India is a country with questionable standards on copyright and security issues. This explains why most computers (PCs) in the country use pirated or hacking software, especially the operating system (OS). Pre-installed and standard OS for most laptops with names for sale in India. Typically, the seller attaches the OS and other software to the machine as part of the contract. Since the user does not have to pay for it, it is more fun to use software that is tied or broken. If a cyber attack happens, it will be a nightmare, the latest episode of Wanna cry ransome. The main reason for this is that the hack (which is part of software updates or software updates) that can protect your PC from cyber attacks does not detect such broken or embedded software.
HISTORY:
The first software copy protection for software was implemented on Apple II, [12] Atari 800 and Commodore 64 computers. Software publishers have implemented more sophisticated methods in an effort to prevent unauthorized copying of software.
In Apple II, unlike modern computers that use standard device drivers to manage device communication, the operating system directly controls the step motor that moves the floppy drive head and provides a direct description of the raw data. Reads from each track to identify the so-called nibbles. Data fields. It allows complex disk-based software copy protection by storing data on half tracks (0, 1, 2.5, 3.5, 5, 6 ...) and quarter tracks (0, 1, 2.25, 3.75, 5, 6). ), And its combination. In addition, the tracks do not need to be a proper ring, but can be segmented so that the fields between the overlapping offset tracks are unstable, which is a more serious version of spiral tracking. It also revealed that most floppy drives do not have a fixed upper limit for head movement, and it is sometimes possible to write the 36th track in addition to the usual 35 tracks. The standard Apple II copy program could not read such protected floppy disks because standard DOS assumed that all disks had a similar 35-track, 13-, or 16-sector layout. Specialized coter-copy programs such as Locksmith and Copy II Plus can sometimes copy these disks using a reference library of known security methods; When protected programs are cracked they are completely removed from the copy protection system and transferred to a standard format disk that can be read by any regular Apple II copy program.
One of the basic ways to hack these early copy protections is to run a program that mimics the normal CPU operation. The CPU simulator provides hackers with a number of additional features, such as single-phase capability through each processor instruction and checking the CPU register and modified memory space, while the simulator is running (any advanced disassembler / debugger can do so). Apple II provides built-in opcode disassembly, which allows raw memory to be decoded into CPU opcodes, which can then be used to test what's copy-protection going on. There is usually no protection available for the copy protection system, as its secrets are all reflected by the simulation. However, in addition to hacking software, the simulation often runs very slowly, even at maximum speed, since the simulation runs on the original CPU.
On Atari 8-bit computers, the most common security method is through "bad areas". These are sectors on disk that are intentionally unreadable by disk drives. The software looks for these areas while the program is loading and the error code is not returned when accessing these areas. Special copy programs are available that mimic the disk and remember any bad sectors. The user can use an app to spin the drive and display the drive RPM by constantly reading the single field. A small screwdriver can be used to slow down the drive RPM below a certain point along the disk drive top. After the drive slows down, the application can go into the "bad sector" and write where needed. When the drive RPM returns to normal and an unplanned copy is made. The software is sure to crack to create good areas for easily copied disks without the need for a disk drive. More and more advanced methods have been developed over time, but almost all types contain some type of disk data, for example an area where different data can be returned in different accesses due to a lack of data. Products became available (from companies such as Happy Computer) that changed the controller BIOS to Atari's "smart" drives. These upgraded drives allowed the user to make accurate copies of the original program with copy protection on the new disk.
In Commodore 64, a number of methods were used to protect the software. For software distributed on ROM cartridges, subroutine is included, which attempts to write to program code. If the software is in the ROM, nothing happens, but if the software is transferred to RAM, the software is disabled. Due to the operation of the Commodore floppy drive, the proper protection scheme causes the floppy drive head to explode at the end of its rail, making the drive head incorrect. In some cases, cracked versions of the software are required to prevent this result. A faulty drive head is usually fixed by cracking against the train stop. Another brutal defense scheme is grounding from tracks 1 to 40 and back some time.

Most beginner software crackers prefer computers, often forming groups that compete with each other in the cracks and spread of software. Breaking the new copy protection scheme as soon as possible was seen as an opportunity to demonstrate one's technical superiority rather than a chance to make money. Some less skilled enthusiasts take already cracked software and edit various unencrypted texts in it to change messages, describing the game as a game player, often considered somewhat obscene. Uploading altered copies to a file-sharing network can be fun for adult users. Cracker groups in the 1980s began to advertise themselves and their skills by attaching animated screens called crack intros to software programs they released. As the challenges of building visually stunning contacts expand from breaking technical competition, the foundations for the new subculture are called demosines. It began to separate itself from the illegal "luggage scene" in the 1990s and is now considered a completely different subculture.
The latest version of WannaCry runs on Windows OS, especially the XP version of the hack-attack system. Two things should be noted here. Earlier, Microsoft announced that it would no longer support XP and asked users to upgrade to its latest OS. Second, consumers (such as the most expensive automatic calling machines in India - such as ATMs) continue to use WinXP today. At the same time, in March 2017, Microsoft released a special security clip, fearing malicious exploitation of Windows, especially XP. This patch was installed by people who bought X-rated XP from Microsoft and who kept their systems in auto-update mode. Saved them from the plague. Those who are still using pirated Windows and have not installed the patch are at risk of contracting the virus.
What is the solution?
First, we need to understand what software is moldy or broken. Modify the code to eliminate software vulnerabilities or violations (as it was known in the 1980s) (read the requirement to prove authentication or license key) or remove adware such as adware Cracking is a tool for dealing with software cracks such as a stolen serial number or cracking device. Some of these devices are called keygen (key key), patch or loader. Keegen creates the software key you really want to use. A patch is a small program or piece of software that repairs broken or molded software when it is locked. It is illegal to use or distribute broken or damaged software, which could lead to court action. Also, if you install such broken or molded software, there is always a risk of being associated with malware.
The high cost of the OS, the easy availability of molded or broken software at very low cost or even the free version are the main reasons why people choose it. For example, Windows 10 Pro is available for download from the Microsoft website for Rs. 14,999. You can buy a broken or stolen version of the same OS for Rs 100 at Lamington Road, a technology center in Mumbai. A common solution is to force PC retailers to sell systems with a pre-installed OS, similar to the way laptops are sold. This is especially difficult as millions of young players (compilers) are selling PCs to end users. Microsoft solves this problem by providing these integrators at a lower cost to its OS and other software. But it is not so easy and takes some time.
What can an end user do to protect his PC from cyber attacks?
1. Use official software, especially OS and Office suites. No need to buy expensive software - there is a compatible OS and software available that works just like expensive software.
2. Get your PC to get automatic updates, especially on the OS.
3. Check your PC for broken or molded software. If possible, download or install the original website, which can be downloaded from the official website or purchased from an authorized dealer / distributor.
4. Update your anti-virus and anti-malware software and scan your PC. Delete all affected files.
5. Disconnect from the Internet while working on locally stored files.
Comments
Post a Comment