Top 10 worst computer viruses (Part Two)

10. Elk Cloner
Iain Thomson: Elk Cloner was written by a 15-year old high school student called Rich Skrenta as a practical joke. Unfortunately for him the joke turned bad very quickly.

The virus was developed for the Apple II system and was a boot sector virus that spread via floppy discs. Apparently Skrenta was a fan of pirated games and would swap them with his friends, sometimes with little messages added. After one too many of these infected discs, he devised a way to alter discs automatically and the Elk Cloner virus was invented.

It had little in the way of a payload. Every 50th time a person booted an infected disc the software ran a little program on the computer screen, and that was it. Nevertheless it was a serious annoyance and was a harbinger of things to come.

Shaun Nichols: And they say Apple computers don’t get viruses. What Skrenta did not realise was that he was helping to popularise what would later become standard practice for spreading viruses.

Elk Cloner spread through what is now known as a ‘boot sector’ infection. The virus copied itself into the boot sector of a floppy disk and then spread into all future disks. This became a popular attack method for Apple and PC computers, taking over as the preferred method of infection until the internet came along and email attacks emerged.

9. Klez
Iain Thomson: Klez is a persistent little devil, and variants are still doing the rounds today, seven years after it first turned up.

The most common varient, Klez H, spoofs email addresses by randomly picking one from an infected machine before sending itself on to other users. This makes backtracing the identity of the infected machine particularly difficult, since any email stored for any reason can be used.

It exploits a vulnerability in Outlook that allows it to boot up automatically on unpatched systems. It’s a cunning little devil but for all its ingenuity I still want to strangle the writer.

Shaun Nichols: The late 1990s and early 2000s were not only the golden age of the internet, they seemed to be the golden age for malware. Over that time period, few viruses were able to match the reign of Klez.

Like many other viruses of its time, Klez spread through email. Users were duped into opening infected files and, once the malware was installed, the victim’s address book was opened and copies of the attack were sent to contacts.

Klez, however, took this a step further. Not only did the virus send itself to people in your address book, it pretended to be from other people. Later, the worm wreaked further havoc by pretending to be its own removal tool.

Read More

Top 10 worst computer viruses (Part One)

Computer SecurityAll this panic over a simple strain of flu got us thinking about some of the more virulent computer pandemics that have hit in recent years. While a computer virus pales in seriousness to a human outbreak, malware attacks can still take a huge toll on businesses throughout the world.

The viruses below may not have been the most widespread or effective, although many of them were. Instead they are the ones that stick in the mind as being particularly notable. There are been so many over the years, and viruses will always be a part of computing now, but these may bring back memories, not all of them pleasant.

Honourable mention: Creeper
Iain Thomson: Creeper was possibly the very first computer virus, although this is contested. It was invented back in 1971 by Bob Thomas, using the Tenex operating system, and used the precursor of the internet, ARPANET, to spread between DEC PDP 10 systems.

To delete the Creeper program another piece of code, Reaper, was created to hunt it down and destroy it. The first anti-virus virus, Reaper was an excellent idea and one that worked well.

Some don’t consider it a virus because it lacked many of the features of modern viruses, but I’m counting it anyway because it was an example of the harmlessness of the early age of computers. Creeper did nothing more than display the message ‘I’m the creeper, catch me if you can!’ No payload, no theft, it was an example of a simpler age.

Shaun Nichols: In computer years, 1971 was nearly prehistoric. No Apple, no Microsoft and the internet was still a wild, far-off concept. Still, in this era where computer programming was a highly-specialised skill, we saw many firsts.

Perhaps a sign of the early times, Creeper’s creator not only released the virus itself, but a cleaning program called Reaper that removed the Creeper code.

Honourable mention: Brain
Iain Thomson: Brain was the first virus written for Microsoft’s DOS operating system, back in 1986. It was originally developed to stop the copying of a medical software program developed by two Pakistani brothers, Basit and Amjad Farooq Alvi.

