Results 1 to 15 of 15

Thread: Google Confused by Number Porn Phenomenon

  1. Header
  2. Header-68

BLiNC Magazine, always served unfiltered
  1. #1

    Google Confused by Number Porn Phenomenon

    Google developers are puzzled as to why if someone types in a number sequence into the Google search they end up with hardcore porn.

    Press reports confirm that if the user types in 4^(1/4)" they get many pages of porn links with titles like “four guys and a hooker”. It’s not just about the number four. Even if you type in other numbers it will also result in adult links. "1 2" -1, "1 2" -2, "h 3" –h, "1 4" -4, and “apple 1” – apple. Perhaps, the last request was discovered by a person manically typing in words connected to their favourite device, but it remains unclear how anyone else spotted the bug.

    The phenomenon was first revealed on the search site Quora which has a question about what was causing this “equation porn” when the Internet users were searching for contradictory queries. The post in question was in January, but the engineers of the search giant have been unable to find an answer. One of the company developers explained that as a web search query, you can interpret [-4^(1/4)] as [-4 "1 4"], as in “Find me pages which contain a 1 next to a 4, but which do not contain a 4”. In other words, this should return no results, since it is obviously impossible to satisfy both requirements, but instead the search engine believes that some online pages match such contradictory queries. So, taking into account the fact that these appear the only results that “match” the query, they are the results that get shown to the user.

    Industry observers suggest that one possible reason such contradictory queries return only adult links is because pornography website operators used a black hat search engine optimization technique. Google still provided no official comment.

  2. #2

    Re: Google Confused by Number Porn Phenomenon

    Ecuador Hired Hacker Wanted in the US

    Kevin Mitnick, known as one of the most wanted computer hackers in the United States at one time, seems to still manage to poke the hornet’s nest. It turned out that his security outfit, Mitnick Security Consulting, was the one who helped Rafael Correa win the presidential elections in Ecuador.

    In fact, Correa is not loved by the United States that has historically had a problem with democratically elected governments who appear vaguely socialist in their leanings. Media reports suggest that Correa feared he might have the election stolen from him by hackers, most likely from the United States or otherwise. That’s why he decided to hire Mitnick to protect the Net Lock computer system. The latter has been assigned the task of tabulating the country’s elections.

    Mitnick admitted that almost two decades ago he was busted for hacking, but now he is allowed to do the same thing absolutely legitimately. Of course, he’d love it. Perhaps, you don’t remember that in the 1990s Kevin was on a hacking spree and gained access to hundreds of universities, PCs and corporate networks. His targets included the likes of Apple, Motorola and even the FBI. In result, Mitnick was arrested and banged up for 5 years. After his release, Kevin helped private and public entities by providing them security consulting. He even worked for the American government to help them mitigate cyber threats.

    However, Correa’s re-election is unlikely to sit that well with the United States. The American-trained economist has created his own “Citizens’ Revolution”, which is a socialist-oriented economic program having something in common with what Chavez achieved in Venezuela. Like Chavez, Correa is quite popular, but he is sometimes slammed for being authoritarian. By the way, it was Correa who has offered Julian Assange asylum in Ecuador’s London embassy.

  3. #3

    Re: Google Confused by Number Porn Phenomenon

    BitTorrent Started New Project: SoShare

    It was just a few weeks ago that BitTorrent Inc. has teased public with Sync, and now the company is already working on a project which will improve file-sharing on a larger scale.

    The company called the new project SoShare, and what BitTorrent is going to do is next to unbelievable. Based on P2P technology, the feature will allow users to share up to one terabyte of data. If you install the SoShare plugin, you will be able to upload the files through the service’s web app and specify an e-mail address of the receiver. After you do so, your receiver will be e-mailed a link and can immediately start downloading the file.

    As long as SoShare is based on P2P technology, the user is able to pause the download or even background the downloading process. The company confirmed that since SoShare is based on a BitTorrent browser plugin, delivery is swift, and the users are free to pause and resume transfers if they have to switch gears.

    What else should you know about the new opportunity? First of all, you should remember that although there’s basically no size limit, your files will be kept for one month and after that they will expire.

    BitTorrent has officially announced a new feature, saying that they’d like to share something with the users: a simple and free file delivery service. The network developers believe that SoShare will be a beautiful way to move big ideas and massive projects around the Internet, powered by BitTorrent. Although SoShare is still under developing, you can say that BitTorrent Inc. proved to keep its word any time the company came up with something new. As such, the industry observers expect for the new plugin to make a huge impact on file-sharing.

    The BitTorrent announcement said that SoShare was a public beta which evolved out of a simple need. Today’s programmers, designers, and content creators have to deliver large files almost every day, and that’s a huge number of people: for instance, 3.34 million people work in creative industries in the United States only, but there’s still no media delivery service for those who work in media. Unfortunately, users can’t fit everything into an attachment. You should understand that syncing services have caps, while delivery services have limits. SoShare is expected to help everyone who needs it.

  4. #4

    Re: Google Confused by Number Porn Phenomenon

    New Mega Accounts for More than 3 Million Users
    Added: Monday, March 11th, 2013


    After just a month since new Mega launch, Kim Dotcom’s file-sharing portal has already gathered an impressive number of unique registered users – more than 3,000,000.

    According to Dotcom’s tweets, although Mega was only launched a month ago, it already claims more than 3 million users, and around 125 million files, with encryption remaining unbroken and most of the bugs fixed. Moreover, Dotcom promised mobile applications and sync client coming soon. Kim also revealed that the top 5 countries which account for the cyberlocker’s traffic are currently France, Spain, Brazil, Germany and the United States.

    Industry experts admit that Mega’s success was quite surprising, as the portal had 250,000 users registered within just a few hours since the launch of the portal. Soon, Dotcom’s new project outranked both RapidShare and Dropbox. In the meantime, Dotcom announced a week ago that his new cyberlocker will try to cover other areas of interests. He tweeted that in the coming years the service is going to expand from secure cloud storage to secure email, chat and voice, video and mobile service. What Dotcom is planning to do is to offer all of those services on a non-US server system, which would increase users’ security and privacy. Kim posted an official advice to everyone, recommending not to host anything on the servers located in the United States. Moreover, he wouldn’t recommend using the US-based email services, because the American government says if you do they can extradite you. We’ll see what kind of alternative Dotcom can offer to his 3 million subscribers.

  5. #5

    Re: Google Confused by Number Porn Phenomenon

    Security of Your File-Sharing Apps
    Added: Thursday, March 14th, 2013

    Security specialists have always claimed that file-sharing clients, video applications and social networking were all taking the best of your bandwidth, let alone the fact that they created a serious hole through which viruses and malware could get into your PC. Today this theory is tested by a network security company Palo Alto.

    Between May and December 2012, the security company has investigated the firewall logs of over 3.000 of its clients. According to the logs, the average network had contained 30 video apps, 19 file-sharing apps, and 17 social networking apps (like well-known Facebook and YouTube).

    These applications proved to consume only 20% of the available bandwidth. In addition, only 0.4% of the logs which contained threat warnings were discovered. Nevertheless, video applications proved to be consuming most of bandwidth (about 13% of the available bandwidth).

    This means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy. According to Palo Alto, a real security threat can be found within other popular apps, which account for 97% of all software exploits – Internet browsing, Microsoft SQL, MS SQL Monitor, MS Remote Procedure Call, SIP (VoIP), MS Office Communicator, Server Message Block, Active Directory, and DNS.

    The security company agrees that by using the abovementioned apps you can exploit a system without ever crossing a perimeter IPS, underscoring the importance of outfits that bring IPS and threat prevention measures deeper into the network and not exclusively monitoring at the perimeter. The author of the report, company’s senior research analyst Matt Keil, explained that the volume of exploits targeting business critical apps had been stunning and served as a data center security wake-up call.

  6. #6

    Re: Google Confused by Number Porn Phenomenon

    Don’t Freeze Your Ice Cream Sandwich
    Added: Sunday, March 24th, 2013

    German security researchers have found out some ways to make the Android phone with Ice Cream Sandwich talk. It turned out that if you torture an Android phone by freezing it you will be able to get around the encryption system which protects the information.

    Google has recently introduced the data scrambling system with the Android version called Ice Cream Sandwich. Insecurity researchers at Erlangen’s Friedrich-Alexander University tried to understand what would happen if they put an Ice Cream Sandwich in the freezer. They revealed that the OS didn’t like it at all and this move allowed the experts to get at contact lists, browsing histories and images.

