Kinds of different types of malware

For those of us computer users would know about malware, viruses etc., it all is set malicious programs that potentially damage our computer systems, potentially even damage the hardware also
Here I will explain about the various versions of the virus lab. Avira

Adware
Adware is software That presents in banner ads or pop-up windows through a bar That appears on a computer screen. Those advertising spots usually can not be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.

Backdoors
A backdoor cans gain access to a computer by going around the computer access security Mechanisms.
A That program is being Executed in the background Generally enables the attacker Almost unlimited rights. User's personal data cans be spied with the backdoor's help, but are mainly Used to install Further computer viruses or worms on the relevant system.

Boot viruses

The boot or master boot sector of hard drives is mainly infected by boot sector viruses. Important information overwrite They Necessary for the system execution. One of the awkward consequences: the computer system can not be loaded any more ..


Bot-Net
A Bot-Net is collection of software bots, the which run autonomously. A Bot-Net cans comprise a collection of cracked machines running programs (usually Referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server Various purposes, Including Denial-of-service attacks, etc., Partly without the affected PC user's knowledge. The main potential of Bot-Nets Is That the networks cans Achieve dimensions on Thousands of computers and its bandwidth sum bursts most conventional Internet accesses.

Dialer
A dialer is a computer program That establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates Pls dialing up to the Internet Without Their Knowledge.

Distributed Denial of Service (DDoS)
Botnet drones are usually Able to attack servers, too: by sending numerous requests to a server from many clients simultaneously infected, They slow the server down. The server cans no longer answer the regular user requests.

EICAR test file
The EICAR test file is a test pattern That was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file the which is 68 characters long and its file extension is ". COM" Should Recognize all virus scanners as a virus.

Exploit
An exploit (vulnerability) is a computer program or script That takes advantage of a bug, glitch or vulnerability leading to privilege Escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs cans be infiltrated in order to obtain higher access.

Grayware
Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as Such. Mostly, information on the patterns of use is collected in order to Either sell these data or to place advertisements systematically.

Hoaxes
The users have obtained virus alerts from the Internet for A Few years and alerts against viruses in other networks are supposed to That spread is via email. These alerts are spread per email with the request That They Should Be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the "danger".

Honeypot
A honeypot is a service (program or server), the which is installed in a network.
It has the function to monitor a network and to protocol attacks. This service is unknown to the user legitime - Because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services the which are Offered by a honeypot, it is protocolled and sets off an alert.

Keystroke logging
Keystroke logging is a diagnostic tool in software development Used That Captures the user's keystrokes. It cans be useful to determine sources of error in computer systems and is Sometimes Used to measure employee productivity on to perform certain clerical tasks. Like this, confidential and personal data, Such as passwords or pins, can be spied and sent to other computers via the Internet.

Macro viruses
Macro viruses are small programs are written in. That the macro language of an application (eg WordBasic under WinWord 6.0) and cans That spread is normally only Within documents of this application. Because of this, They Are Also Called document viruses. In order to be active, That They need the corresponding applications are activated and That one of the infected macros has been Executed. Unlike "normal" viruses, macro viruses do consequently not attack executable files but They do attack the documents of the corresponding host-application.

Polymorph viruses
Polymorph viruses are the real masters of disguise. They change Their own programming codes - and are therefore very hard to detect.

Program viruses
A computer virus is a program That Is capable to attach Itself to other programs after being Executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, WHERE the virus deposits his virulent code. The program execution of the host Itself is not changed as a rule.

Scareware
The term refers to software scareware the which has been Designed with the intent to cause anxiety or panic. The victim Could Be tricked and feels threatened and usually accepts an offer to pay and have the threat removed inexistent. In Some cases the victim is seduced to cause the attack Himself by making uterus think this intervention will of successfully remove the threat.

Script viruses and worms
Such viruses are extremely easy to program and Theys cans spread - if the required technology is on hand - Within A Few hours via email round the globe.
Script viruses and worms use a script language Such as Javascript, VBScript etc. to infiltrate in other new scripts or to spread is by activation of operating system functions. This Happens frequently via email or through the exchange of files (documents).
A worm is a program That multiplies Itself but That does not Infect the host. Worms cans consequently not form part of other program sequences. Worms are Often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.

Security Privacy Risk (SPR)
The term "SPR /" ("Security or Privacy Risk") refers to a program the which cans damage the security of your system, triggering the program activities you do not Want or harm your private environment.

Spyware
Spyware are so called spy programs "That intercept or take partial control of a computer's operation without the user's informed consent. Spyware is Designed to exploit infected computers for commercial gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements. AntiVir is Able to detect this kind of software with the category "ADSPY" or "adware-spyware".

Trojan horses (short Trojans)
Trojans are pretty common nowadays. We are talking about programs "That pretend to have a particular function, but That Show Their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses can not multiply themselves, the which differenciates Them from viruses and worms. Most of Them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution They changed from active and cans, for example, format the hard drive. A dropper is a special form of Trojan that 'drops' viruses, ie embeds viruses on the computer system.

Zombie
A Zombie-PC is a computer infected with malware That Is That programs and enables hackers to abuse computers via remote control for criminal purposes. The affected PC, for example, can start Denial-of-Service-(DoS) attacks at command or send spam and phishing emails.

Of the many types of malware, the name of the Trojan Horse and Backdoor is a type of malware that most of us encounter

Related Post



0 komentar:

Post a Comment

Please leave a comment here
Comment spam and other promotions will be deleted