-  
 ICQ People  can also get infected while chatting / talking /  video  messaging over  ICQ or any other Instant Messenger Application.  It is a risk that  the  user undertakes when it comes to receiving files  no matter from whom  or  where it comes. 
-  
 IRC Here  also, the threat  comes from exchange of files no matter  what they  claim to be or where  they come from. It is possible that some of these   are infected files or  disguised files. 
-  
 Attachments Any  attachment, even if it is from a known source  should be  screened as  it is possible that the source was infected  earlier and is not aware   of it. 
-  
 Physical Access Physical   access to a target machine is perhaps the easiest  way for an attacker   to infect a machine. The motive may be a prank or just plain   curiosity. 
-  
 Browser and E-mail  Software Bugs Having  outdated applications can  expose the system to  malicious programs  such as Trojans without any  other action on behalf of the  attacker. 
-  
 NetBIOS (File Sharing) If   port 139 is opened, the attacker can install trojan .exe  and modify   some system file, so that it will run the next time the system is    rebooted. To block file sharing in Windows version, go to:    Start->Settings->Control Panel->Network->File and Print   Sharing and  uncheck the boxes there. 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.