    Although it’s great for law enforcement and forensics workers, it is not for ordinary users who put some trust in their phones to give them a little bit of privacy. Ironically enough, researchers Felix Freiling, Tilo Muller and Michael Spreitzenbarth called their technique FROST, which stands for Forensic Recovery Of Scrambled Telephones.

    Apparently, all they had to do was chill the cell phone to -10C to force it spill any secrets it was asked. The researchers found out that quickly connecting and disconnecting the battery of a frozen phone switched the device into a vulnerable mode.

    This flaw let the experts start it up with some custom-built software instead of its onboard Android OS. FROST helped the researchers copy information on a phone which then could then be analyzed on another computer. The matter is that in case the phone was chilled, information would fade from its memory much more slowly, which allowed the researchers to extract the encryption keys and speed up unscrambling the contents of a device.

    The experiment was made with a Samsung Galaxy Nexus phone, but it seems that any Android cell phone with the encryption system is vulnerable. This approach has also been tried on desktop computers and laptops earlier. The hopes were that it would work better on phones because they are smaller and don’t require a big refrigerator.

    At the moment, the German research group is developing defences against this approach which would ensure that encryption keys are never put on memory chips that are more vulnerable to cold.

  7. #7

    Re: Google Confused by Number Porn Phenomenon

    DirectX explained

    Ever wondered just what that enigmatic name means?

    Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache.


    To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion.

    DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson.

    DirectX history
    Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level.

    Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound.

    Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born.

    How it works
    At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on.

    From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes.

    Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming.

    DirectX versions
    The current version of DirectX at time of writing is DirectX 9.0. This runs on all versions of Windows from Windows 98 up to and including Windows Server 2003 along with every revision in between. It doesn’t run on Windows 95 though: if you have a machine with Windows 95 installed, you’re stuck with the older and less capable 8.0a. Windows NT 4 also requires a specific version – in this case, it’s DirectX 3.0a.

    With so many versions of DirectX available over the years, it becomes difficult to keep track of which version you need. In all but the most rare cases, all versions of DirectX are backwardly compatible – games which say they require DirectX 7 will happily run with more recent versions, but not with older copies. Many current titles explicitly state that they require DirectX 9, and won’t run without the latest version installed. This is because they make use of new features introduced with this version, although it has been known for lazy developers to specify the very latest version as a requirement when the game in question doesn’t use any of the new enhancements. Generally speaking though, if a title is version locked like this, you will need to upgrade before you can play. Improvements to the core DirectX code mean you may even see improvements in many titles when you upgrade to the latest build of DirectX. Downloading and installing DirectX need not be complex, either.

    Upgrading DirectX
    All available versions of Windows come with DirectX in one form or another as a core system component which cannot be removed, so you should always have at least a basic implementation of the system installed on your PC. However, many new games require the very latest version before they work properly, or even at all.

    Generally, the best place to install the latest version of DirectX from is the dedicated section of the Microsoft Web site, which is found at PC Games - Xbox.com. As we went to press, the most recent build available for general download was DirectX 9.0b. You can download either a simple installer which will in turn download the components your system requires as it installs, or download the complete distribution package in one go for later offline installation.

    Another good source for DirectX is games themselves. If a game requires a specific version, it’ll be on the installation CD and may even be installed automatically by the game’s installer itself. You won’t find it on magazine cover discs though, thanks to Microsoft’s licensing terms.

    Diagnosing problems

    Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place.

    The easiest way to use it is to open the Start Menu’s Run dialog, type in dxdiag and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here.

    The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.

  8. #8

    Re: Google Confused by Number Porn Phenomenon

    Evolution Of Computer Viruses History Of Viruses

    part 1


    Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

    Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

    However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

    At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

    Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

    From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.



    part 2


    This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
    Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

    When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

    One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

    Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

    Notoriety versus stealth

    For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.



    pat 3


    This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

    Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

    With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

    The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

    This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

    Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.



    part 4


    In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

    In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

    The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.

    Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

    After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this


    part 5


    Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

    These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

    Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

    According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

    On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

    In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

    In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

    - Virus antecessors: Core Wars

    As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

    Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

    - The new gurus of the 8-bits and the assembler language.

    The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

    This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

    Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.



    part 6


    Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

    In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

    DOS viruses

    The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

    Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

    Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

    Win16 viruses

    The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

    The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers- were identified.

    part 7

    This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

    While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

    Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

    With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

    At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

    Melissa and self-executing worms

    The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

    The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

    As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.
    ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
    almost all the trojan warm email malware is nothing new, just wrap in a new way to bypass security, if you can find a Little Black Book of Computer Viruses is copyright 1996 good read just google...
    Last edited by airdog07; April 2nd, 2013 at 02:46 AM.

  9. #9

    Re: Google Confused by Number Porn Phenomenon

    General Keyboard Shortcuts, General Keyboard Shortcuts

    General Keyboard Shortcuts
    CTRL+C (Copy)
    CTRL+X (Cut)
    CTRL+V (Paste)
    CTRL+Z (Undo)
    DELETE (Delete)
    SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
    CTRL while dragging an item (Copy the selected item)
    CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
    F2 key (Rename the selected item)
    CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
    CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
    CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
    CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
    CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
    SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
    CTRL+A (Select all)
    F3 key (Search for a file or a folder)
    ALT+ENTER (View the properties for the selected item)
    ALT+F4 (Close the active item, or quit the active program)
    ALT+ENTER (Display the properties of the selected object)
    ALT+SPACEBAR (Open the shortcut menu for the active window)
    CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
    ALT+TAB (Switch between the open items)
    ALT+ESC (Cycle through items in the order that they had been opened)
    F6 key (Cycle through the screen elements in a window or on the desktop)
    F4 key (Display the Address bar list in My Computer or Windows Explorer)
    SHIFT+F10 (Display the shortcut menu for the selected item)
    ALT+SPACEBAR (Display the System menu for the active window)
    CTRL+ESC (Display the Start menu)
    ALT+Underlined letter in a menu name (Display the corresponding menu)
    Underlined letter in a command name on an open menu (Perform the corresponding command)
    F10 key (Activate the menu bar in the active program)
    RIGHT ARROW (Open the next menu to the right, or open a submenu)
    LEFT ARROW (Open the next menu to the left, or close a submenu)
    F5 key (Update the active window)
    BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
    ESC (Cancel the current task)
    SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
    Dialog Box Keyboard Shortcuts
    CTRL+TAB (Move forward through the tabs)
    CTRL+SHIFT+TAB (Move backward through the tabs)
    TAB (Move forward through the options)
    SHIFT+TAB (Move backward through the options)
    ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
    ENTER (Perform the command for the active option or button)
    SPACEBAR (Select or clear the check box if the active option is a check box)
    Arrow keys (Select a button if the active option is a group of option buttons)
    F1 key (Display Help)
    F4 key (Display the items in the active list)
    BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
    Microsoft Natural Keyboard Shortcuts
    Windows Logo (Display or hide the Start menu)
    Windows Logo+BREAK (Display the System Properties dialog box)
    Windows Logo+D (Display the desktop)
    Windows Logo+M (Minimize all of the windows)
    Windows Logo+SHIFT+M (Restore the minimized windows)
    Windows Logo+E (Open My Computer)
    Windows Logo+F (Search for a file or a folder)
    CTRL+Windows Logo+F (Search for computers)
    Windows Logo+F1 (Display Windows Help)
    Windows Logo+ L (Lock the keyboard)
    Windows Logo+R (Open the Run dialog box)
    Windows Logo+U (Open Utility Manager)
    Accessibility Keyboard Shortcuts
    Right SHIFT for eight seconds (Switch FilterKeys either on or off)
    Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
    Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
    SHIFT five times (Switch the StickyKeys either on or off)
    NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
    Windows Logo +U (Open Utility Manager)
    Windows Explorer Keyboard Shortcuts
    END (Display the bottom of the active window)
    HOME (Display the top of the active window)
    NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
    NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
    NUM LOCK+Minus sign (-) (Collapse the selected folder)
    LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
    RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
    Shortcut Keys for Character Map
    After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
    RIGHT ARROW (Move to the right or to the beginning of the next line)
    LEFT ARROW (Move to the left or to the end of the previous line)
    UP ARROW (Move up one row)
    DOWN ARROW (Move down one row)
    PAGE UP (Move up one screen at a time)
    PAGE DOWN (Move down one screen at a time)
    HOME (Move to the beginning of the line)
    END (Move to the end of the line)
    CTRL+HOME (Move to the first character)
    CTRL+END (Move to the last character)
    SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
    Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
    CTRL+O (Open a saved console)
    CTRL+N (Open a new console)
    CTRL+S (Save the open console)
    CTRL+M (Add or remove a console item)
    CTRL+W (Open a new window)
    F5 key (Update the content of all console windows)
    ALT+SPACEBAR (Display the MMC window menu)
    ALT+F4 (Close the console)
    ALT+A (Display the Action menu)
    ALT+V (Display the View menu)
    ALT+F (Display the File menu)
    ALT+O (Display the Favorites menu)
    MMC Console Window Keyboard Shortcuts
    CTRL+P (Print the current page or active pane)
    ALT+Minus sign (-) (Display the window menu for the active console window)
    SHIFT+F10 (Display the Action shortcut menu for the selected item)
    F1 key (Open the Help topic, if any, for the selected item)
    F5 key (Update the content of all console windows)
    CTRL+F10 (Maximize the active console window)
    CTRL+F5 (Restore the active console window)
    ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
    F2 key (Rename the selected item)
    CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
    Remote Desktop Connection Navigation
    CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
    ALT+PAGE UP (Switch between programs from left to right)
    ALT+PAGE DOWN (Switch between programs from right to left)
    ALT+INSERT (Cycle through the programs in most recently used order)
    ALT+HOME (Display the Start menu)
    CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
    ALT+DELETE (Display the Windows menu)
    CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
    CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
    Microsoft Internet Explorer Navigation
    CTRL+B (Open the Organize Favorites dialog box)
    CTRL+E (Open the Search bar)
    CTRL+F (Start the Find utility)
    CTRL+H (Open the History bar)
    CTRL+I (Open the Favorites bar)
    CTRL+L (Open the Open dialog box)
    CTRL+N (Start another instance of the browser with the same Web address)
    CTRL+O (Open the Open dialog box, the same as CTRL+L)
    CTRL+P (Open the Print dialog box)
    CTRL+R (Update the current Web page)
    CTRL+W (Close the current window)

