V HELP

 

LET'S TOGETHER HELP THE PEOPLE IN NEED

LET'S TOGETHER CHANGE OUR SOCIETY

VHELP

 

JOIN NOW

 

V TEACH

 

 

 

 

 

 

 

 

Copyrights 2008-09 VHELP TEAM All Rights Reserved

Variable definitions ==================== */ /* Use this with templates/template-twocol.html */ body { background:#ffffff; margin:0; color:#333333; font:x-small Georgia Serif; font-size/* */:/**/small; font-size: /**/small; text-align: center; } a:link { color:#5588aa; text-decoration:none; } a:visited { color:#999999; text-decoration:none; } a:hover { color:#cc6600; text-decoration:underline; } a img { border-width:0; } /* Header ----------------------------------------------- */ #header-wrapper { width:660px; margin:0 auto 10px; border:1px solid #cccccc; } #header-inner { background-position: center; margin-left: auto; margin-right: auto; } #header { margin: 5px; border: 1px solid #cccccc; text-align: center; color:#666666; } #header h1 { margin:5px 5px 0; padding:15px 20px .25em; line-height:1.2em; text-transform:uppercase; letter-spacing:.2em; font: normal normal 200% Georgia, Serif; } #header a { color:#666666; text-decoration:none; } #header a:hover { color:#666666; } #header .description { margin:0 5px 5px; padding:0 20px 15px; max-width:700px; text-transform:uppercase; letter-spacing:.2em; line-height: 1.4em; font: normal normal 78% 'Trebuchet MS', Trebuchet, Arial, Verdana, Sans-serif; color: #999999; } #header img { margin-left: auto; margin-right: auto; } /* Outer-Wrapper ----------------------------------------------- */ #outer-wrapper { width: 660px; margin:0 auto; padding:10px; text-align:left; font: normal normal 100% Georgia, Serif; } #main-wrapper { width: 410px; float: left; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } #sidebar-wrapper { width: 220px; float: right; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } /* Headings ----------------------------------------------- */ h2 { margin:1.5em 0 .75em; font:normal normal 78% 'Trebuchet MS',Trebuchet,Arial,Verdana,Sans-serif; line-height: 1.4em; text-transform:uppercase; letter-spacing:.2em; color:#999999; } /* Posts ----------------------------------------------- */ h2.date-header { margin:1.5em 0 .5em; } .post { margin:.5em 0 1.5em; border-bottom:1px dotted #cccccc; padding-bottom:1.5em; } .post h3 { margin:.25em 0 0; padding:0 0 4px; font-size:140%; font-weight:normal; line-height:1.4em; color:#cc6600; } .post h3 a, .post h3 a:visited, .post h3 strong { display:block; text-decoration:none; color:#cc6600; font-weight:normal; } .post h3 strong, .post h3 a:hover { color:#333333; } .post-body { margin:0 0 .75em; line-height:1.6em; } .post-body blockquote { line-height:1.3em; } .post-footer { margin: .75em 0; color:#999999; text-transform:uppercase; letter-spacing:.1em; font: normal normal 78% 'Trebuchet MS', Trebuchet, Arial, Verdana, Sans-serif; line-height: 1.4em; } .comment-link { margin-left:.6em; } .post img { padding:4px; border:1px solid #cccccc; } .post blockquote { margin:1em 20px; } .post blockquote p { margin:.75em 0; } /* Comments ----------------------------------------------- */ #comments h4 { margin:1em 0; font-weight: bold; line-height: 1.4em; text-transform:uppercase; letter-spacing:.2em; color: #999999; } #comments-block { margin:1em 0 1.5em; line-height:1.6em; } #comments-block .comment-author { margin:.5em 0; } #comments-block .comment-body { margin:.25em 0 0; } #comments-block .comment-footer { margin:-.25em 0 2em; line-height: 1.4em; text-transform:uppercase; letter-spacing:.1em; } #comments-block .comment-body p { margin:0 0 .75em; } .deleted-comment { font-style:italic; color:gray; } #blog-pager-newer-link { float: left; } #blog-pager-older-link { float: right; } #blog-pager { text-align: center; } .feed-links { clear: both; line-height: 2.5em; } /* Sidebar Content ----------------------------------------------- */ .sidebar { color: #666666; line-height: 1.5em; } .sidebar ul { list-style:none; margin:0 0 0; padding:0 0 0; } .sidebar li { margin:0; padding-top:0; padding-right:0; padding-bottom:.25em; padding-left:15px; text-indent:-15px; line-height:1.5em; } .sidebar .widget, .main .widget { border-bottom:1px dotted #cccccc; margin:0 0 1.5em; padding:0 0 1.5em; } .main .Blog { border-bottom-width: 0; } /* Profile ----------------------------------------------- */ .profile-img { float: left; margin-top: 0; margin-right: 5px; margin-bottom: 5px; margin-left: 0; padding: 4px; border: 1px solid #cccccc; } .profile-data { margin:0; text-transform:uppercase; letter-spacing:.1em; font: normal normal 78% 'Trebuchet MS', Trebuchet, Arial, Verdana, Sans-serif; color: #999999; font-weight: bold; line-height: 1.6em; } .profile-datablock { margin:.5em 0 .5em; } .profile-textblock { margin: 0.5em 0; line-height: 1.6em; } .profile-link { font: normal normal 78% 'Trebuchet MS', Trebuchet, Arial, Verdana, Sans-serif; text-transform: uppercase; letter-spacing: .1em; } /* Footer ----------------------------------------------- */ #footer { width:660px; clear:both; margin:0 auto; padding-top:15px; line-height: 1.6em; text-transform:uppercase; letter-spacing:.1em; text-align: center; } -->

