Showing posts with label can. Show all posts
Showing posts with label can. Show all posts

Tuesday, May 23, 2017

Different Types Of Malware Which Can Harm Your Digital Life

Different Types Of Malware Which Can Harm Your Digital Life


Different Types Of Malware- picateshackz.com

Hello, Malware infection is a nightmare for all computer users and here i will show you a list of different types of malware, so be aware about malwares.

Malware can be classified by it’s behavior, target platform, or attack commands. Of the three classifications, we will look more specifically at malware based on behavior. 


 These can be divided into 8 different categories:
  1. Infectors
  2. Network Worms
  3. The Trojan Horse
  4. Backdoors
  5. Remote Access Trojans
  6. Information Stealers
  7. Ransomware
  8. Rootkits

1. Infectors 

They often take the form of direct file infectors, macros and scripts, boot-sector, and multipartite. They can further be identified by the objects they infect.

A. Direct File Infectors (Overwriting, Companion, and Parasitic) immediately infect files as soon as they are executed. Can be limited to files located in the same folder or

  • Overwriting viruses overwrite the host files they infect with their own malware code, making the original host file unusable. Without a backup there is no way to recover this file.
  • Companion viruses operate by renaming the host file’s extension and then create a copy of itself with the original name of the host file. The renamed host file is then given a hidden attribute. When the file is called by the user or the operating system, the companion virus will execute it’s malicious code and then pass the instruction to the renamed/hidden original file.
  • Parasitic viruses attach themselves to the host file during infection. A prepending parasitic virus attaches itself to the top of the host file, while an appending parasitic virus attaches itself to the end of the host file.

B. Macro and Script viruses are created using an application-specific macro language. Although macros are not confined to Microsoft Office alone, it has become the main platform for macro viruses. An example of this would be the Melissa virus from 1999 which spread via email and embedded itself in both saved and new documents. The macro language is a form of scripting and macro viruses showed the malicious possibilities of scripts. A script is code that exists independently and is executed by the operating system or service to do an action. Again, they are used to automate a routine task.

C. Boot-Sector viruses infect the boot-sector of a disk to get control of the systems execution flow, in most cases, before the operating system. The virus works by hijacking the first instruction in the boot-sector, pointing to the malicious code, and then releasing control back to the boot-sector code.

D. Multipartite viruses are viruses that infect both boot-sector and files. When a multipartite virus is executed, it looks for files to infect and then looks for the presence of disks in drives and infects their boot sector. Examples are Flip from 1990 and Junkie from 1994.

2. Network Worms

 This type of malware that replicates itself to multiple systems in the network with little to no user intervention via network services such as browsing, e-mail, and chat just to name a few. Network worms are usually classified based on their network-propagating features (Mass Mailers, File-Sharing, Instant Messaging, Internet Relay Chat (IRC), LAN, and Internet).

A. Mass mailer worms spread via e-mail. Usually involves social engineering techniques to fool the user into opening or clicking links/attachments. Utilizes the users address book to spread.

B. File-Sharing worms spread by adding copies of themselves to publicly facing file-sharing folders with enticing names. The idea is to get other users to see via a peer-to-peer program.

C. Instant Messaging worms, as the name indicates, use IM software as the main vectors for infection and is similar to the Mass Mailer worm. It infects the user’s contact list and sends malicious links that result in downloading/installing itself on the next target machine. Since IM is coming from a “known” contact it is likely to be accepted.

D. Internet Relay Chat (IRC) worms spread, yup you guessed it, through IRC channels by sending messages containing malicious links or instructions that socially engineer the user to type in a series of commands that can result in infection not just of the user’s system, but the other users in the channel as well.

E. Local Area Network (LAN) worms spread within the confines of a LAN by scanning for write-able shared folders on hosts connected to the network and copying itself into said folders. It also searches for public folders in a network to drop a copy of itself.

F. Internet worms spread to other systems by scanning the Internet for vulnerable machines.

3. The Trojan Horse (or Trojan to most)

This malware in disguise. A Trojan’s main goal is destruction of files, software, or the entire operating system itself. Typically the easiest way to recover from a Trojan is to reinstall a fresh copy of your OS or restore from a clean backup.

4. Backdoors 

It enable an attacker to gain access to a compromised system and bypassing any form of safeguards and authentication. This access can be in the form of a shell with root/system privileges. Backdoors can be embedded in software or can be a stand-alone exectuable.