  10. #10

    Re: Google Confused by Number Porn Phenomenon

    How To Get Top Ranking, Search Engines

    The tutorial is all about getting your site listed on top in Search Engines i.e Search Engine Optimization

    First thing you need to do is find the keywords you want to optimize for.

    There is great tool by Overture (/http://inventory.overture.com/d/sea...ory/suggestion/)

    But I would suggest using this free tool called GoodKeywords (/http://www.goodkeywords.com/products/gkw/)

    This one does the same job as Overture does but it also supports other Search Engines (Lycos and Teoma etc..)

    For example if you want to optimize for the keyword "tech news", just search for the keyword in any of the tools specified above... It would show you keywords related to that and not of the searches..

    Pick the keywords which are related to your site.

    For example when you search for "Tech News" you'll see the following results:

    Count Search Term
    11770 tech news
    351 itt news tech
    191 high tech news
    60 news tech texas
    49 computer tech news
    42 bio news tech
    34 in itt news tech
    30 news tech virginia
    29 asia news tech
    25 hi tech news
    25 sci tech news

    Now see what other terms are related to your keyword technology news

    Do couple of searches like that and note down around 15-20 keywords.
    Then, keep the keywords which are searched most on the top.

    Now you need Title Tag for the page.

    Title tag should include top 3 keywords, like for "tech news" it can be like :

    "Latest Tech News, Information Technology News and Other computer raleted news here."

    Remember that characters should not be more than 95 and should not have more than 3 "," commas - some search engines might cosider more than 3 commas as spam

    Now move on to Meta Tags

    You need following Meta Tags in web page

    <META http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
    <META name="keywords" content="keyword1,keyword2,keyword3">
    <META name="description" content="brief description about the site">
    <META name="robots" Content="Index,Follow">


    No need to have other meta tags like abstract, re-visit and all, most people dont read it.

    Now...

    <META http-equiv="Content-Type" content="text/html; charset=iso-8859-1">

    This tag is tells content type is html and character set used it iso-8859-1 there are other character sets also but this is the one mosty used..

    <META name="keywords" content="keyword1,keyword2,keyword3">

    This one should have all your keywords inside starting from keyword with most counts...

    keyword tag for our example would be something like :

    <META name="keywords" content="tech news,technology news, computer technology news,information technology,software news">

    Remember to put around 15-20 keywords max not more than that. Dont repeat keywords or dont put keywords like, "tech news", "info tech news", "latest tech news" and so on...

    <META name="description" content="brief description about the site">

    Provide short decription about your site and include all the keywords mentioned in the title tag.

    Decription tag should be:

    <META name="description" content="One Stop for Latest Tech News, Information Technology News, Computer Related and Software news.">

    It can be upto 255 characters and avoid using more than 3 "," commas

    <META name="robots" Content="Index,Follow">

    This is used for search robots..following explanation will help you :

    index,follow = index the page as well as follow the links
    noindex,follow = dont index the page but follow the links
    index,nofollow = index the page but dont follow the links
    noindex,nofollow = dont index page, dont follow the links
    all = same as index,follow
    none = same as noindex,nofollow

    Now move on to body part of the page

    Include all top 3 keywords here,
    I would suggest to break the keyword and use it...

    For example

    YourSiteName.com one stop for all kind of Latest Tech News and Computer Related information and reviews.................

    Include main keywords in <h#> tags <h1><h2> etc..
    and start with <h1> and then move to <h2> <h3> etc..

    <h1> tag will be too big but CSS can help you there, define small font size in css for H1,H2,... tags

    When done with page copy, then you need to provide title and alt tags for images and links.

    Use some keywords in the tags but dont add all the keywords and if not neccessary then dont use keywords in it, basically it should explain what is image all about.

    Remember to add Top keyword atleast 4 times in the body and other 2 keywords thrice and twice respectively.

    Now move on to Footer Part
    Try to include top keywords here and see the effect, use site keywords as links i.e.

    <a href="news.php">Tech News</a> <a href="software-news.php">Software News</a> etc..

    Now finally, you need to read some more stuff..may be you can all it as bottom lines...

    Site Map - This is page where you need to put all the links present in your site, this is will help Search Engines to find the links easily and also provide link for site map in footer, as search engines start scanning the page from bottom.

    Robots.txt - This file contains address of directories which should not be scanned by search engines.. more info can be found here : /http://www.robotstxt.org/wc/exclusion.html search engines line google, yahoo ask for robots.txt file.

    Valid HTML - Your code should have valid html and doc type, Its kind of diffucult to follow all the standards but you can atleast open and close all the tags properly, you can check your page's html online here : /http://validator.w3.org/ or you can use this free software called HTML Tidy : /http://tidy.sourceforge.net/

    All done now, you just need to check your site with this script, its called SEO Doctor : /http://www.instantposition.com/seo_doctor.cfm

    It'll show you the report of your site with solution.

    Now, correct the errors and start submitting the site :

    Start with google : /http://google.com/addurl.html
    then yahoo : /http://submit.search.yahoo.com/free/request
    then move to altavista,alltheweb and other search engies..

    Also submit your site to direcories like /http://dmoz.org , /http://jayde.com etc...
    Dmoz is must, as google, yahoo and may more search engines uses same directory

    And remember, dont try to SPAM with keywords in these directories, dmoz is handled by Human Editors

    Submitted the sites, but still i cant see you site on top?

    Wait for sometime may be a month or so but keep an eye on your search term, use /http://GoogleAlert.com - this will show whenever google updates for your keywords, it will mail you the new results.

    And also check whether your site is listed on google..
    use this tool called Google Monitor, it can be downloaded for free from : /http://www.cleverstat.com/google-monitor.htm

  11. #11

    Re: Google Confused by Number Porn Phenomenon

    terminal server port

    portnumber 0x0000d3d

    To change the default port for all new connections created on the Terminal Server:

    Run Regedt32 and go to this key:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
    NOTE: The above registry key is one path; it has been wrapped for readability.

    Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389). Modify the port number in Hex and save the new value.

