|
Added detection of new variants of I-Worm/Netsky, Worm/Bizex.
|
|
Full View / NID: 2345 / Submitted by: TACKtech Team
|
|
Added detection of new viruses Worm/Bizex, Worm/Furby, I-Worm/Wenru, I-Worm/Cone, Win32/Vck. Added detection of new variants of Worm/Darby, BackDoor.Snart.
|
|
Full View / NID: 2334 / Submitted by: Travis
|
|
Added detection of new virus Worm/Doomran and new variants of I-Worm/Mydoom, I-Worm/Doomjuice.
|
|
Full View / NID: 2316 / Submitted by: Travis
|
|
W32.Netsky.B is a mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. This worm also searches drives C through Z for folder names containing "Share" or "Sharing," and then copies itself to those folders.
|
|
Full View / NID: 2303 / Submitted by: TACKtech Team
|
|
W32.Netsky.B is a mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. This worm also searches drives C through Z for folder names containing "Share" or "Sharing," and then copies itself to those folders.
|
|
Full View / NID: 2302 / Submitted by: TACKtech Team
|
|
Added detection of new variants of I-Worm/Netsky.
|
|
Full View / NID: 2297 / Submitted by: Travis
|
|
W32.Beagle.B@mm is a mass-mailing worm that opens a backdoor on TCP port 8866. The worm utilizes its own SMTP engine for email propagation, and has the ability to contact the author of the worm with the port that the backdoor is listening on and a randomized ID number.
|
|
Full View / NID: 2289 / Submitted by: TACKtech Team
|
|
Added detection of new variants of I-Worm/Bagle.
|
|
Full View / NID: 2284 / Submitted by: Travis
|
|
Added detection of new viruses I-Worm/Netsky. Added detection of new variants of I-Worm/Mydoom, Worm/Gagse.
|
|
Full View / NID: 2278 / Submitted by: Travis
|
|
Added detection of new variants of Worm/Nachi.
|
|
Full View / NID: 2256 / Submitted by: Travis
|
|
This tool will help to remove the MyDoom.A and My.Doom.B worms from infected Windows XP and Windows 2000 systems. Once executed, after the EULA is accepted, the tool automatically checks for infection and removes the worm(s) if found. If a machine is infected with MyDoom.B, the tool will also provide the user with the default version of the "hosts" file and set the "read-only" attribute for that file. This action will allow the user to visit previously-blocked Microsoft and antivirus websites.
Note:This tool will not do the following.
Detect or remove any viruses or worms other than MyDoom.A, MyDoom.B, and DoomJuice.A
Detect or remove future variants of MyDoom or DoomJuice.
Prevent the machine from being re-infected with MyDoom if, for example, an infected e-mail attachment is re-executed.
|
|
Full View / NID: 2244 / Submitted by: Anthony
|
|
Added detection of new viruses I-Worm/Doomjuice, Worm/Blaxe, Worm/Deadhat, Worm/Mantibe. Added detection of new variants of Worm/Agobot.
|
|
Full View / NID: 2242 / Submitted by: Anthony
|
|
Added detection of new viruses VBS/Vipina. Added detection of new variants of Worm/Spybot, Worm/Agobot, W97M/Furio, JS/Cass. Added detection of new variants of trojan PSW.Tofger, IRC/BackDoor.SdBot.
|
|
Full View / NID: 2227 / Submitted by: Travis
|
|
This tool will help to remove the MyDoom.A and My.Doom.B worms from infected Windows XP and Windows 2000 systems. Once executed, after the EULA is accepted, the tool automatically checks for infection and removes the worm(s) if found. If a machine is infected with MyDoom.B, the tool will also provide the user with the default version of the "hosts" file and set the "read-only" attribute for that file. This action will allow the user to visit previously-blocked Microsoft and antivirus websites.
Note:This tool will not do the following.
Detect/remove any viruses or worms besides MyDoom.A and MyDoom.B.
Detect/remove future variants of MyDoom.
|
|
Full View / NID: 2225 / Submitted by: Anthony
|
|
Added detection of new viruses VBS/Vipina. Added detection of new variants of Worm/Spybot, Worm/Agobot, W97M/Furio, JS/Cass. Added detection of new variants of trojan PSW.Tofger, IRC/BackDoor.SdBot.
|
|
Full View / NID: 2201 / Submitted by: Zero_Tolerance
|
|
CUPERTINO, Calif. - Feb. 2, 2004 - Symantec Corp. (NASDAQ: SYMC), the world leader in Internet security, today announced the Symantec Clientless VPN Gateway 4400 Series. The new appliance line provides customers easy-to-manage, secure remote access to corporate networks. Symantec Clientless VPN Gateway reduces the cost of providing remote access by eliminating the need for IT administrators to install and manage VPN client software deployments. The Symantec Clientless VPN Gateway 4400 Series is scheduled to be available in mid-February.
|
|
Full View / NID: 2200 / Submitted by: Zero_Tolerance
|
|
Added detection of trojan BackDoor.Goweh, PSW.Polk, Hidewindow.
|
|
Full View / NID: 2184 / Submitted by: Zero_Tolerance
|
|
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.
|
|
Full View / NID: 2183 / Submitted by: TACKtech Team
|
|
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.
|
|
Full View / NID: 2173 / Submitted by: TACKtech Team
|
|
Added detection of new variants of I/-Worm/Mimail, IRC/BackDoor.SdBot.
|
|
Full View / NID: 2171 / Submitted by: Travis
|