Brain spread by floppy disc and copied itself into the boot sector of the media. It displayed the names of the creators, and suggested the infected recipients got in contact to get disinfected.

It spread quickly and the two brothers were inundated with calls from people around the world demanding that their machines were disinfected. Such was the volume of calls that the two eventually had their phone lines cut off.

Shaun Nichols: Remember how much heat Sony took when it used a rootkit as part of its copy-protection software? Well, it turns out Sony wasn’t the first group to make that mistake.

Back in 1986, a pair of developers from Pakistan tried to stop piracy of their biomedical software by including a small snippet of code to track and report possible piracy. That code was soon removed and redistributed as a virus.

This was back in 1986, so the ‘FAIL’ meme had yet to be put into use, but if it had, Brain Computer Services would have no doubt more than earned the tag.

Read More

IBM pushes solid state drives to Power servers

IBM SSDIBM has announced new solid state drive (SSD) products, designed to help firms reduce costs and improve memory response times across its Power hardware platforms.

The firm said that, based on its own testing, it expected to see huge performance boosts in user systems, while the drives would also have a dramatic impact on the physical footprint of storage facilities.

Advertisement”The new offerings can improve performance by up to 800 per cent, while also reducing the physical footprint of the amount of storage needed by approximately 80 per cent, and energy consumption by up to 90 per cent,” IBM said in a statement.

“As it has no moving parts, or spinning disks, such as used in traditional storage, solid-state storage technology can conduct up to 20,000 transfers per second compared to one hard drive disk at approximately 200 data transfers per second.

“IBM is unveiling a more targeted approach than other SSD hardware vendors to implement Flash technology by leveraging and integrating IBM’s hardware, software and research expertise.”

As well as giving users the option to run SSDs on Power systems, the vendor announced software management tools for the technology. These included the IBM Data Facility Storage Management Subsystem and SSD Data Balancer, which it said would let administrators back up and save data to drives on IBM zSeries and DS8000 servers with ease.

IBM said it does not expect SSDs to completely replace other more conventional storage methods, adding that customers would favour hybrid environments using both SSDs and traditional disks.

Read More

the Fastest Solid State Disks (SSDs)

images3You’ll often see news stories that say such and such a manufacturer has launched the “. But how can they all be true?

Sad to relate – but often they are not. Other storage publications – which only have a superficial grasp of this market – publish many claims which are completely wrong because they aren’t aware of the hundreds of other SSD products already available in the market.

Another problem is that many magazine and vendor published SSD benchmarks are unreliable due to halo effects.

If SSD speed is your thing – you’ve come to the right place. However, speed isn’t everything and it comes at a price. But if you need the speediest SSD then wading through the web sites of over 100 current SSD oems to find a suitable candidate slows you down. And the SSD search problem will get worse. I’ve done the research for you to save you time. And this page is updated daily from storage news and direct inputs from oems.

Speed isn’t everything – but it is important. According to the world’s first SSD Buyer Preference Survey – in answer to the question “Why Do People Use Solid State Disks?” – the #1 reason given was – “Application speedup” – cited by 76% SSD buyers.

Read More

Data recovery apparatus and method used for flash memory

Flash data recovery1. A data recovery apparatus used for a flash memory that includes data areas and index areas in which values indicating whether data stored in the respective data areas are valid are recorded, comprising: a controller that performs a data operation at each of a plurality of logical addresses, and if the data operations performed at the plurality of logical addresses are successful, records a mark value in a last index area of a plurality of index areas respectively corresponding to the plurality of logical addresses.

2. The data recovery apparatus of claim 1, wherein the data operation is first performed on a middle portion of the flash memory and then on other portions of the flash memory, and the mark value is recorded in one of the index areas corresponding to the middle portion of the flash memory.

3. The data recovery apparatus of claim 1, wherein said plurality of logical addresses are consecutive logical addresses.