    To change the port for a specific connection on the Terminal Server:
    Run Regedt32 and go to this key:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\connection
    NOTE: The above registry key is one path; it has been wrapped for readability.
    Find the "PortNumber" subkey and notice the value of 00000D3D, hex for (3389). Modify the port number in Hex and save the new value.

    NOTE: Because the use of alternate ports has not been fully implemented for Terminal Server 4.0, support will be provided as "reasonable effort" only, and Microsoft may require you to set the port back to 3389, if any problems occur

  12. #12

    Re: Google Confused by Number Porn Phenomenon

    If you feel your computer is acting strangly or you connection is slow just go to Start>Run>Type cmd>then type netstat -an and if you see a dangerous Ip according to the guide below then you computer is infected or being hacked.

    Guide:
    port 0 REx
    port 1 (UDP) - Sockets des Troie
    port 2 Death
    port 5 yoyo
    port 11 Skun
    port 16 Skun
    port 17 Skun
    port 18 Skun
    port 19 Skun
    port 20 Amanda

    port 21 ADM worm, Back Construction, Blade Runner, BlueFire, Bmail, Cattivik FTP Server, CC Invader, Dark FTP, Doly Trojan, FreddyK, Invisible FTP, KWM, MscanWorm, NerTe, NokNok, Pinochet, Ramen, Reverse Trojan, RTB 666, The Flu, WinCrash, Voyager Alpha Force

    port 22 InCommand, Shaft, Skun
    p
    ort 23 ADM worm, Aphex's Remote Packet Sniffer , AutoSpY, ButtMan, Fire HacKer, My Very Own trojan, Pest, RTB 666, Tiny Telnet Server - TTS, Truva Atl

    port 25 Antigen, Barok, BSE, Email Password Sender , Gip, Laocoon, Magic Horse, MBT , Moscow Email trojan, Nimda, Shtirlitz, Stukach, Tapiras, WinPC

    port 27 Assasin
    port 28 Amanda
    port 30 Agent 40421
    port 31 Agent 40421, Masters Paradise, Skun
    port 37 ADM worm
    port 39 SubSARI
    port 41 Deep Throat , Foreplay
    port 44 Arctic
    port 51 f**k Lamers Backdoor
    port 52 MuSka52, Skun
    port 53 ADM worm, li0n, MscanWorm, MuSka52
    port 54 MuSka52
    port 66 AL-Bareki
    port 69 BackGate Kit, Nimda, Pasana, Storm, Storm worm, Theef
    port 69 (UDP) - Pasana
    port 70 ADM worm
    port 79 ADM worm, Firehotcker

    port 80 711 trojan (Seven Eleven), AckCmd, BlueFire, Cafeini, Duddie, Executor, God Message, Intruzzo , Latinus, Lithium, MscanWorm, NerTe, Nimda, Noob, Optix Lite, Optix Pro , Power, Ramen, Remote Shell , Reverse WWW Tunnel Backdoor , RingZero, RTB 666, Scalper, Screen Cutter , Seeker, Slapper, Web Server CT , WebDownloader

    port 80 (UDP) - Penrox
    port 81 Asylum
    port 101 Skun
    port 102 Delf, Skun
    port 103 Skun
    port 105 NerTe
    port 107 Skun
    port 109 ADM worm
    port 110 ADM worm
    port 111 ADM worm, MscanWorm
    port 113 ADM worm, Alicia, Cyn, DataSpy Network X, Dosh, Gibbon, Taskman
    port 120 Skun
    port 121 Attack Bot, God Message, JammerKillah
    port 123 Net Controller
    port 137 Chode, Nimda
    port 137 (UDP) - Bugbear, Msinit, Opaserv, Qaz
    port 138 Chode, Nimda
    port 139 Chode, Fire HacKer, Msinit, Nimda, Opaserv, Qaz
    port 143 ADM worm
    port 146 Infector
    port 146 (UDP) - Infector
    port 166 NokNok
    port 170 A-trojan
    port 171 A-trojan
    port 200 CyberSpy
    port 201 One Windows Trojan
    port 202 One Windows Trojan, Skun
    port 211 One Windows Trojan
    port 212 One Windows Trojan
    port 221 Snape
    port 222 NeuroticKat, Snape
    port 230 Skun
    port 231 Skun
    port 232 Skun
    port 285 Delf
    port 299 One Windows Trojan
    port 334 Backage
    port 335 Nautical
    port 370 NeuroticKat
    port 400 Argentino
    port 401 One Windows Trojan
    port 402 One Windows Trojan
    port 411 Backage
    port 420 Breach
    port 443 Slapper
    port 445 Nimda
    port 455 Fatal Connections
    port 511 T0rn Rootkit
    port 513 ADM worm
    port 514 ADM worm
    port 515 MscanWorm, Ramen
    port 520 (UDP) - A UDP backdoor
    port 555 711 trojan (Seven Eleven), Phase Zero, Phase-0
    port 564 Oracle
    port 589 Assasin
    port 600 SweetHeart
    port 623 RTB 666
    port 635 ADM worm
    port 650 Assasin
    port 661 NokNok

    port 666 Attack FTP, Back Construction, BLA trojan, NokNok, Reverse Trojan, Shadow Phyre, Unicorn, yoyo

    port 667 NokNok, SniperNet
    port 668 Unicorn
    port 669 DP trojan , SniperNet
    port 680 RTB 666
    port 692 GayOL
    port 700 REx
    port 777 Undetected
    port 798 Oracle
    port 808 WinHole
    port 831 NeuroticKat
    port 901 Net-Devil, Pest
    port 902 Net-Devil, Pest
    port 903 Net-Devil
    port 911 Dark Shadow, Dark Shadow
    port 956 Crat Pro
    port 991 Snape
    port 992 Snape
    port 999 Deep Throat , Foreplay
    port 1000 Der Späher / Der Spaeher, Direct Connection, GOTHIC Intruder , Theef

    port 1001 Der Späher / Der Spaeher, GOTHIC Intruder , Lula, One Windows Trojan, Theef

    port 1005 Pest, Theef
    port 1008 AutoSpY, li0n
    port 1010 Doly Trojan
    port 1011 Doly Trojan
    port 1012 Doly Trojan
    port 1015 Doly Trojan
    port 1016 Doly Trojan
    port 1020 Vampire

    port 1024 Latinus, Lithium, NetSpy, Ptakks

    port 1025 AcidkoR, BDDT, DataSpy Network X, Fraggle Rock , KiLo, MuSka52, NetSpy, Optix Pro , Paltalk, Ptakks, Real 2000, Remote Anything, Remote Explorer Y2K, Remote Storm, RemoteNC

    port 1025 (UDP) - KiLo, Optix Pro , Ptakks, Real 2000, Remote Anything, Remote Explorer Y2K, Remote Storm, Yajing

    port 1026 BDDT, Dark IRC, DataSpy Network X, Delta Remote Access , Dosh, Duddie, IRC Contact, Remote Explorer 2000, RUX The TIc.K