5. Remote Access Trojans (RAT) 

RAT is a malicious administrative tools that have backdoor capabilities. The difference between a RAT and a traditional backdoor is the RAT has a user interface or client like component that the attacker can issue commands to the server (RAT) component; this gives the attacker control over compromised machines.

6. Information Stealers 

They are exactly that; they steal information. The most common information stealers are Keyloggers, Desktop Recorders, and Memory Scrapers.
  • Keyloggers capture keystrokes and log them. These logs can either be stored locally for later retrieval or sent to a remote server setup by the attacker. Keyloggers are not limited to software alone, there are also hardware implementations available.
  • Desktop Recorders work by taking screenshots or active window on the users platform. They can be setup on a time interval or when triggered by an event such as a mouse click or a pressing of the enter/return key. The downside of this malware is the amount of data that results from this type of operation. The file size of each screenshot can add up quickly.
  • Memory Scrapers steal information in memory while it is being processed. Data that is processed in memory is unencrypted which makes it an ideal place to target.

7. Ransomware

It is a malicious program that holds data or access to systems/resources containing data unless the user pays a ransom. This kind of virtual extortion can be labled as the encryption of data and withholding the password, a trojan threat of destruction, or a user lockout until a ransom is paid.

8. Rootkits

This types of malwares are a set of tools that enables root, or administrator, level access on a computer system. In the malicious software realm, a rootkit is a a set of techniques coded into malware to gain root access and complete control of the OS and it’s underlying hardware. As a result of this level of control, the malware is able to accomplish one major survival goal; the ability to hide its presence and persistence in the system. There are two different kinds of rootkits are User-mode and Kernel-mode rootkits.

  • User-Mode rootkits operate in user mode or ring 3 of the Computer Security Protection Ring. Their control and influence is limited to the user or the process space of the affected application. User-mode rootkits operate mostly by hooking or hijacking system function calls made by an application.
  • Kernel-mode rootkits operate in kernel mode or ring 0 of the Computer Security Protection Ring. This rootkit is much more powerful b/c it places itself in the lowest level possible. This means it has more control over the OS and the underlying hardware. Ideally, a kernel-mode rootkit is what malware authors want their rootkits to be, but since it requires familiarity with OS internals and hardware it is not always possible considering the time needed to build these skills. Poorly written rootkits in kernel-mode that has system influence will most likely crash the system.

Next time we will learn about malware infection vectors. Stay Tuned!, Thank you.


Also Read:

  • How to Remove Malware from Windows?, Here is the Top 10 Tools
  • Top 10 Ways To Secure Your Digital Life From Hackers
  • How To Make A Virus And Hide In An Image File (FUD)

Available link for download

Read more »

Sunday, May 14, 2017

Download Can Knockdown Full v1 21 APK

Download Can Knockdown Full v1 21 APK


Download Can Knockdown (Full) v1.21 APK

Be accurate! Be smart! Be quick!



Can Knockdown 3play.google.com.CanKnockdown3
Challenge your aim, hone your precision, and push your puzzle-solving skills to the next level in this insanely addictive game. This installment takes the critically acclaimed Can Knockdown series to all new heights- the physics-based carnival gameplay you know and love- and adds unique puzzles, adrenaline-charged challenges, and even more explosive action!
A SMASH hit series!

Features:
  • Multiple challenging levels in beautiful 3D locations 
  •  Puzzles from Easy to Tricky… can you knock them ALL down? 
  • Show off your skills and challenge your friends! 
  • Multiple achievements and badges… collect them ALL! 
  • Gorgeous 3D graphics
  • Amazing realism, perfectly-tuned physics engine, easy-to-use controls 
  • Gameplay boosts like multipliers, bonuses, and so much more! 
  • Unlock new levels, open new locations, and discover hidden secrets!
Ready… set… THROW!

Whats in this version : (Updated : Aug 13, 2013)
  • fixed problem of black screen crash on some devices,
  • its possible to get 3 stars in level 7.1,
  • many small improvements and bug-fixes.
  • 60 levels are free. If you like them you may unlock additional 100 levels for $1.99. Enjoy!
  • Thank you for playing Can Knockdown 3. If you like our game, please rate it every time an update comes out. You are the best!
Required Android O/S : 4.0+

Download : Apk Free Download
 
  
 

Download : 55Mb (APK+OBB)
Download Can Knockdown (Full) v1.21 APK

Available link for download

Read more »

Sunday, February 19, 2017

Dont Ask Questions Until the Player Can Answer

Dont Ask Questions Until the Player Can Answer


When I started writing fantasy role-playing games for a living, I did a lot of dumb things. Since then, its been a painfully slow process figuring out how to be less dumb. Every time I start a new game, there is a point where I go, "Wait. Why dont I do this thing this new way? In fact, why havent I always done it that way?" And then I slap my forehead. Hopefully, it hurts.