4. A data recovery apparatus used for a flash memory that includes data areas and index areas in which values indicating whether data stored in the respective data areas are valid are recorded, comprising: a controller that determines whether data respectively stored at a plurality of logical addresses prior to a predetermined logical address, through a data operation, are valid based on a mark value recorded in an index area corresponding to the predetermined logical address.

5. The data recovery apparatus of claim 4, wherein the mark value is recorded in index areas respectively corresponding to first and last logical addresses of the plurality of logical addresses when performing the data operation first on a middle portion of the flash memory and then on other portions of the flash memory, and determining whether data respectively stored at at least one of the plurality of logical addresses between the first and last logical addresses are valid based on the index areas in which the mark value is stored.

6. The data recovery apparatus of claim 5, wherein it is determined whether data stored at the predetermined logical address is valid based on whether data exists at a logical address subsequent to the predetermined logical address.

7. The data recovery method of claim 4, wherein said plurality of logical addresses are a plurality of consecutive logical addresses.

8. A data recovery method used for a flash memory that includes data areas and index areas in which values indicating whether data stored in the respective data areas are valid are recorded, the data recovery method comprising: performing a data operation at each of a plurality of logical addresses; and recording a mark value in a last index area of a plurality of index areas respectively corresponding to the plurality of logical addresses.

9. The data recovery method of claim 8, wherein, in the recording of the mark value, if the data operation is performed first on a middle portion of the flash memory and then on other portions of the flash memory, the mark value is recorded in an index area corresponding to the middle portion of the flash memory.

10. The data recovery method of claim 8, wherein said plurality of logical addresses are a plurality of consecutive logical addresses.

11. A data recovery method used for a flash memory that includes data areas and index areas in which values indicating whether data stored in the respective data areas are valid are recorded, the data recovery method comprising: identifying a mark value recorded in an index area corresponding to a predetermined logical address; and determining whether data respectively stored at a plurality of logical addresses prior to the predetermined logical address, through a data operation, are valid based on the mark value.

12. The data recovery method of claim 11, wherein in the determining operation, it is determined whether the data respectively stored at the plurality of logical addresses are valid based on a mark value recorded in an index area corresponding to one of the plurality of logical addresses where the data operation has performed most recently.

13. The data recovery method of claim 12, wherein, in the determining operation, if the data operation is performed first on a middle portion of the flash memory and then on other portions of the flash memory, it is determined whether data stored in the flash memory are valid based on the mark value recorded in the index area corresponding to the middle portion of the flash memory.

14. The data recovery method of claim 12, wherein it is determined whether data stored at a predetermined logical address is valid based on whether data exists at a logical address subsequent to the predetermined logical address.

15. The data recovery method of claim 13, wherein it is determined whether data stored at a predetermined logical address is valid based on whether data exists at a logical address subsequent to the predetermined logical address.

16. The data recovery method of claim 12, wherein said plurality of logical addresses are a plurality of consecutive logical addresses.

Read More

Seagate Announced Restructuring Plan To Further Reduce Operating Costs

Seagate Technology announced it has initiated a restructuring plan that includes a reduction of approximately 1,100 employees or 2.5% of the company’s global workforce. This reduction is required to support a targeted run rate of product development and marketing and administrative costs of less than $300 million per quarter and to position the company to be cash flow and earnings positive within its fiscal year 2010.

The restructuring plan, which the company expects to be largely complete by the end of July 2009, is expected to result in total pretax restructuring charges of approximately $72 million. These charges will primarily be incurred in the June 2009 quarter and consist mainly of cash based employee termination costs which are expected to be substantially paid in the September 2009 quarter. The annual savings generated from this restructuring action is expected to be approximately $125 million.

Since the beginning of fiscal year 2009, and including today’s announcement, the company has reduced its global headcount through attrition and restructuring, resulting in a reduction in the company’s labor costs in excess of 25%. In addition, Seagate previously announced the realignment of its organizational structure to increase efficiency, as well as the closures of two recording media facilities and its Pittsburgh research facility, company-wide salary reductions announced in January 2009, and other cost reduction initiatives. Seagate continues to assess options to further reduce manufacturing operating costs.