    port 1026 (UDP) - Remote Explorer 2000
    port 1027 Clandestine, DataSpy Network X, KiLo, UandMe
    port 1028 DataSpy Network X, Dosh, Gibbon, KiLo, KWM, Litmus, Paltalk, SubSARI
    port 1028 (UDP) - KiLo, SubSARI
    port 1029 Clandestine, KWM, Litmus, SubSARI
    port 1029 (UDP) - SubSARI
    port 1030 Gibbon, KWM
    port 1031 KWM, Little Witch, Xanadu, Xot
    port 1031 (UDP) - Xot
    port 1032 Akosch4, Dosh, KWM
    port 1032 (UDP) - Akosch4
    port 1033 Dosh, KWM, Little Witch, Net Advance
    port 1034 KWM
    port 1035 Dosh, KWM, RemoteNC, Truva Atl
    port 1036 KWM
    port 1037 Arctic , Dosh, KWM, MoSucker
    port 1039 Dosh
    port 1041 Dosh, RemoteNC
    port 1042 BLA trojan
    port 1042 (UDP) - BLA trojan
    port 1043 Dosh
    port 1044 Ptakks
    port 1044 (UDP) - Ptakks
    port 1047 RemoteNC
    port 1049 Delf, The Hobbit Daemon
    port 1052 Fire HacKer, Slapper, The Hobbit Daemon
    port 1053 The Thief
    port 1054 AckCmd, RemoteNC
    port 1080 SubSeven 2.2, WinHole
    port 1081 WinHole
    port 1082 WinHole
    port 1083 WinHole
    port 1092 Hvl RAT
    port 1095 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
    port 1097 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
    port 1098 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
    port 1099 Blood Fest Evolution, Hvl RAT, Remote Administration Tool - RAT
    port 1104 (UDP) - RexxRave
    port 1111 Daodan, Ultors Trojan
    port 1111 (UDP) - Daodan
    port 1115 Lurker, Protoss
    port 1116 Lurker
    port 1116 (UDP) - Lurker
    port 1122 Last 2000, Singularity
    port 1122 (UDP) - Last 2000, Singularity
    port 1133 SweetHeart
    port 1150 Orion
    port 1151 Orion
    port 1160 BlackRat
    port 1166 CrazzyNet
    port 1167 CrazzyNet
    port 1170 Psyber Stream Server , Voice
    port 1180 Unin68
    port 1183 Cyn, SweetHeart
    port 1183 (UDP) - Cyn, SweetHeart
    port 1200 (UDP) - NoBackO
    port 1201 (UDP) - NoBackO
    port 1207 SoftWAR
    port 1208 Infector
    port 1212 Kaos
    port 1215 Force
    port 1218 Force
    port 1219 Force
    port 1221 f**k Lamers Backdoor
    port 1222 f**k Lamers Backdoor
    port 1234 KiLo, Ultors Trojan
    port 1243 BackDoor-G, SubSeven , Tiles
    port 1245 VooDoo Doll
    port 1255 Scarab
    port 1256 Project nEXT, RexxRave
    port 1272 The Matrix
    port 1313 NETrojan
    port 1314 Daodan
    port 1349 BO dll
    port 1369 SubSeven 2.2
    port 1386 Dagger
    port 1415 Last 2000, Singularity
    port 1433 Voyager Alpha Force
    port 1441 Remote Storm
    port 1492 FTP99CMP
    port 1524 Trinoo
    port 1560 Big Gluck, Duddie
    port 1561 (UDP) - MuSka52
    port 1600 Direct Connection
    port 1601 Direct Connection
    port 1602 Direct Connection
    port 1703 Exploiter
    port 1711 yoyo
    port 1772 NetControle
    port 1772 (UDP) - NetControle
    port 1777 Scarab
    port 1826 Glacier
    port 1833 TCC
    port 1834 TCC
    port 1835 TCC
    port 1836 TCC
    port 1837 TCC
    port 1905 Delta Remote Access
    port 1911 Arctic
    port 1966 Fake FTP
    port 1967 For Your Eyes Only , WM FTP Server
    port 1978 (UDP) - Slapper
    port 1981 Bowl, Shockrave
    port 1983 Q-taz
    port 1984 Intruzzo , Q-taz
    port 1985 Black Diver, Q-taz
    port 1985 (UDP) - Black Diver
    port 1986 Akosch4
    port 1991 PitFall
    port 1999 Back Door, SubSeven , TransScout

    port 2000 A-trojan, Der Späher / Der Spaeher, Fear, Force, GOTHIC Intruder , Last 2000, Real 2000, Remote Explorer 2000, Remote Explorer Y2K, Senna Spy Trojan Generator, Singularity

    port 2000 (UDP) - GOTHIC Intruder , Real 2000, Remote Explorer 2000, Remote Explorer Y2K

    port 2001 Der Späher / Der Spaeher, Duddie, Glacier, Protoss, Senna Spy Trojan Generator, Singularity, Trojan Cow

    port 2001 (UDP) - Scalper
    port 2002 Duddie, Senna Spy Trojan Generator, Sensive
    port 2002 (UDP) - Slapper
    port 2004 Duddie
    port 2005 Duddie
    port 2023 Ripper Pro
    port 2060 Protoss
    port 2080 WinHole
    port 2101 SweetHeart
    port 2115 Bugs
    port 2130 (UDP) - Mini BackLash
    port 2140 The Invasor
    port 2140 (UDP) - Deep Throat , Foreplay , The Invasor
    port 2149 Deep Throat
    port 2150 R0xr4t
    port 2156 Oracle
    port 2222 SweetHeart, Way
    port 2222 (UDP) - SweetHeart, Way
    port 2281 Nautical
    port 2283 Hvl RAT
    port 2300 Storm
    port 2311 Studio 54
    port 2330 IRC Contact
    port 2331 IRC Contact
    port 2332 IRC Contact, Silent Spy
    port 2333 IRC Contact
    port 2334 IRC Contact, Power
    port 2335 IRC Contact
    port 2336 IRC Contact
    port 2337 IRC Contact, The Hobbit Daemon
    port 2338 IRC Contact
    port 2339 IRC Contact, Voice Spy
    port 2339 (UDP) - Voice Spy
    port 2343 Asylum
    port 2345 Doly Trojan
    port 2407 yoyo
    port 2418 Intruzzo
    port 2555 li0n, T0rn Rootkit
    port 2565 Striker trojan
    port 2583 WinCrash
    port 2589 Dagger
    port 2600 Digital RootBeer
    port 2702 Black Diver
    port 2702 (UDP) - Black Diver
    port 2772 SubSeven
    port 2773 SubSeven , SubSeven 2.1 Gold
    port 2774 SubSeven , SubSeven 2.1 Gold
    port 2800 Theef
    port 2929 Konik
    port 2983 Breach
    port 2989 (UDP) - Remote Administration Tool - RAT
    port 3000 InetSpy, Remote Shut, Theef
    port 3006 Clandestine
    port 3024 WinCrash
    port 3031 MicroSpy
    port 3119 Delta Remote Access
    port 3128 Reverse WWW Tunnel Backdoor , RingZero
    port 3129 Masters Paradise
    port 3131 SubSARI
    port 3150 Deep Throat , The Invasor, The Invasor
    port 3150 (UDP) - Deep Throat , Foreplay , Mini BackLash
    port 3215 XHX
    port 3215 (UDP) - XHX
    port 3292 Xposure
    port 3295 Xposure
    port 3333 Daodan
    port 3333 (UDP) - Daodan
    port 3410 Optix Pro
    port 3417 Xposure
    port 3418 Xposure
    port 3456 Fear, Force, Terror trojan
    port 3459 Eclipse 2000, Sanctuary
    port 3505 AutoSpY
    port 3700 Portal of Doom
    port 3721 Whirlpool
    port 3723 Mantis
    port 3777 PsychWard
    port 3791 Total Solar Eclypse
    port 3800 Total Solar Eclypse
    port 3801 Total Solar Eclypse
    port 3945 Delta Remote Access
    port 3996 Remote Anything
    port 3996 (UDP) - Remote Anything
    port 3997 Remote Anything
    port 3999 Remote Anything
    port 4000 Remote Anything, SkyDance
    port 4092 WinCrash
    port 4128 RedShad
    port 4128 (UDP) - RedShad
    port 4156 (UDP) - Slapper
    port 4201 War trojan
    port 4210 Netkey
    port 4211 Netkey
    port 4225 Silent Spy
    port 4242 Virtual Hacking Machine - VHM
    port 4315 Power
    port 4321 BoBo
    port 4414 AL-Bareki
    port 4442 Oracle
    port 4444 CrackDown, Oracle, Prosiak, Swift Remote
    port 4445 Oracle
    port 4447 Oracle
    port 4449 Oracle
    port 4451 Oracle
    port 4488 Event Horizon
    port 4567 File Nail
    port 4653 Cero
    port 4666 Mneah
    port 4700 Theef
    port 4836 Power
    port 5000 Back Door Setup, Bubbel, Ra1d, Sockets des Troie
    port 5001 Back Door Setup, Sockets des Troie
    port 5002 Shaft
    port 5005 Aladino
    port 5011 Peanut Brittle
    port 5025 WM Remote KeyLogger
    port 5031 Net Metropolitan
    port 5032 Net Metropolitan
    port 5050 R0xr4t
    port 5135 Bmail
    port 5150 Pizza
    port 5151 Optix Lite
    port 5152 Laphex
    port 5155 Oracle
    port 5221 NOSecure
    port 5250 Pizza
    port 5321 Firehotcker
    port 5333 Backage
    port 5350 Pizza
    port 5377 Iani
    port 5400 Back Construction, Blade Runner, Digital Spy
    port 5401 Back Construction, Blade Runner, Digital Spy , Mneah
    port 5402 Back Construction, Blade Runner, Digital Spy , Mneah
    port 5418 DarkSky
    port 5419 DarkSky
    port 5419 (UDP) - DarkSky
    port 5430 Net Advance
    port 5450 Pizza
    port 5503 Remote Shell
    port 5534 The Flu
    port 5550 Pizza
    port 5555 Daodan, NoXcape
    port 5555 (UDP) - Daodan
    port 5556 BO Facil
    port 5557 BO Facil
    port 5569 Robo-Hack
    port 5650 Pizza
    port 5669 SpArTa
    port 5679 Nautical
    port 5695 Assasin
    port 5696 Assasin
    port 5697 Assasin
    port 5742 WinCrash
    port 5802 Y3K RAT
    port 5873 SubSeven 2.2
    port 5880 Y3K RAT
    port 5882 Y3K RAT
    port 5882 (UDP) - Y3K RAT
    port 5888 Y3K RAT
    port 5888 (UDP) - Y3K RAT
    port 5889 Y3K RAT
    port 5933 NOSecure
    port 6000 Aladino, NetBus , The Thing
    port 6006 Bad Blood
    port 6267 DarkSky
    port 6400 The Thing
    port 6521 Oracle
    port 6526 Glacier
    port 6556 AutoSpY
    port 6661 Weia-Meia
    port 6666 AL-Bareki, KiLo, SpArTa
    port 6666 (UDP) - KiLo

