Figure 8.8: A virus-construction kit in .NET

Get QR Code ISO/IEC18004 in .NET Figure 8.8: A virus-construction kit
Figure 8.8: A virus-construction kit
Qrcode reader with .net
Using Barcode Control SDK for Visual Studio .NET Control to generate, create, read, scan barcode image in Visual Studio .NET applications.
Once the virus has been created, the creator distributes it out into the wild. This can be done anonymously with email to many addressees, or it can be done to known people. In any event, disseminating a virus into the wild generally isn t much of a problem. DCN thought they protected their LAN against viruses at the source. Every incoming email was scanned with quality antivirus software, so DCN was
QR Code 2d Barcode encoder on .net
use .net vs 2010 quick response code creator toincoporate qr code for .net
Part III
QR-Code barcode library for .net
Using Barcode recognizer for .NET Control to read, scan read, scan image in .NET applications.
How PDAs Are Hacked, and How to Protect Them
read barcode on .net
Using Barcode reader for .NET Control to read, scan read, scan image in .NET applications.
confident that they would catch any malware entering their LAN. What they didn t consider was PDAs bringing in the malware.
Get barcode for .net
generate, create barcode none with .net projects
Infection by a Pocket PC
QR Code barcode library with visual
generate, create denso qr bar code none with .net c# projects
There is a belief that PDAs really can t bring malware into the enterprise because many Pocket PCs don t actually save Word documents and other files in their native format. People think any virus that is attached would be wiped out by the format change. Let s look at that. The file tester.doc contains a Word-macro virus created by a free online virus-creation kit. To prove it is an infected file, I ll scan it with Symantec Antivirus. Figure 8.9 shows the results of this scan. Website qr-codes integratingwith .net
generate, create qr-code none with .net projects
Figure 8.9: Symantec Antivirus analyzing a newly created Word macro, tester.doc
Control qr image for vb
using visual studio .net topaint qr code for web,windows application
Now I take this file and synch it with a Pocket PC. I simply take tester.doc and place it into the ActiveSync file-sharing folder. By placing the file into this folder, it will be placed onto the Pocket PC automatically. Once on the Pocket PC, the file can be copied to any other device. When this is done, I check to see if the change to the file format actually removed the infection. I ll test this by copying the synched tester.doc file to a computer that has Symantec Antivirus installed and real-time scanning enabled. If the file is no longer infected, then it could be copied over without incident. If the Pocket PC didn t change the format, then Symantec s real-time scanning would identify tester.doc as infected. Figure 8.10 shows the results. Figure 8.10 shows that simply synching or copying the infected file to the Pocket PC doesn t change the format enough to remove the virus. If users are synching their Pocket PCs to PCs that do not have significant protection, then a Pocket PC can easily be a vehicle to bring infected files into the enterprise. This is a very serious problem that enterprises need to address. Now let s look at a slightly different scenario. What happens if the infected file is opened on the Pocket PC before it s transferred to the PC I ll try simply opening the file and closing it without editing it. Figure 8.11 shows tester.doc being opened on the Pocket PC.
Code 128 Code Set A writer with .net
generate, create code128 none on .net projects
.NET Crystal ucc ean 128 integrationon .net
use vs .net crystal ean 128 barcode development touse ean / ucc - 14 with .net
Protecting Your PC and LAN from PDAs
.net Vs 2010 Crystal matrix barcode generationwith .net
use vs .net crystal 2d barcode generating toattach 2d matrix barcode in .net
Figure 8.10: An infected file being copied from a Pocket PC to a PC
USPS POSTal Numeric Encoding Technique Barcode barcode library for .net
using vs .net todevelop usps postal numeric encoding technique barcode in web,windows application
Figure 8.11: Infected Word document being opened on the Pocket PC
Control gs1 - 12 image for excel
generate, create upc a none in office excel projects
Part III
Control code 39 data in vb
3 of 9 barcode data in visual
How PDAs Are Hacked, and How to Protect Them
Control upc-a supplement 5 size on visual
to assign upca and upca data, size, image with barcode sdk
Upon transferring the document to the PC, has the format changed The answer is no. The format hasn t changed and the file is still infected. The Pocket PC still transferred malware to the PC, even after the infected file was opened on the Pocket PC. Let s try one more scenario. The infected tester.doc file was once again synched to the Pocket PC, but this time it was edited on the Pocket PC and the changes were saved (Figure 8.12).
Control gs1 128 size for visual basic
size on visual
Figure 8.12: Infected Word file being edited on the Pocket PC
Barcode creation on java
using java tocompose barcode for web,windows application
When I copied tester.doc back to the PC, it was no longer infected. By editing and saving the file on the Pocket PC, the format was changed to such a degree that the macro virus was no longer a threat. In another quick test, the infected tester.doc file was copied and pasted on the same Pocket PC. That copied file was still infected. Keep in mind that this testing was done with one Word-macro virus. Results may vary depending upon the type of file and the specific type of malware. To recap, the methods in which malware can be transmitted to the enterprise from a Pocket PC include the following:
Bar Code barcode library in microsoft excel
generate, create bar code none on excel projects
The infected file is synched to the Pocket PC from one computer and copied from the Pocket PC to another computer. The infected file is synched to the Pocket PC. While on the Pocket PC, the file is viewed. The file is then copied or synched to a PC. The infected file is synched to the Pocket PC. While on the Pocket PC, the infected file is copied. Both copies would contain malware and would remain infected upon transfer from the Pocket PC to a PC.
Control ean / ucc - 13 size in office excel
ean13+5 size for excel spreadsheets
Visual Studio .NET (WinForms) Crystal gs1128 makeron
using barcode drawer for .net winforms crystal control to generate, create ucc-128 image in .net winforms crystal applications.