Unit
Unit
Unit
Confidentiality Policies:
Confinement Principle ,Detour Unix
user IDs process IDs and privileges
More on confinement
techniques ,System call interposition
Error 404 digital Hacking in India part
2 chase ,
VM based isolation
,Confinement principle ,Software
fault isolation
Rootkits ,Intrusion Detection
Systems
Error 404
The HTTP 404, 404 not found, 404, 404 error, page not found or file not found error message is
a hypertext transfer protocol (HTTP) standard response code, in computer network communications,
to indicate that the browser was able to communicate with a given server, but the server could not
find what was requested. The error may also be used when a server does not wish to disclose
whether it has the requested information.
The website hosting server will typically generate a "404 Not Found" web page when a user attempts
to follow a broken or dead link; hence the 404 error is one of the most recognizable errors
encountered on the World Wide Web.
Virtual machine
What is virtual machine in simple words?
A virtual machine is a program on a computer that works like it is a separate
computer inside the main computer. ... It is a simple way to run more than one operating
system on the same computer. A very powerful server can be split into several smaller
virtual machines to use its resources better.
A virtual machine is a computer file, typically called an image, that behaves like an actual
computer. It can run in a window as a separate computing environment, often to run a different
operating system—or even to function as the user's entire computer experience—as is common on
many people's work computers.
Which is the best virtual machine?
Best virtual machine software of 2021
VMware Workstation Player.
VirtualBox.
Parallels Desktop.
QEMU.
Citrix Hypervisor.
Xen Project.
Microsoft Hyper-V.
Process Isolation
Machine. When applications are running on separate computers, a crash of
one of the applications (or an entire machine) is less likely to affect other
applications.
Device. With some hardware technologies, such as RAID, data is written to
multiple physical devices, so that if one of those devices fails, the data is still
available.
Fault isolation can also be achieved to some extent using an IsolationLayer. However,
whenever multiple components are running in the same process or are accessing a
common resource, there is a potential for one component causing problems for the
others.
Note that for fault isolation to have benefit, it is necessary that components be
designed in such a way that they can function, or at least shut themselves down
cleanly, in the absence of a failed component.
A Redundant Array of Independent Disks (RAID) is a collection of hard drives, one or more controller
cards, and embedded software to increase the reliability and redundancy of data storage on hard
drives. RAID comes in multiple flavours offering improved performance and/or improved data reliability.
A chroot on Unix operating systems is an operation that changes the apparent root directory for
the current running process and its children. A program that is run in such a modified
environment cannot name (and therefore normally cannot access) files outside the designated
directory tree.
ROOTKIT VIRUS
Rootkit functionalities are specifically designed for creating backdoor access. Hackers know that in
order to create backdoor access, administrative privileges are required. The normal authentication of
the computer must be bypassed; otherwise, creating a backdoor successfully won’t take place. This
is accomplished by altering the security setting, usually, disabling the anti malware software or
antivirus.
A rootkit having administrative privileges can easily modify the security setting and disable anti
malware software, allowing hackers to create backdoor access without being exposed. Eventually,
they take over the computer without the user’s knowledge.
Some hackers turn the computer into a zombie computer that can be used to commit cyber attacks.
It also allows hackers to monitor computer activities and steal personal information. That’s what is a
rootkit virus for.
Due to a rootkit’s unique ability, it is often bundled with other types of malware, such as Zeus
viruses, ransomware, and banking trojans. All three are classified as dangerous because they can
steal sensitive data and encrypt valuable files.
Typically, a rootkit conceals the malware and its activities to carry out its goal. If the malware is
detected, rootkit prevents its removal. You may spot the malware, but uninstalling it will be difficult,
as your access will be denied. You need to get rid of the rootkit first, and that may require a specific
rootkit remover or worse, an operating system reinstallation.
Upon learning what is a rootkit virus for and how harmful it can be for your computer, you must also
know how to prevent rootkits.
Do you know what is a rootkit virus often disguised as? Cracked software. Users who download
cracked software may accidentally install a rootkit on their computers. It is advisable to download
legitimate software only.
Most malware, including a rootkit, are distributed by a malicious email. This technique is called spear
phishing. Through a spam email, hackers can install a rootkit on random computers. This is how a
rootkit virus is often concealed.
By creating emails that look authentic, hackers can trick users into downloading and installing a
rootkit on their computers. When the user downloads the infected attachment, a rootkit installs
silently in the background.
A rootkit can also be installed through system vulnerabilities, which is a result of running outdated
software. System vulnerabilities can be exploited by hackers. Using exploit kits, they scan devices
for system vulnerabilities to insert rootkits and other types of malware. Don’t skip software updates,
as they protect you from a rootkit infection.
Hackers inject malicious software on the website without the website owner’s knowledge. When the
user visits the website, a rootkit installs in the background. So, always verify the website reputation
because you know what is a rootkit virus capable of.
Anti malware software is designed to protect the PC’s system by detecting and
blocking malware before it reaches the computer. Now that you know what is a rootkit virus, never
let it onto your computer by installing anti malware software. However, you need to find anti malware
software equipped with rootkit detection, as a rootkit can easily evade the detection of traditional anti
malware software.
Conclusion
Knowing what is a rootkit virus and how to prevent one is essential, as a rootkit is dangerous to your
computer. Getting infected with a rootkit could mean an operating system reinstallation. Protect your
computer with reputable anti malware software.