    port 6667 Acropolis, BlackRat, Dark FTP, Dark IRC, DataSpy Network X, Gunsan, InCommand, Kaitex, KiLo, Laocoon, Net-Devil, Reverse Trojan, ScheduleAgent, SlackBot, SubSeven , Subseven 2.1.4 DefCon 8, Trinity, Y3K RAT, yoyo

    port 6667 (UDP) - KiLo
    port 6669 Host Control, Vampire, Voyager Alpha Force
    port 6670 BackWeb Server, Deep Throat , Foreplay , WinNuke eXtreame
    port 6697 Force

    port 6711 BackDoor-G, Duddie, KiLo, Little Witch, Netkey, Spadeace, SubSARI, SubSeven , SweetHeart, UandMe, Way, VP Killer

    port 6712 Funny trojan, KiLo, Spadeace, SubSeven
    port 6713 KiLo, SubSeven
    port 6714 KiLo
    port 6715 KiLo
    port 6718 KiLo
    port 6723 Mstream
    port 6766 KiLo
    port 6766 (UDP) - KiLo
    port 6767 KiLo, Pasana, UandMe
    port 6767 (UDP) - KiLo, UandMe
    port 6771 Deep Throat , Foreplay
    port 6776 2000 Cracks, BackDoor-G, SubSeven , VP Killer
    port 6838 (UDP) - Mstream
    port 6891 Force
    port 6912 Shit Heep

    port 6969 2000 Cracks, BlitzNet, Dark IRC, GateCrasher, Kid Terror, Laphex, Net Controller, SpArTa, Vagr Nocker