Read More

The Information about Linux Desktop from IBM

linux21 May 2009: IBM announced the results of a study conducted by the I.T. analyst firm Freeform Dynamics, commissioned by IBM, which showed that Linux desktops were easier to implement than IT staff expected if they targeted the right groups of users, such as those who have moderate and predictable use of e-mail and office tools

The research behind the report, “Linux on the Desktop: Lessons from Mainstream Business Adoption,” was designed, executed and interpreted independently by Freeform Dynamics. Feedback was gathered via an online survey of 1,275 I.T. professionals from the U.K., U.S., Canada, Australia, New Zealand and a spread of other countries across Western Europe and the Nordics. Ninety percent of the study’s respondents had direct experience with desktop Linux deployment in their business.

Those with experience of such migrations said that Linux on the desktop was best achieved when it was first targeted to groups of non-technical users. Transaction workers and general professional workers were seen as more than twice as likely to be primary targets for desktop Linux adoption than mobile and creative staff. A majority of the respondents indicated that Linux desktop deployments to these targeted groups was easier than anticipated.

“Some users care a great deal about their desktop computing environment and may be emotionally or practically wedded to Windows,” said Dale Vile, research director, Freeform Dynamics. “The trick is to avoid getting distracted by these, and focus on the users for whom the PC on their desk is simply a tool to get their job done. Migrating a general professional user who only needs to access a couple of central systems, an email inbox and light word processing is pretty straightforward.”

Key statistics of the study include:

71% of respondents indicated cost reduction as their primary driver for adoption.
35% stated the ease of securing the desktop was another primary driver
32% cited the lowering of overheads associated with maintenance and support in general were factors contributing to the benefit of desktop Linux adoption
Those with experience of Linux desktop rollouts are 50% more likely to regard non-technical users such as general professional users and transaction workers as primary targets for Linux
58% of those with prior experience of a Linux desktop rollout see general professional users as primary targets
52% of those with prior experience of a Linux desktop rollout see transaction workers as primary targets.
32% of those with prior experience of a Linux desktop rollout see power users as primary targets.
47% of respondents said usability was the main consideration when evaluating or selecting a desktop Linux distribution for use in a business environment

The study confirmed Linux on the desktop adoption is primarily driven by cost reduction. About twice as many of the respondents cited cost savings over security as the primary driver of why they’d adopt Linux on the desktop. Participants in the study indicated that both environments can be secured adequately — it’s just cheaper to secure a Linux desktop and maintain it that way.

“If a company is a ‘Windows shop,’ at some point it will need to evaluate the significant costs of migrating its base to Microsoft’s next desktop and continuing the defense against virus and other attacks,” said Bob Sutor, vice president of Linux and open source, IBM Software Group. “Savvy IT departments see the Linux desktop as a PC investment that actually saves money during this downturn. We see the recession fueling open source on the desktop.”

The user groups in the study were defined as:

IT operations/support staff
General professional users (relatively light and predictable use of e-mail, office tools, etc)
Transaction workers (mostly using enterprise applications in a routine prescriptive manner)
Other (non-IT) technical staff (e.g. engineers, technical designers/architects)
Office based power users (e.g. finance staff, marketing teams, knowledge workers, etc)
Highly mobile professional users (e.g. sales, roaming managers, etc)
Creative staff (non-engineering, e.g. graphic design)

For more information on IBM, you can visit http://www.ibm.com/think

Read More

External Hard Disk Box

images11. An external hard disk box, used for installing a hard disk, wherein there is a first fastening hole and a second fastening hole on a bottom and two sides of the hard disk, the external hard disk box comprising: a lower cover having a receiving space for receiving the hard disk, wherein there is a first positioning portion that corresponds to the first fastening hole on the bottom surface of the receiving space; an upper cover covering the lower cover; and at least one positioning structure located on one side of the receiving space, wherein the positioning structure has a second positioning portion that corresponds to the second fastening hole.

