Sunday, February 22, 2009

Life Challenges, makes better living

I don't think you really require being out there to 'discover' happiness. Being alive and being aware is sufficient. You can't choose the situation and wait for happiness to meet you there. It comes when you least expect it.

Life is full of contradictions.... and I guess that's why it's so stimulating. When I look outside myself, I feel most spiritual. One can't spend one's life being only a viewer and let things occur... and things do occur. So rather than remaining in one's misery, one needs to begin finding sources of life and joy.

Just feel good, for no real reason. I'm happiest person when I've had a first-class night's sleep and have time to lie in bed. I do believe there is some natural force, which take part in our lives. I love taking charge and shaping the things but I like to be pleasantly amazed by this natural force.

It’s so easy, value the moments when I'm doing something; I love and do it to the best of my capability.

Sunday, February 15, 2009

For my love....

In my dreams....

Every night as I go to bed
My feelings turn towards this path I wish to walk
I cannot cross this path ALONE
not can I through the air be flown
I need an you my ANGEL to accompany me through this journey
and experience the ride through every twist and turn
when will you be ready to hold my hand
I wait, I hope, I stand………for that moment…

=== === === === === === === === === === === === ===

Flowers which yield in the field of our faith

For you, my love, these flowers I send,
each one nurtured in my heart for you, my love.
The day we met the seeds were sown,
now see how beautiful they have grown.
Where once there was a lonely deserted field,
a treasure of beauty our love yield.
With your every kind word and loving deed, my love,
to their starving growth and beauty you tendered.
So let me send them now to you too, to enjoy
and let us swear never let such beauty die.
Our love has endured the test of time
and molded itself into a symphony of poetic rhyme for you, my love…

Friday, February 13, 2009

Malware, spyware, viruses, worms

Malware is made from the words “Malicious” and “Software” and refers to any piece of code that has a malicious effect on a computer. It normally carries out its malicious task without informing the user of the computer. Note that, Malware does not refer to buggy, legitimate software.

Virus programs are a type of malware. Viruses are programs that infect a “host” like a file, or another executable program. The virus “spreads”, whenever the “host” is run, by infecting other files. Viruses can be very malicious like those that can erase the contents of a hard drive. They can be less malicious like displaying an obscene message on the screen.

A Worm is different from a virus in that it does not need a “host” to attach to. Worms reside in the “RAM” and infect other computers through computer networks. They do not spread by infecting other files. A worm can carry a payload. A worm does not need user intervention to run (or spread) unlike a virus which does. Worms scan the network for computers with vulnerable network services and copy themselves to the vulnerable computers. The process is automatic and thats how they can spread at lightning speed.

A “Trojan” is a program that does not infect or spread! It is actually a malicious piece of code, contained in a seemingly benign and useful code (read screen savers, games etc.) . A Trojan when run, can provide its author - access to the infected computer. Other types of Trojan, look for information like passwords, credit card numbers, online banking data, personal information etc and send these back to the author.

A Trojan actually invites the user to run itself. The concealed malicious payload is executed in the process.Most commonly , it install more harmful programs in the computer to serve the author’s interests. Thus Trojans are used as “droppers”, by which worms are injected into user’s computer networks.

Malware written for profit include - Spyware, Botnets, Keyloggers etc.

Earlier malware used to be written more for “vandalism” and “prank” value - today the creators look at making money out of the control they have on infected systems.

Spyware is distributed as a Trojan - a desirable and useful software on the outside containing the malicious spyware code inside.

Malware programs need to stay in the infected computer for long periods so that they give a better chance for their authors to profit from them. In order to do this they need to conceal their presence in the infected computer. Most Malware programs have code in them such that they cannot be easily detected. They do this by modifying the Operating System using specific commands. (The set of such commands are called “rootkits”). By running rootkits, they do not show up in the list of system processes. Thats how they escape detection by ordinary means.

But they can be detected by programs written to detect such concealment. On being detected they can be deleted by these programs. Spyware programs have defenses to repel such deletion attempts. They run multiple system processes such that if one of them is killed by an anti-spyware program, the other surviving processes quickly generate a copy of the killed process. Thus to clean a infected system of spyware, not only should the various spyware processes be identified - they have to be killed simultaneously.

Some Spyware programs can alter browser behaviour by redirecting search engine results.

Botnets are used by creators of some malware - to coordinate between the hundreds and thousands of infected computers. The malware in the infected systems login to the botnet. Thus through the botnet the creator of malware can update the code and make them more resistant and more capable.

Some malware programs can install a key logger which logs the key strokes made by the user when entering passwords or credit card information or CD leys. These are then transmitted to the creator of the malware.