    port 6970 GateCrasher
    port 7000 Aladino, Gunsan, Remote Grab, SubSeven , SubSeven 2.1 Gold, Theef
    port 7001 Freak88, Freak2k
    port 7007 Silent Spy
    port 7020 Basic Hell
    port 7030 Basic Hell
    port 7119 Massaker
    port 7215 SubSeven , SubSeven 2.1 Gold
    port 7274 AutoSpY
    port 7290 NOSecure
    port 7291 NOSecure
    port 7300 NetSpy
    port 7301 NetSpy
    port 7306 NetSpy
    port 7307 NetSpy, Remote Process Monitor
    port 7308 NetSpy, X Spy
    port 7312 Yajing
    port 7410 Phoenix II
    port 7424 Host Control
    port 7424 (UDP) - Host Control
    port 7597 Qaz
    port 7626 Glacier
    port 7648 XHX
    port 7673 Neoturk
    port 7676 Neoturk
    port 7677 Neoturk
    port 7718 Glacier
    port 7722 KiLo
    port 7777 God Message
    port 7788 Last 2000, Last 2000, Singularity
    port 7788 (UDP) - Singularity
    port 7789 Back Door Setup
    port 7800 Paltalk
    port 7826 Oblivion
    port 7850 Paltalk
    port 7878 Paltalk
    port 7879 Paltalk
    port 7979 Vagr Nocker
    port 7983 (UDP) - Mstream
    port 8011 Way
    port 8012 Ptakks
    port 8012 (UDP) - Ptakks
    port 8080 Reverse WWW Tunnel Backdoor , RingZero, Screen Cutter
    port 8090 Aphex's Remote Packet Sniffer
    port 8090 (UDP) - Aphex's Remote Packet Sniffer
    port 8097 Kryptonic Ghost Command Pro
    port 8100 Back streets
    port 8110 DLP
    port 8111 DLP
    port 8127 9_119, Chonker
    port 8127 (UDP) - 9_119, Chonker
    port 8130 9_119, Chonker, DLP
    port 8131 DLP
    port 8301 DLP
    port 8302 DLP
    port 8311 SweetHeart
    port 8322 DLP
    port 8329 DLP
    port 8488 (UDP) - KiLo
    port 8489 KiLo
    port 8489 (UDP) - KiLo
    port 8685 Unin68
    port 8732 Kryptonic Ghost Command Pro
    port 8734 AutoSpY
    port 8787 Back Orifice 2000
    port 8811 Fear
    port 8812 FraggleRock Lite
    port 8821 Alicia
    port 8848 Whirlpool
    port 8864 Whirlpool
    port 8888 Dark IRC
    port 9000 Netministrator
    port 9090 Aphex's Remote Packet Sniffer
    port 9117 Massaker
    port 9148 Nautical
    port 9301 DLP
    port 9325 (UDP) - Mstream
    port 9329 DLP
    port 9400 InCommand
    port 9401 InCommand
    port 9536 Lula
    port 9561 Crat Pro
    port 9563 Crat Pro
    port 9870 Remote Computer Control Center
    port 9872 Portal of Doom
    port 9873 Portal of Doom
    port 9874 Portal of Doom
    port 9875 Portal of Doom
    port 9876 Rux
    port 9877 Small Big Brother
    port 9878 Small Big Brother, TransScout
    port 9879 Small Big Brother
    port 9919 Kryptonic Ghost Command Pro
    port 9999 BlitzNet, Oracle, Spadeace
    port 10000 Oracle, TCP Door, XHX
    port 10000 (UDP) - XHX
    port 10001 DTr, Lula
    port 10002 Lula
    port 10003 Lula
    port 10008 li0n
    port 10012 Amanda
    port 10013 Amanda
    port 10067 Portal of Doom
    port 10067 (UDP) - Portal of Doom
    port 10084 Syphillis
    port 10084 (UDP) - Syphillis
    port 10085 Syphillis
    port 10086 Syphillis
    port 10100 Control Total, GiFt trojan, Scalper
    port 10100 (UDP) - Slapper
    port 10167 Portal of Doom
    port 10167 (UDP) - Portal of Doom
    port 10498 (UDP) - Mstream
    port 10520 Acid Shivers
    port 10528 Host Control
    port 10607 Coma
    port 10666 (UDP) - Ambush
    port 10887 BDDT
    port 10889 BDDT
    port 11000 DataRape, Senna Spy Trojan Generator
    port 11011 Amanda
    port 11050 Host Control
    port 11051 Host Control
    port 11111 Breach
    port 11223 Progenic trojan, Secret Agent
    port 11225 Cyn
    port 11225 (UDP) - Cyn
    port 11660 Back streets
    port 11718 Kryptonic Ghost Command Pro
    port 11831 DarkFace, DataRape, Latinus, Pest, Vagr Nocker
    port 11977 Cool Remote Control
    port 11978 Cool Remote Control
    port 11980 Cool Remote Control
    port 12000 Reverse Trojan
    port 12310 PreCursor
    port 12321 Protoss
    port 12321 (UDP) - Protoss
    port 12345 Ashley, BlueIce 2000, Mypic , NetBus , Pie Bill Gates, Q-taz , Sensive, Snape, Vagr Nocker, ValvNet , Whack Job
    port 12345 (UDP) - BlueIce 2000
    port 12346 NetBus
    port 12348 BioNet
    port 12349 BioNet, The Saint
    port 12361 Whack-a-mole
    port 12362 Whack-a-mole
    port 12363 Whack-a-mole
    port 12623 ButtMan
    port 12623 (UDP) - ButtMan, DUN Control
    port 12624 ButtMan, Power
    port 12631 Whack Job
    port 12684 Power
    port 12754 Mstream
    port 12904 Rocks
    port 13000 Senna Spy Trojan Generator, Senna Spy Trojan Generator
    port 13013 PsychWard
    port 13014 PsychWard
    port 13028 Back streets
    port 13079 Kryptonic Ghost Command Pro
    port 13370 SpArTa
    port 13371 Optix Pro
    port 13500 Theef
    port 13753 Anal FTP
    port 14194 CyberSpy
    port 14285 Laocoon
    port 14286 Laocoon
    port 14287 Laocoon
    port 14500 PC Invader
    port 14501 PC Invader
    port 14502 PC Invader
    port 14503 PC Invader
    port 15000 In Route to the Hell, R0xr4t
    port 15092 Host Control
    port 15104 Mstream
    port 15206 KiLo
    port 15207 KiLo
    port 15210 (UDP) - UDP remote shell backdoor server
    port 15382 SubZero
    port 15432 Cyn
    port 15485 KiLo
    port 15486 KiLo
    port 15486 (UDP) - KiLo
    port 15500 In Route to the Hell
    port 15512 Iani
    port 15551 In Route to the Hell
    port 15695 Kryptonic Ghost Command Pro
    port 15845 (UDP) - KiLo
    port 15852 Kryptonic Ghost Command Pro
    port 16057 MoonPie
    port 16484 MoSucker
    port 16514 KiLo
    port 16514 (UDP) - KiLo
    port 16515 KiLo
    port 16515 (UDP) - KiLo
    port 16523 Back streets
    port 16660 Stacheldraht
    port 16712 KiLo
    port 16761 Kryptonic Ghost Command Pro
    port 16959 SubSeven , Subseven 2.1.4 DefCon 8
    port 17166 Mosaic
    port 17449 Kid Terror
    port 17499 CrazzyNet
    port 17500 CrazzyNet
    port 17569 Infector
    port 17593 AudioDoor
    port 17777 Nephron
    port 18753 (UDP) - Shaft
    port 19191 BlueFire
    port 19216 BackGate Kit
    port 20000 Millenium, PSYcho Files, XHX
    port 20001 Insect, Millenium, PSYcho Files
    port 20002 AcidkoR, PSYcho Files
    port 20005 MoSucker
    port 20023 VP Killer
    port 20034 NetBus 2.0 Pro, NetBus 2.0 Pro Hidden, Whack Job
    port 20331 BLA trojan
    port 20432 Shaft
    port 20433 (UDP) - Shaft
    port 21212 Sensive
    port 21544 GirlFriend, Kid Terror
    port 21554 Exploiter, FreddyK, Kid Terror, Schwindler, Sensive, Winsp00fer
    port 21579 Breach
    port 21957 Latinus
    port 22115 Cyn
    port 22222 Donald Dick, G.R.O.B., Prosiak, Ruler, RUX The TIc.K
    port 22223 RUX The TIc.K
    port 22456 Clandestine
    port 22554 Schwindler
    port 22783 Intruzzo
    port 22784 Intruzzo
    port 22785 Intruzzo
    port 23000 Storm worm
    port 23001 Storm worm
    port 23005 NetTrash, Oxon
    port 23006 NetTrash, Oxon
    port 23023 Logged
    port 23032 Amanda
    port 23321 Konik
    port 23432 Asylum
    port 23456 Clandestine, Evil FTP, Vagr Nocker, Whack Job
    port 23476 Donald Dick
    port 23476 (UDP) - Donald Dick
    port 23477 Donald Dick
    port 23777 InetSpy
    port 24000 Infector
    port 24289 Latinus
    port 25002 MOTD
    port 25002 (UDP) - MOTD
    port 25123 Goy'Z TroJan
    port 25555 FreddyK
    port 25685 MoonPie
    port 25686 DarkFace, MoonPie
    port 25799 FreddyK
    port 25885 MOTD
    port 25982 DarkFace, MoonPie
    port 26274 (UDP) - Delta Source
    port 26681 Voice Spy
    port 27160 MoonPie
    port 27184 Alvgus trojan 2000
    port 27184 (UDP) - Alvgus trojan 2000
    port 27373 Charge
    port 27374 Bad Blood, Fake SubSeven, li0n, Ramen, Seeker, SubSeven , SubSeven 2.1 Gold, Subseven 2.1.4 DefCon 8, SubSeven 2.2, SubSeven Muie, The Saint
    port 27379 Optix Lite
    port 27444 (UDP) - Trinoo
    port 27573 SubSeven
    port 27665 Trinoo
    port 28218 Oracle
    port 28431 Hack´a´Tack
    port 28678 Exploiter
    port 29104 NETrojan, NetTrojan
    port 29292 BackGate Kit
    port 29559 AntiLamer BackDoor , DarkFace, DataRape, Ducktoy, Latinus, Pest, Vagr Nocker
    port 29589 KiLo
    port 29589 (UDP) - KiLo
    port 29891 The Unexplained
    port 29999 AntiLamer BackDoor
    port 30000 DataRape, Infector
    port 30001 Err0r32
    port 30005 Litmus
    port 30100 NetSphere
    port 30101 NetSphere
    port 30102 NetSphere
    port 30103 NetSphere
    port 30103 (UDP) - NetSphere
    port 30133 NetSphere
    port 30303 Sockets des Troie
    port 30331 MuSka52
    port 30464 Slapper
    port 30700 Mantis
    port 30947 Intruse
    port 31320 Little Witch
    port 31320 (UDP) - Little Witch
    port 31335 Trinoo
    port 31336 Butt Funnel
    port 31337 ADM worm, Back Fire, Back Orifice (Lm), Back Orifice russian, BlitzNet, BO client, BO Facil, BO2, Freak88, Freak2k, NoBackO
    port 31337 (UDP) - Back Orifice, Deep BO
    port 31338 Back Orifice, Butt Funnel, NetSpy (DK)
    port 31338 (UDP) - Deep BO, NetSpy (DK)
    port 31339 Little Witch, NetSpy (DK), NetSpy (DK)
    port 31339 (UDP) - Little Witch
    port 31340 Little Witch
    port 31340 (UDP) - Little Witch
    port 31382 Lithium
    port 31415 Lithium
    port 31416 Lithium
    port 31416 (UDP) - Lithium
    port 31557 Xanadu
    port 31745 BuschTrommel
    port 31785 Hack´a´Tack
    port 31787 Hack´a´Tack
    port 31788 Hack´a´Tack
    port 31789 Hack´a´Tack
    port 31789 (UDP) - Hack´a´Tack
    port 31790 Hack´a´Tack
    port 31791 Hack´a´Tack
    port 31791 (UDP) - Hack´a´Tack
    port 31792 Hack´a´Tack
    port 31887 BDDT
    port 32000 BDDT
    port 32001 Donald Dick
    port 32100 Peanut Brittle, Project nEXT
    port 32418 Acid Battery
    port 32791 Acropolis, Rocks
    port 33270 Trinity
    port 33333 Prosiak
    port 33545 G.R.O.B.
    port 33567 li0n, T0rn Rootkit
    port 33568 li0n, T0rn Rootkit
    port 33577 Son of PsychWard
    port 33777 Son of PsychWard
    port 33911 Spirit 2000, Spirit 2001
    port 34312 Delf
    port 34313 Delf
    port 34324 Big Gluck
    port 34343 Osiris
    port 34444 Donald Dick
    port 34555 (UDP) - Trinoo (for Windows)
    port 35000 Infector
    port 35555 (UDP) - Trinoo (for Windows)
    port 35600 SubSARI
    port 36794 Bugbear
    port 37237 Mantis
    port 37651 Charge
    port 38741 CyberSpy
    port 38742 CyberSpy
    port 40071 Ducktoy
    port 40308 SubSARI
    port 40412 The Spy
    port 40421 Agent 40421, Masters Paradise
    port 40422 Masters Paradise
    port 40423 Masters Paradise
    port 40425 Masters Paradise
    port 40426 Masters Paradise
    port 41337 Storm
    port 41666 Remote Boot Tool , Remote Boot Tool
    port 43720 (UDP) - KiLo
    port 44014 Iani
    port 44014 (UDP) - Iani
    port 44444 Prosiak
    port 44575 Exploiter
    port 44767 School Bus
    port 44767 (UDP) - School Bus
    port 45092 BackGate Kit
    port 45454 Osiris
    port 45632 Little Witch
    port 45673 Acropolis, Rocks
    port 46666 Taskman
    port 46666 (UDP) - Taskman
    port 47017 T0rn Rootkit
    port 47262 (UDP) - Delta Source
    port 47698 KiLo
    port 47785 KiLo
    port 47785 (UDP) - KiLo
    port 47891 AntiLamer BackDoor
    port 48004 Fraggle Rock
    port 48006 Fraggle Rock
    port 48512 Arctic
    port 49000 Fraggle Rock
    port 49683 Fenster
    port 49683 (UDP) - Fenster
    port 49698 (UDP) - KiLo
    port 50000 SubSARI
    port 50021 Optix Pro
    port 50130 Enterprise
    port 50505 Sockets des Troie
    port 50551 R0xr4t
    port 50552 R0xr4t
    port 50766 Schwindler
    port 50829 KiLo
    port 50829 (UDP) - KiLo
    port 51234 Cyn
    port 51966 Cafeini
    port 52365 Way
    port 52901 (UDP) - Omega
    port 53001 Remote Windows Shutdown - RWS
    port 54283 SubSeven , SubSeven 2.1 Gold
    port 54320 Back Orifice 2000
    port 54321 Back Orifice 2000, School Bus , yoyo
    port 55165 File Manager trojan, File Manager trojan
    port 55555 Shadow Phyre
    port 55665 Latinus, Pinochet
    port 55666 Latinus, Pinochet
    port 56565 Osiris
    port 57163 BlackRat
    port 57341 NetRaider
    port 57785 G.R.O.B.
    port 58134 Charge
    port 58339 Butt Funnel
    port 59211 Ducktoy
    port 60000 Deep Throat , Foreplay , Sockets des Troie
    port 60001 Trinity
    port 60008 li0n, T0rn Rootkit
    port 60068 The Thing
    port 60411 Connection
    port 60551 R0xr4t
    port 60552 R0xr4t
    port 60666 Basic Hell
    port 61115 Protoss
    port 61337 Nota
    port 61348 Bunker-Hill
    port 61440 Orion
    port 61603 Bunker-Hill
    port 61746 KiLo
    port 61746 (UDP) - KiLo
    port 61747 KiLo
    port 61747 (UDP) - KiLo
    port 61748 (UDP) - KiLo
    port 61979 Cool Remote Control
    port 62011 Ducktoy
    port 63485 Bunker-Hill
    port 64101 Taskman
    port 65000 Devil, Sockets des Troie, Stacheldraht
    port 65289 yoyo
    port 65421 Alicia
    port 65422 Alicia
    port 65432 The Traitor (= th3tr41t0r)
    port 65432 (UDP) - The Traitor (= th3tr41t0r)
    port 65530 Windows Mite
    port 65535 RC1 trojan
    -------------------------

