2010年11月22日星期一

Let's clarify Viruses, worms, spyware, etc.

First, we start by saying that the term Virus is an often abused. Unfortunately the same thing that happened with the term "hacker" now in common usage in the sense of crackers.
In common parlance, in fact, many use the term virus to indicate, in fact, an abundance of harmful elements that, instead, should be identified by the term malware (malicious software or Malicios Software) or badware...
This "malware" is nothing but a program (or part thereof) that "does something that if we knew not let them do" as I usually call me.
This "something" can range from simple information gathering to the redirection of web pages visited, the exploitation of our connection to the exploitation of our processor, automatic sending of spam from your computer to download other malicious software in short, nothing pleasant .

Is classified as Malware?
Depending on the function of the modus operandi, the structure of the code used in the Malware can be classified into several categories:
* Virus

* Worm

* Trojan Horse

* Rootkit

* Backdoor

* Keyogger

* Botnet

* Dialer

* AdWare

* Spyware

* Downloader

* Exploit

* Spam

* Hoax
There are other minor categories such as Rogue Software (never heard of the infamous Antivirus 2009?).
Therefore, let's define what these are and what they do "nice" guests once they have settled into our system.

Definitions.
  • VIRUS
A virus itself has the ability to copy itself on a computer without the user's awareness.
A virus itself has the sole ability to copy itself from one computer to another in the form of executable code (for example through the use of USB drives, CD / DVD or other media over the Internet or a LAN) and attacks another program by copying it in its own malicious code.
  • WORM
The Worm (worm) is similar to the virus and also has the ability to spread in a network without user intervention or knowledge, but is not included in the code of other programs being himself an executable program.
Tended harm to a network (bandwidth consumption, packet collision, etc.) and not to computer files as it does a Virus.
  • TROJAN HORSE (or Trojan)
The word itself (Trojan Horse) gives some idea of what a Trojan: A program that promises one thing (pleasant, desirable) and does another (unpleasant, undesirable).
Usually they are voluntarily downloaded from the Internet consciously by someone ignorant of the ultimate goal of the application that can range from destruction of data to an attack DoS (Denial of Service).
Typically has a catchy name and / or harmless:
screensaver.exe - sex.exe - telefonogratis.exe - downloadWindowsMediaPlayer.exe
  • ROOTKIT
I will not elaborate on the explanation of the origin of the name for which refer to reading this article.
A rootkit is a malware (the above categories are not exclusive) with the ability to completely hide the system (can not find the files that make up the processes, registry keys etc. ..).
  • BACKDOOR
A Backdoor (back door) denotes a secure access to those who have already made a connection to a goal (our computer, unfortunately).
Once you open this door (it may be a program as an inherent vulnerability of a system or software) the attacker is always the door open to come back and do more "damage."
  • BOTNET
A botnet is a network of computers (called zombie) compentence controlled by a remote user.
It is used to attack other systems through a node system on the botnet so attacked the attack is detected as having been made by one of these (ignorant) nodes.
  • KEYLOGGER
A keylogger is a program that can intercept keystrokes pressed to rebuild the user's typing and send it to a remote user or save it locally for future reference.
There are also hardware keyloggers.
  • DIALER
A dialer creates, without your knowledge, a new telephone line connection or ISDN and consists, in general, premium rate number that drives the phone bill.
With the spread of DSL connections are gradually disappearing.
  • ADWARE
Adware will go with the term to refer to all those who view software, download it or play advertisements.
They are considered dangerous because many of them are also Spyware.
The advertisements, however, are used by developers to keep the costs of software production. The most popular programs are Adware: eMule_Adunanza, Eudora, Daemon Tools, RealPlayer and Messenger Plus! Live.
  • SPYWARE
We identify with this term all the programs that gather information on uses, customs and user data without his consent and transmitted through the Internet.
The most popular spyware consist Zango Search Assistant and SonicMail
  • DOWNLOADER
As mentioned in the category of programs that perform all the Downloader to download other malware on the target computer.
  • EXPLOIT
Exploit The term refers to a program (or part thereof), a set of data, especially sending packets over the Internet or a sequence of commands that could exploit a vulnerability in a target system or software installed on it.
In December 2005 it was discovered a vulnerability in Windows Metafile that allowed the attack with the simple insertion of a clip in this format in an email, it was not necessary that the user opened or i ran no content: the simple view of 'preview of the email in question caused the exploit in the target system by installing a Trojan.
  • SPAM
The Spam is the so-called "junk mail". It may contain other types of Malware.
  • HOAX
This is called "Buffalo" or false information in attempting to mislead with aspects of verosomiglianza facts or actual things and tends to throw into confusion the recipient of the information.
I have received email according to which the famous MSN Messenger would become "paid" by one of my contacts (which I promptly rebuked and informed)!

Conclusions
I tried to make this series definition as accessible as possible to those of computer security and knows very little, hoping to shed light on some little known aspects.
A quick debunk some myths about Virus, Antivirus, and Security.
Electronic News:
>> Apple ibook g4 battery

>> Toshiba pa3399u 2brs

>> Acer aspire one battery

>> HP Compaq NX9030 battery

>> Dell Latitude E5400 battery

没有评论:

发表评论