One of my new, hard-earned rules of design has to do with training your characters. And, since it seems like every game and its cousin has some sort of level-gaining and stat-building these days, I think the rule is getting more relevant every day:

The number of decisions you have to make to build your character should be proportional to the amount of time youve spent playing the game. The more you play, the more you should decide.

Or, to put it another way ...

Whenever you make a decision about your character at the very beginning of the game, you are answering a question that hasnt even been asked yet.


So design wonks, get ready. Here is an example from my game Avernum, released in 1999. I will compare it to the rewritten version, Avernum: Escape From the Pit, out later this year. (And this will also double as a little taste of a preview of the new game, for those who care.)

The Bad Way I Did It Before

Avernum is an old school role-playing game. There are a lot of skills you can train to make your character stronger. There are the base attributes (Strength, Intelligence, Dexterity, Endurance) and regular skills (Swords, Spells, Lore, etc). You start out with a bunch of skill points, and you get more with each level. You should spend these on skills.



You start out with a ton of skill points, so that you can majorly customize your character from the beginning. You can use skill points to increase base attributes or regular skills, but the base attributes are expensive. However, it could break the system if a player put a huge amount of skill points in certain skills. To limit this, I made increasing a skill cost more skill points the higher you trained it. At high levels, you might have to save up for two or three levels to get enough skill points to raise a major skill one point.

Think about this. Its a system where the more you play and learn about the challenges facing you, the less you can do to customize your characters. You have to make most of the big changes at low level, when skills are cheap. Worse, it was necessary to increase the base attributes to survive (especially Endurance, which increases health), but they were so expensive that doing so required careful planning. As a result of this mess, many players had problems with getting halfway through the game and finding that they were not strong enough to proceed. These players got angry at me, and justifiably so.

There was also a traits system. Traits are special character qualities, some positive, some negative, that affected your characters. They could make you better at spells, more vulnerable to disease, and so on. Good traits came with a penalty to experience earned. Bad traits gave you a bonus. You could have at most two traits.

And heres the awesome part. You could only pick these traits at the beginning of the game, and you couldnt change them. Major decisions that affect how you play the entire game, and you make them before youve even fought one monster. Its very hardcore and old school. By which I mean that its mean-spirited and unnecessarily punitive.

The Better Way I Do It Now

There are still base attributes (unchanged), skills (mostly unchanged), and traits (an all-new, very long list).

When you make your characters, you can increase five skills and pick one trait from the long list. This is far, FAR less customization at the beginning than was allowed in Avernum. Because of this, many gamers will try to make a party, think I have completely dumbed down the system, and ragequit. Price of doing business.



But then, when you gain a level, a base attribute goes up by one point. Its different each level, so every four levels each attribute has gone up by one. In addition, each level you can choose one attribute to increase by one. This allows a lot of character customization while making sure all skills go up gradually so that you wont be hamstrung by completely neglecting an attribute.

Each level, you can also increase two different skills by one point. Thus, you never stop being able to shape your characters. As you get a better idea of the challenges you are facing, you can mold your characters to enable them to proceed.

Finally, every other level, you can pick one trait from the long list. The number of available choices starts out small (to keep from confusing new players) and grows dramatically as you proceed. You will eventually have a lot of traits. Some of them give simple bonuses to your spells or attacks, while others (like Backstab or Swordmage) will affect how you actually play your character.

I plan to take a lot of heat because I allow fewer choices early on, but overall you make more decisions to mold your character in the new system than in the old system, and there are more ways to customize a character. The change means that you make a larger percentage of the decisions later on. As it should be.

Of Course, There Is No Way To Win

I have often observed that people hate change. I have tried to make a more friendly system that provides more customization, but a lot of people will be angry about the loss of the old system (which has been in place for a very long time). I can totally understand this, but I still need to always strive to make things better.

Also, while the old system made it very possible to build a party that would find itself stuck and unable to proceed. Some players actually like that. To them, the challenge of avoiding that fate is part of the game, and the threat of a failed party adds excitement to the game. For them, I can only suggest playing on Torment difficulty. It will provide ample possibility of horrible failure.

But Im very happy with the new system. I think it allows players to answer the questions the game poses when they understand what those questions truly are. And now I enter beta testing and the actual balancing of the new system. And that, of course, is when the suffering truly begins.

Available link for download

Read more »