Written by Clifford

The problem with antivirus software is that it can only detect what it already knows.

And still this is not enough.

Think about it: if such tools worked, then why do so many companies get hacked?

Here we give your some ideas of how to police your environment and to look for signs of malware.

Sign up for security bulletins from Microsoft and study those.

These mainly exploit buffer overflow issues in these programs.

Then it launches methods .dlls that are known to have security issues.

Then it gains command line access to the DOS prompt.

In the most sophisticated attacks this malware also will disable whatever antivirus software you have running.

When it comes to less sophisticated attacks, users are usually at fault.

The user clicks on it and installs the malware.

The best defense against this is to train users not to do that.

These viruses are distributed via phishing attacks.

The best defense against hackers is to assume that you have been hacked.

I know this is difficult for virtual machines running mission critical applications.

Types of attacks by importance

There are three categories of hacker attacks that should concern you.

Here are some examples.

Finding out whether your gear is a part of a botnet can be difficult.

For the average person it is impossible.

The reason botnets work so well is many people do not know much about computers.

So they will know nearly nothing about computer security.

That is why there are millions of computers on the internet that are in botnets.

These botnets are rented to criminal enterprises and political activists for denial of service attacks.

Critical risk

Critical risk attacks are when hackers have targeted your company for data theft.

They have hacked your computers and are sending out data to their command and control centers using botnets.

They communicate with the command and control center to receive instructions.

Linux has easier-to-use text parsing tools than Windows.

You could also read data going out at the firewall and use regular expressions to look for certain patterns.

Assume that your desktops have been hacked and erase them frequently.

Finally, train all your employees on the dangers of the internet.