Refer to table below
Removal Instructions
Microsoft: http://support.microsoft.com/kb/962007
Kaspersky: http://support.kaspersky.com/faq/
BitDefender: http://www.bitdefender.com/VIRUS-1000462-en--Win32.Worm.Downadup.Gen.html
TrendMicro: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp
To be able to access Anti-Virus vendors and SANS, Microsoft and others, from an infected Conficker.C machine, TrendMicro suggests to use "net stop dnscache" from the command line.
Sophos: http://www.sophos.com/support/knowledgebase/article/51416.html
Removal Tools
Microsoft MSRT: http://www.microsoft.com/security/malwareremove/default.mspx
F-Secure: ftp://ftp.f-secure.com/anti-virus/tools/beta/f-downadup.zip
AhnLab: http://global.ahnlab.com/global/file_removeal_down.jsp?filename=12371830475821&down_filename=v3conficker.zip
Symantec: http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99
McAfee: http://vil.nai.com/vil/stinger/
ESET: http://download.eset.com/special/EConfickerRemover.exe
BitDefender: http://www.bdtools.net/
Kaspersky: http://data2.kaspersky-labs.com:8080/special/KidoKiller_v3.3.3.zip
TrendMicro: https://securecloud.com/support/sysclean
Sophos: https://secure.sophos.com/products/free-tools/conficker-removal-tool-network/download (registration required)
Other Related Post About Conficker.C : ERM Blog
IT Security Alert : Beware of "CONFICKER.C" Worm
The worm Conficker.C has been activated on 1st April 2009.
The worm when infects the PC will query about 30,000 websites for further instructions, thus when the PC queries 30,000 sites your Network most probably will be congested and users will be experiencing high latency in internet.
1. WHAT is the symptoms:
So far, the worm is new, there's no unique signature, but basically, look for these:
* task manager disabled
* regedit disabled
* user cannot view my network
* network is up, but microsoft sites and all antivirus sites cannot be open
2. HOW to avoid..
For Microsoft users, please follow link below
http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx
3.HOW to clean the worms
Refer to table below
Removal Instructions
Microsoft: http://support.microsoft.com/kb/962007
Kaspersky: http://support.kaspersky.com/faq/
BitDefender: http://www.bitdefender.com/VIRUS-1000462-en--Win32.Worm.Downadup.Gen.html
TrendMicro: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp
To be able to access Anti-Virus vendors and SANS, Microsoft and others, from an infected Conficker.C machine, TrendMicro suggests to use "net stop dnscache" from the command line.
Sophos: http://www.sophos.com/support/knowledgebase/article/51416.html
Removal Tools
Microsoft MSRT: http://www.microsoft.com/security/malwareremove/default.mspx
F-Secure: ftp://ftp.f-secure.com/anti-virus/tools/beta/f-downadup.zip
AhnLab: http://global.ahnlab.com/global/file_removeal_down.jsp?filename=12371830475821&down_filename=v3conficker.zip
Symantec: http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99
McAfee: http://vil.nai.com/vil/stinger/
ESET: http://download.eset.com/special/EConfickerRemover.exe
BitDefender: http://www.bdtools.net/
Kaspersky: http://data2.kaspersky-labs.com:8080/special/KidoKiller_v3.3.3.zip
TrendMicro: https://securecloud.com/support/sysclean
Sophos: https://secure.sophos.com/products/free-tools/conficker-removal-tool-network/download (registration required)
Other Related Post About Conficker.C : ERM Blog