In common parlance, in fact, many use the term virus to indicate, in fact, an abundance of harmful elements that, instead, should be identified by the term malware (malicious software or Malicios Software) or badware...
This "malware" is nothing but a program (or part thereof) that "does something that if we knew not let them do" as I usually call me.
This "something" can range from simple information gathering to the redirection of web pages visited, the exploitation of our connection to the exploitation of our processor, automatic sending of spam from your computer to download other malicious software in short, nothing pleasant .
Is classified as Malware?
Depending on the function of the modus operandi, the structure of the code used in the Malware can be classified into several categories:
* Virus
* Worm
* Trojan Horse
* Rootkit
* Backdoor
* Keyogger
* Botnet
* Dialer
* AdWare
* Spyware
* Downloader
* Exploit
* Spam
* Hoax
There are other minor categories such as Rogue Software (never heard of the infamous Antivirus 2009?).
Therefore, let's define what these are and what they do "nice" guests once they have settled into our system.
Definitions.
- VIRUS
A virus itself has the sole ability to copy itself from one computer to another in the form of executable code (for example through the use of USB drives, CD / DVD or other media over the Internet or a LAN) and attacks another program by copying it in its own malicious code.
- WORM
Tended harm to a network (bandwidth consumption, packet collision, etc.) and not to computer files as it does a Virus.
- TROJAN HORSE (or Trojan)
Usually they are voluntarily downloaded from the Internet consciously by someone ignorant of the ultimate goal of the application that can range from destruction of data to an attack DoS (Denial of Service).
Typically has a catchy name and / or harmless:
screensaver.exe - sex.exe - telefonogratis.exe - downloadWindowsMediaPlayer.exe
- ROOTKIT
A rootkit is a malware (the above categories are not exclusive) with the ability to completely hide the system (can not find the files that make up the processes, registry keys etc. ..).
- BACKDOOR
Once you open this door (it may be a program as an inherent vulnerability of a system or software) the attacker is always the door open to come back and do more "damage."
- BOTNET
It is used to attack other systems through a node system on the botnet so attacked the attack is detected as having been made by one of these (ignorant) nodes.
- KEYLOGGER
There are also hardware keyloggers.
- DIALER
With the spread of DSL connections are gradually disappearing.
- ADWARE
They are considered dangerous because many of them are also Spyware.
The advertisements, however, are used by developers to keep the costs of software production. The most popular programs are Adware: eMule_Adunanza, Eudora, Daemon Tools, RealPlayer and Messenger Plus! Live.
- SPYWARE
The most popular spyware consist Zango Search Assistant and SonicMail
- DOWNLOADER
- EXPLOIT
In December 2005 it was discovered a vulnerability in Windows Metafile that allowed the attack with the simple insertion of a clip in this format in an email, it was not necessary that the user opened or i ran no content: the simple view of 'preview of the email in question caused the exploit in the target system by installing a Trojan.
- SPAM
- HOAX
I have received email according to which the famous MSN Messenger would become "paid" by one of my contacts (which I promptly rebuked and informed)!
Conclusions
I tried to make this series definition as accessible as possible to those of computer security and knows very little, hoping to shed light on some little known aspects.
A quick debunk some myths about Virus, Antivirus, and Security.
Electronic News:
>> Apple ibook g4 battery
>> Toshiba pa3399u 2brs
>> Acer aspire one battery
>> HP Compaq NX9030 battery
>> Dell Latitude E5400 battery
没有评论:
发表评论