2. The external hard disk box as claimed in claim 1, wherein the positioning structure is located on one side of the hard disk, the first positioning portion is plugged into the first fastening hole, and the second positioning portion is plugged into the second fastening hole.

3. The external hard disk box as claimed in claim 1, wherein the positioning structure is a flexible flake, the flexible flake has a side board, and the second positioning portion is located on the side board.

4. The external hard disk box as claimed in claim 1, wherein the positioning structure includes an external mask, a spring flake, and a pushing element, the external mask has a through hole that corresponds to the second positioning portion, one end of the spring flake is connected with the external mask, a second end of the spring flake is a free end and has the second positioning portion, and the pushing element is slidably located in the external mask and contacts the second end of the spring flake.

5. The external hard disk box as claimed in claim 1, wherein the positioning structure is a flexible element, one side of the flexible element bends to form a linking flake, one end of the linking flake is a free end and forms a pushing portion, and the pushing portion extends to form the second positioning portion.

6. The external hard disk box as claimed in claim 5, wherein the upper cover is slidably assembled with the lower cover, two leg columns extend from two sides of the bottom surface of the upper cover, and the leg column corresponds to the pushing portion.

7. The external hard disk box as claimed in claim 6, wherein there is a first wedged portion and a second wedged portion on the lower cover and the upper cover.

8. The external hard disk box as claimed in claim 5, wherein each of the flexible elements bends upwards to form at least one curved portion, and the curved portion pushes and contacts a bottom surface of the upper cover.

Read More

Access control method and module with data recovery option for a hard disk

1. An access control method for a hard disk, comprising the steps of: (A) partitioning the hard disk into primary and secondary partitions; (B) in response to a write command from a host terminal for storing write data in an addressable space found in the primary partition of the hard disk, (i) creating a recovery file that includes a write time, an address of the addressable space, and recover information including a starting data found in the addressable space of the hard disk during the write time, and (ii) storing the write data in the primary partition at the address of the addressable space, and the recovery file in the secondary partition; and (C) in response to a recover command from the host terminal, (a) retrieving the recovery files from the secondary partition, the write time in each of the retrieved recovery files being not earlier than a recovery time associated with the recover command, and (b) based on the contents of the recovery files retrieved in sub-step (a), restoring the primary partition to the starting data initially found therein during the recovery time.

2. The method of claim 1, wherein, in sub-step (ii), the address of the addressable space, the write data and the recovery file are stored in a buffer prior to storage in the hard disk.

3. The method of claim 1, wherein the recover information further includes the write data.

4. The method of claim 1, wherein, in sub-step (b), restoring of the primary partition is performed in a chronological order of the write times in the retrieved recovery files starting from one of the retrieved recovery files having a latest write time.

5. The method of claim 1, further comprising the step of reporting a total storage capacity of the hard disk as being equal to that of the primary partition in response to a capacity inquiry command from the host terminal.

6. An access control module for a hard disk that is partitioned into primary and secondary partitions, said access control module being responsive to write and recover commands from a host terminal, and comprising: a processor; a first interface adapted to connect said processor to the host terminal; a second interface adapted to connect said processor to the hard disk; a command interpreter coupled to said first interface for interpreting the write and recover commands; and a recovery file creator coupled to said processor and said command interpreter; wherein, in response to the write command for storing write data in an addressable space found in the primary partition of the hard disk, said command interpreter enables said recovery file creator to create a recovery file that includes a write time, an address of the addressable space, and recover information including a starting data found in the addressable space of the hard disk during the write time, and further enables said processor to store the write data in the primary partition at the address of the addressable space, and the recovery file in the secondary partition; and wherein, in response to the recover command from the host terminal, said command interpreter enables said processor to retrieve the recovery files from the secondary partition, the write time in each of the retrieved recovery files being not earlier than a recovery time associated with the recover command, and based on the contents of the recovery files retrieved by said processor, to restore the primary partition to the starting data initially found therein during the recovery time.

