Get Easy Way  
User Name   Password   Forgot Password?
Home       FREE Recharge       Mobile Wallpaper       Greetings       FREE Ring Tones       Articles     Quotes     Image Gallery     Feedback       Contact Us    
Share on Google+ Share on Twitter Relaxya.com RSS Feed
 
 Just Now...     more>>

A computer malware that has spread across 150 countries appears to be slowing down, with few reports of fresh attacks globally on Monday.
A spokesperson for police agency Europol said the situation in Europe "seems stable".
In Asia, where many offices closed before the WannaCry ransomware struck on Friday, the attack has been less severe than expected.
The ransomware takes over users' files, demanding $300 (£230) to restore them. Only about $50,000 (£39,000) has been paid so far, according to Elliptic Labs which tracks illicit use of the internet currency Bitcoin.
However, the ransomware warning said that the cost would double after three days, so the payments may increase.
It threatens to delete files within seven days if no payment is made.

REVEALED: North Korea's latest missile test ‘could have struck US island’, expert claims.

NORTH Korea’s latest missile launch could have destroyed a US territory, it has been claimed.
In a show of strength, the reclusive state launched a projectile which flew for 30 minutes and eventually landed in the Sea of Japan.
However, a US missile expert and physicist said the range of the missile had the capacity to reach the US Pacific island, Guam.

CHENNAI: With a view to provide relief to students, Tamil Nadu education department stopped naming the top 3 rank holders of the SSLC and Plus Two (class 10 and class 12). Government of Tamil Nadu Directorate of Government Examinations declared the HSC results today without naming the top rank holders. Following the footsteps of Cental Board of Secondary Education(CBSE), Tamil Nadu government had announced on 11 May 20017 that it will be doing away with the practice to save students from "stress."

Download FREE Ringtones
Download Saguni Ringtone
Free Ring Tone
  Vivekananda
 
Vivekananda

Swami Vivekananda was one of the most influential spiritual leaders of Vedanta philosophy. He was the chief disciple of Ramakrishna Paramahansa and was the founder of Ramakrishna Math and Ramakrishna Mission. Swami Vivekananda was the living embodiment of sacrifice and dedicated his life to the country and yearned for the progress of the poor, the helpless and the downtrodden. He showed a beacon of light to a nation that had lost faith in its ability under British rule and inspired self-confidence among Indians that they are second to none. His ringing words and masterful oratory galvanized the slumbering nation.

Articles

HTML5 Icon
Ransomware?

"Ransomware is a type of malicious software that blocks access to the victim's data or threatens to publish or delete it until a ransom is paid"
Any action is possible once a device or system is infected and there is no guarantee that paying the ransom will return access or not delete the data. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer's Master File Table (MFT) or the entire hard drive. Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file. While initially popular in Russia, the use of ransomware scams has grown internationally; in June 2013, security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013, more than double the number it had obtained in the first quarter of 2012. Wide-ranging attacks involving encryption-based ransomware began to increase through Trojans such as CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities, and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over $18m by June 2015.

The concept of file encrypting ransomware was invented and implemented by Young and Yung at Columbia University and was presented at the 1996 IEEE Security & Privacy conference. It is called cryptoviral extortion and is the following three-round protocol carried out between the attacker and the victim. [attacker→victim] The attacker generates a key pair and places the corresponding public key in the malware. The malware is released. [victim→attacker] To carry out the cryptoviral extortion attack, the malware generates a random symmetric key and encrypts the victim's data with it. It uses the public key in the malware to encrypt the symmetric key. This is known as hybrid encryption and it results in a small asymmetric ciphertext as well as the symmetric ciphertext of the victim's data. It zeroizes the symmetric key and the original plaintext data to prevent recovery.

HTML5 Iconyou can do to protect against ransomware, including Cryptolocker What can you do about it? On the one hand, ransomware can be very scary – the encrypted files can essentially be considered damaged beyond repair. But if you have properly prepared your system, it is really nothing more than a nuisance. Here are a few tips that will help you keep ransomware from wrecking your day:

1. Back up your data The single biggest thing that will defeat ransomware is having a regularly updated backup. If you are attacked with ransomware you may lose that document you started earlier this morning, but if you can restore your system to an earlier snapshot or clean up your machine and restore your other lost documents from backup, you can rest easy. Remember that Cryptolocker will also encrypt files on drives that are mapped. This includes any external drives such as a USB thumb drive, as well as any network or cloud file stores that you have assigned a drive letter. So, what you need is a regular backup regimen, to an external drive or backup service, one that is not assigned a drive letter or is disconnected when it is not doing backup. The next three tips are meant to deal with how Cryptolocker has been behaving – this may not be the case forever, but these tips can help increase your overall security in small ways that help prevent against a number of different common malware techniques.

2. Show hidden file-extensions One way that Cryptolocker frequently arrives is in a file that is named with the extension “.PDF.EXE”, counting on Window’s default behavior of hiding known file-extensions. If you re-enable the ability to see the full file-extension, it can be easier to spot suspicious files.

3. Filter EXEs in email If your gateway mail scanner has the ability to filter files by extension, you may wish to deny mails sent with “.EXE” files, or to deny mails sent with files that have two file extensions, the last one being executable (“*.*.EXE” files, in filter-speak). If you do legitimately need to exchange executable files within your environment and are denying emails with “.EXE” files, you can do so with ZIP files (password-protected, of course) or via cloud services.

4. Disable files running from AppData/LocalAppData folders You can create rules within Windows or with Intrusion Prevention Software, to disallow a particular, notable behavior used by Cryptolocker, which is to run its executable from the App Data or Local App Data folders. If (for some reason) you have legitimate software that you know is set to run not from the usual Program Files area but the App Data area, you will need to exclude it from this rule.

5. Use the Cryptolocker Prevention Kit The Cryptolocker Prevention Kit is a tool created by Third Tier that automates the process of making a Group Policy to disable files running from the App Data and Local App Data folders, as well as disabling executable files from running from the Temp directory of various unzipping utilities.

This tool is updated as new techniques are discovered for Cryptolocker, so you will want to check in periodically to make sure you have the latest version. If you need to create exemptions to these rules, they provide this document that explains that process.

6. Disable RDP The Cryptolocker/Filecoder malware often accesses target machines using Remote Desktop Protocol (RDP), a Windows utility that allows others to access your desktop remotely. If you do not require the use of RDP, you can disable RDP to protect your machine from Filecoder and other RDP exploits. For instructions to do so, visit the appropriate Microsoft Knowledge Base article below: Windows XP RDP disable Windows 7 RDP disable Windows 8 RDP disable

7. Patch or Update your software These next two tips are more general malware-related advice, which applies equally to Cryptolocker as to any malware threat. Malware authors frequently rely on people running outdated software with known vulnerabilities, which they can exploit to silently get onto your system. It can significantly decrease the potential for ransomware-pain if you make a practice of updating your software often. Some vendors release security updates on a regular basis (Microsoft and Adobe both use the second Tuesday of the month), but there are often “out-of-band” or unscheduled updates in case of emergency. Enable automatic updates if you can, or go directly to the software vendor’s website, as malware authors like to disguise their creations as software update notifications too.

8. Use a reputable security suite It is always a good idea to have both anti-malware software and a software firewall to help you identify threats or suspicious behavior. Malware authors frequently send out new variants, to try to avoid detection, so this is why it is important to have both layers of protection. And at this point, most malware relies on remote instructions to carry out their misdeeds. If you run across a ransomware variant that is so new that it gets past anti-malware software, it may still be caught by a firewall when it attempts to connect with its Command and Control (C&C) server to receive instructions for encrypting your files. If you find yourself in a position where you have already run a ransomware file without having performed any of the previous precautions, your options are quite a bit more limited. But all may not be lost. There are a few things you can do that might help mitigate the damage, particularly if the ransomware in question is Cryptolocker:

9. Disconnect from WiFi or unplug from the network immediately If you run a file that you suspect may be ransomware, but you have not yet seen the characteristic ransomware screen, if you act very quickly you might be able to stop communication with the C&C server before it finish encrypting your files. If you disconnect yourself from the network immediately (have I stressed enough that this must be done right away?), you might mitigate the damage. It takes some time to encrypt all your files, so you may be able to stop it before it succeeds in garbling them all. This technique is definitely not foolproof, and you might not be sufficiently lucky or be able to move more quickly than the malware, but disconnecting from the network may be better than doing nothing.

10. Use System Restore to get back to a known-clean state If you have System Restore enabled on your Windows machine, you might be able to take your system back to a known-clean state. But, again, you have to out-smart the malware. Newer versions of Cryptolocker can have the ability to delete “Shadow” files from System Restore, which means those files will not be there when you try to to replace your malware-damaged versions.
Cryptolocker will start the deletion process whenever an executable file is run, so you will need to move very quickly as executables may be started as part of an automated process. That is to say, executable files may be run without you knowing, as a normal part of your Windows system’s operation.

11. Set the BIOS clock back Cryptolocker has a payment timer that is generally set to 72 hours, after which time the price for your decryption key goes up significantly. (The price may vary as Bitcoin has a fairly volatile value. At the time of writing the initial price was .5 Bitcoin or $300, which then goes up to 4 Bitcoin) You can “beat the clock” somewhat, by setting the BIOS clock back to a time before the 72 hour window is up. I give this advice reluctantly, as all it can do is keep you from having to pay the higher price, and we strongly advise that you do not pay the ransom. Paying the criminals may get your data back, but there have been plenty of cases where the decryption key never arrived or where it failed to properly decrypt the files. Plus, it encourages criminal behavior! Ransoming anything is not a legitimate business practice, and the malware authors are under no obligation to do as promised – they can take your money and provide nothing in return, because there is no backlash if the criminals fail to deliver.

  Invite your friends...
E-Mail ID  
Ex: gmailid@gmail.com         
Password  
 
  Picture of the week
 
Noor Nisha - Erode.
Upload Your Kids Photo
  Mother Teresa
 
Mother Teresa

Mother Teresa was one of the great servants of humanity. She was an Albanian Catholic nun who came to India and founded the Missionaries of Charity in Kolkata. Later on Mother Teresa attained Indian citizenship. Her selfless work among the poverty-stricken people of Kolkata (Calcutta) is an inspiration for people all over the world and she was honored with Nobel Prize for her work.