วันอังคารที่ 12 พฤษภาคม พ.ศ. 2558

You can have Cryptolocker key on this website. (A list of the key that secures from servers)

You can have Cryptolocker key on this website. (A list of the key that secures from servers) https://www.decryptcryptolocker.com/.

Ps. Asked what the next ransomware. Whichever option you have just stuck local / spread network drive, or even run into the LAN to share the machine turned on, even when not map drive file type is both films document the general / mount specific saved game files /. exe file is changed, it can infect others if they want to open. Or stick it out every last name, it is not.

There are the name for malware to the encryption method used may rescue.

CTB-locker / critoni ECDH encryption using the file extension will be changed. CTB .CTB2 or Moore 7.
http://www.bleepingcomputer.com/virus-removal/ctb-locker-ransomware-information

CryptoDefense using RSA-2048 are entitled to recover 50/50.
http://www.bleepingcomputer.com/virus-removal/cryptodefense-ransomware-information

Ceasar Cipher CoinLocker the file extension will be changed. Encrypted recover.
http://www.bleepingcomputer.com/forums/t/565557/coin-locker-a-ransomware-that-tips-its-hat-to-julius-caesar/

Cryptowall using RSA-2048
http://www.bleepingcomputer.com/virus-removal/cryptowall-ransomware-information

TorrentLocker using AES file extension will be added. Encrypted.
http://www.bleepingcomputer.com/virus-removal/torrentlocker-cryptolocker-ransomware-information

CoinVault using AES
http://www.bleepingcomputer.com/virus-removal/coinvault-ransomware-information

BUYUNLOCKCODE (Which was then attached via TOT) using RSA / AES file extension will be added. .encoded. code,
http://www.bleepingcomputer.com/forums/t/561732/buyunlockcode-ransomware-detected-in-the-wild/

There are really a lot but try to bring my own.

How to increase the difficulty of infection Ransomware, CryptoLocker by install application firewall.

How to increase the difficulty of infection Ransomware, CryptoLocker by install application firewall.

First, as Dowload firewall

http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm

The program may seem annoying at first. But it will to keep yourself on the back firewall. They collect programs you use regularly done.
The protect at zeroday attack collisions by up to 99%, so it is ideal to be used with the support not being bossed the first.
After installing the program starts frewall then all programs stored history.

Later, if regular use, it can prevent the system to some version if the program is changed or updated files will be notice immediately.
If the file is opened using routine disguise. It is caught in a file EXE, COM, such as the Transfiguration was built. Pdf, .xls, .ppt, .txt, .py, .wb2, .jpg, .odb, .dbf, .md, .js,. .pl, and. doc is a virus Ransomware, CryptoLocker CTB locker full name Curve-Tor-Bitcoin Locker, BUYUNLOCKCODE, Crypt0l0cker and Alphacrypt whether a virus Crypto version after the year 2014 is still attached to this. Over the next several years
If users do not accidentally press firewall program to allow virus software running on the machine, it will reduce the loss not just of his course.
The additional safeguards in other systems, it should be added, for example. The right to access the server. Reproduced, stored or backed up regularly.