Monday, August 9, 2010

Global coordination centre mooted to shore up Internet security



A proposal has been made for the creation of a global security coordination centre that will help the Internet web address system combat exploitation by malicious software, as the Conficker worm did last year.
Thanks to a coordinated global response, a measure of success was achieved in countering the worm and blocking its spread, said a recent report of the Internet Corporation for Assigned Names and Numbers (ICANN). It has suggested the establishment of a Community Emergency Response Team for the global Domain Name System (DNS-CERT). A worm is a piece of malicious software created to stealthily infect computers in order to perform certain tasks. The spread of the Conficker worm, which exploited the vulnerability in the Windows OS to infect computers, had peaked last year, with its variants emerging and infecting millions of computers . Such infected computers are then made part of larger networks, called botnets, for operations conceived by the worm's creator or creators. The rapid spread of the Conficker worm had been viewed with great concern by security experts worldwide. The threat perception has since subsided, following a significant decline in the rate at which the worm has been infecting computers, but millions of machines remain infected, and security experts continue tracking it for any sign of resurgence. Since the Conficker worm depended on specific web addresses for communication, it became one of the battlegrounds for a counter-offensive by security experts and organisations led by the Conficker Working Group. What the worm did from the infected computers was to generate domain names or web addresses and select some of them to connect with and update itself — and execute the latest commands of its creators. Thus, a key counter-measure involved was to block the creation or transfer of web addresses being used by the worm for its operations, in which ICANN had played a crucial role. The worm tried to overcome the defence mounted against it by generating thousands of web addresses from which it could randomly exploit some for its purposes, but the experts have been largely able to counter this tactic. Much of it was based on “volunteer efforts and goodwill, informal communications channels, interventional operations practices, informal agreements and assumptions,” said the ICANN report. Microsoft, too, felt that a “new level of industry collaboration and cooperation” had been achieved in countering the worm. Jerry Bryant, Group Manager, Response Communications, Microsoft Corporation, told The Hindu, “ICANN and operators within the domain name system have proactively disabled a significant number of domains targeted by Conficker.” Though the worm is now primarily using the peer-to-peer (P2P) route — directly between computers — to sustain itself, “our scrutiny of this worm's DNS control channel made it unusable for its intended purpose and has also given us wonderful information about the size and spread of the infection,” said Paul Vixie, president of Internet Systems Consortium, which is part of the Conficker Working Group. “ICANN has put in a lot of effort in responding to Conficker. I think they have good standing to want to see that time and effort institutionalised,” he said in an e-mail interview. The DNS-CERT proposal has received a mixed reaction from different countries and the Internet community — some of them are unsure whether it is the right solution or Conficker has really strengthened the case for it.

No comments:

Post a Comment