Essay about Using Binary Cmos Validation Techniques

707 Words Nov 5th, 2015 3 Pages
Conficker, a botnet or virus, affected several Windows operating systems such as Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems which lacked patches and had access to the internet (Krepinevich, 2012; Mills, 2009; Ackerman, 2009). Once it infiltrated an organization’s system, it mended the breach located at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012). In order to propagate to other systems, Conficker created a list of new domain names daily to discover other central domains that the virus’ creator employed to update, control or command the infected machines and signed solely by the creator by employing binary validation techniques (Burton, 2015). According to Burton (2015), “The use of binary encryption, digital signatures and advanced hash algorithms for its updates prevents the hijacking of infected clients”. Also, Conficker remained prevalent because besides deactivating the Windows security system, it inhibited the user from installing any security removing products. Furthermore, it remained rampant because Conficker constantly changed its code as it replicated itself onto other Windows operating machines; thus creating five different virus versions (Mills, 2009; Burton, 2015).
Although the Conficker virus did not debilitate anyone or any organization detrimentally, it could have caused mayhem to hospital operations,…

Related Documents