7. The access control module of claim 6, further comprising a buffer coupled to said processor, said processor storing the address of the addressable space, the write data and the recovery file in said buffer prior to storage in the hard disk.

8. The access control module of claim 6, wherein the recover information further includes the write data.

9. The access control module of claim 6, wherein said processor restores the primary partition in a chronological order of the write times in the retrieved recovery files starting from one of the retrieved recovery files having a latest write time.

Read More

Preventive recovery action in hard disk drives

1. A method in a data processing system for minimizing read/write errors caused by impaired performance of a hard disk drive during runtime operation of said hard disk drive, said runtime operation including an active mode during which read/write operations are performed and a standby mode during which no read/write operation is underway, said method comprising the steps of: monitoring at least one performance parameter of a hard disk drive during said standby mode of operation; and in response to detecting a degraded value of said at least one performance parameter during said monitoring, performing preventive recovery action only during said standby mode of operation, wherein said preventive recovery action includes restoring said performance parameter to an acceptable value without interfering with hard disk drive operation during an active mode.

2. The method of claim 1 wherein said performance parameter is signal resolution, and wherein said step of performing preventive recovery action comprises the step of adjusting a fly height of a read/write head within said hard disk drive, such that said signal resolution is maintained at an acceptable level.

3. The method of claim 1, wherein said data processing system includes a disk drive controller associated with said disk drive, said method further comprising the steps of: during said step of monitoring at least one performance parameter, detecting a degradation of said performance parameter beyond a pre-determined value; and in response to detecting a degradation of said performance parameter, performing preventive recovery action during said standby mode, wherein said preventive recovery action instructs said disk drive controller to undertake corrective action to rectify the degraded performance parameter.

4. The method of claim 1, further comprising the steps of: detecting a read/write error during said active mode of operation, said error having a cause that is correlated to said performance parameter; and in response to detecting a read/write error during said active mode of operation, examining said performance parameter during said standby mode, such that said cause may be diagnosed and further read/write errors prevented.

5. The method of claim 4, further comprising the step of correlating said preventive recovery action to said cause of said read/write error, such that said cause may be corrected.

6. The method of claim 4, wherein said step of examining said at least one performance parameter is preceded by the steps of: initiating a data recovery procedure during said active mode; and upon completion of said data recovery procedure, initiating preventive recovery action during said standby mode, such that a subsequent read/write error may be prevented.

7. The method of claim 6, wherein the step of initiating preventive recovery action during said standby mode is followed by the steps of: determining whether said cause has been corrected by said preventive recovery action; in response to said cause having been corrected, continuing said runtime operation of said hard disk drive; and in response to said cause having not been corrected, utilizing predictive failure analysis to issue a warning, such that said hard disk drive may be taken off-line.

8. A system for preventing read/write failures within a hard disk drive during runtime operation of said hard disk drive, said runtime operation including an active mode during which read/write operations are performed and a standby mode during which no read/write operation is underway, said hard disk drive including a controller for providing electromechanical control of said hard disk drive, said system comprising: means within a disk controller for monitoring a performance parameter of said hard disk drive during said standby mode of operation; means responsive to a detected degradation of said performance parameter for producing an error signal indicative of a potential hard disk drive failure; and means responsive to receiving said error signal for initiating preventive recovery action only during a standby mode of operation, wherein said preventive recovery action includes restoring said performance parameter to an acceptable value without interfering with hard disk drive operation during an active mode.

9. The system of claim 8, wherein said means for monitoring a performance parameter of a hard disk drive and said means for producing an error signal in response to detection of a potential hard disk drive failure, are predictive failure analysis instruction means.

10. The system of claim 9, further comprising: a controller for providing electromechanical control of said hard disk drive, said controller receiving and executing said predictive failure analysis instructions.

11. The system of claim 9, wherein said means for initiating preventive recovery action only during a standby mode of operation are preventive recovery action instruction means included within said controller.

Read More