    Please observe that the ports 34555 and 35555 concerns the Windows version of Trinoo, not the Sun version.

  13. #13

    Re: Google Confused by Number Porn Phenomenon

    Cryptographers Warned against Logging in
    Added: Sunday, March 31st, 2013

    One of the best American cryptographers has recently warned that one’s broadband connection might be grassing them up to anyone having access to a database.

    According to Bruce Schneier, the author of the book “Beyond Fear: Thinking Sensibly About Security in an Uncertain World”, the rapid development of the security industry allows anyone to work out what you are doing without having to directly tap your phone.

    Bruce Schneier, when writing for CNN, has cited the cases where advanced computer users could be identified because the FBI managed to correlate data from various sources and make conclusions.

    The case was that of Paula Broadwell, who appeared embroiled in an affair scandal with the former CIA director David Petraeus. Paula was cautious enough to never log in to her anonymous e-mail service from her home network, but it didn’t save her. Although she only used public networks like that in hotels and cafes when she e-mailed him, the FBI managed to correlate hotel registration information from various hotels and found the common name.

    Bruce Schneier explains that everything we do now involves online data which is saved and can easily be correlated. In fact, there are huge data companies out there, making money by building up intimate profiles of citizens’ lives from many different places. In other words, the worldwide web turned into a surveillance tool which is hard to avoid. According to experts, no measures used to prevent this, including searching from mobiles rather than computers or using an alias on Facebook, can bring any results. The matter is that there are just too many ways to be tracked on the Internet to be able to effectively cover your tracks.

  14. #14

    Re: Google Confused by Number Porn Phenomenon

    Windows 9 Might Arrive in 2014

    The rumors are that Microsoft is going to release another version of Windows as soon as in 2014. The speculations are that next Windows OS can hit the streets a year from November next.

    However, the rumors don’t explain why users should feel the need to upgrade to Windows 9 before Windows 8 takes off. In fact, at the moment lots of users are in the same boat, believing that Windows 7 is good enough. As for me, I personally think that a line should be drawn at Windows XP, which has never let me down, and I am not alone.

    The rumors come from Win8China, which has provided a number of good Windows leaks before. Win8China reveals that Microsoft is developing Windows 9 for a tentative November 2014 product launch, with a beta expected to be out to try as early as next January.

    Actually, the announced dates are around the time of year that we would be expecting a Windows yearly OS update. Taking all this into account, this does make it possible that new Windows OS could have a November 2014 release. In addition, there’s a chance that Microsoft has finally understood that making people pay for regular short term upgrades, like Apple, is a better business model than making users pay for a bigger one every few years.

  15. #15

    Re: Google Confused by Number Porn Phenomenon

    Hackers Use Infected “Sims 3” on Torrents

    It’s been known for a while now that many hackers started abusing remote administration tools (RAT) to obtain access to the computers of ordinary Internet users. In this case, the aim of using a RAT is to get control over the computers with webcams, which allow the intruders to spy on their targets. Those are usually referred to as “slaves”.

    It’s up to the hacker what to do when they gain control of someone else’s computer. Some of them enjoy merely watching, while others search through files in hope to find compromising footage or images. Some of the hackers can steal personal data, including Steam accounts, while others like to mess with the target “slaves”. This can be done in many ways – they can show porn to the users, hide their start menu, or control their hardware. In the meantime, targets of interest are usually women, since most of the hackers are male.

    One of the hackers wrote on a forum that he seemed to get a lot of female slaves by spreading The Sims 3 with a [RAT] server on torrent websites. As you know, The Sims is a franchise which features a high female userbase. As such, it is no surprise that hackers use a torrent of the latest Sims game to get more women “slaves”, but this is just one of the ways he mentioned to acquire more targets.

    Although it might seem crazy to think that there might be someone out there watching you through your webcam, you can find lots of videos of such incidents on YouTube, alongside with thousands of other videos demonstrating RAT controllers (or “ratters”, as they are usually referred to) taunting, pranking, or toying with their victims. However, the kinds of people who watch others through their webcams usually won’t limit themselves to mere hijinks – as computers now store and webcams record more intimate content...

    Today, RAT tools are not new at all: for instance, the hacker collective named Cult of the Dead Cow has released an early one called BackOrifice at the Defcon hacker convention 15 years ago. The lead developer, who went by the alias Sir Dystic, called BackOrifice an instrument meant for “remote tech support aid and employee monitoring and administering”. However, the Cult of the Dead Cow press release revealed that BackOrifice was actually meant to expose “Microsoft’s Swiss cheese approach to security”. If you compare BackOrifice to the modern tools, it appears primitive, but still able to handle the basics. It could log keystrokes, restart the target computer, transfer files between the machines, and snap screenshots of the target PC.

Similar Threads

  1. Google
    By airdog07 in forum The BLiNC Lounge
    Replies: 11
    Last Post: October 11th, 2013, 03:55 PM
  2. Skydiving: BASE Porn: New Women’s World Record
    By blinc in forum Skydiving News Feed
    Replies: 0
    Last Post: December 11th, 2012, 08:14 AM
  3. let me Google that for YOU
    By mknutson in forum The BLiNC Lounge
    Replies: 6
    Last Post: December 20th, 2008, 02:48 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •