Site hosted by Angelfire.com: Build your free website today!

Page01

Page02

Page03

Page04

Page05

Page06

Page07

Page08

Page09 Page10

HOME

"All people dream: but not equally.Those who dream by night in the dusty recesses of their minds wake in the day to find that it was vanity; but the dreamers of the day are dangerous people,for they may act their dreams with open eye, to make it possible."

T.E. Lawrence .

 Team

This Website is designed together by the Malmon team consisting Ahmad Mohamad, Saiful Islam and Jaafar Najmuddin.

 

GB 3020 PROJECT

Internet Relay Chat (IRC)

IRC Clients Internet chat applications, such as MSN instant messaging applications and Internet Relay Chat (IRC) networks enables transmission of information over the network which includes exchange of conversations, web URLs and files including the exchange of executable codes. This pose dangers and risks just like the email clients. Some distributed denial of service tools use IRC as the control channel, such as the tool known as "Knight" discovered by CERT/CC.

Hidden File Extension 

Lately, it was discovered that there are recent malicious programs exploiting the default behavior of Windows operating systems which hides file extensions from the user. This behavior can be used to trick users into executing malicious code by making a file appear to be something it is not. The option is enabled by default, but a user may choose to disable this option in order to have file extensions displayed by Windows. Many worms transmitted via emails are known to exploit hidden file extensions. 

An example of a worm exploited the hidden file extension was the VBS/LoveLetter worm, discovered in May 2000 which contained an e-mail attachment named "LOVE-LETTER-FORYOU. TXT.vbs". Other malicious programs have since used similar naming schemes. Examples include VBS/OnTheFly (AnnaKournikova.jpg.vbs) - discovered in February 2001 VBS/Timofonica (TIMOFONICA.TXT.vbs) - discovered in June 2000 VBS/CoolNote (COOL_NOTEPAD_DEMO.TXT.vbs) - discovered in May 2000 Basically, any users might think the file sent via emails as attachments are safe as they appear as safe normal .txt, .mpg, .avi files, when actually the file has malicious script or is executable, i.e .vbs, .exe. 

Thanks For Visiting Our Site

Site Map

| PYTHON | BLACKBOARD | WEBMAIL | NPS | HOME |

Yahoo! GeoCities Member Banner Exchange



TODAY 

This is the beginning of a New Day. I have this day to use as I will. I can waste it or grow in its light and be of service to others.
But what I do with this day is important because I have exchange a day of my life for it. When tomorrow comes, today will be gone forever. I hope I will not regret the price I paid for it."

 Today :



1