Below is a small part of computer malware that ever existed, malware is a malicious program that disrupt or even destroy our computer system.short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
Adware
Adware is software that serves banner ads or pop-up windows through a bar that appears on a computer screen. Place these ads usually can not be removed and consequently always visible. Data connections that allow many conclusions on the use and problematic behavior in terms of data security.
Backdoor
Backdoor can gain access to a computer by going around the computer access security mechanisms.
A program was implemented in the background generally enables the attacker almost unlimited rights. Users' personal data can be spied on with the help of a backdoor, but mainly used to install further computer viruses or worms on the relevant systems.
Boot virus
Boot or master boot sector of your hard drive mainly infected by boot sector viruses. They overwrite important information necessary for the execution system. One of the awkward consequences: the computer system can not take anymore ...
BotNet
BotNet is a collection softwarre bots, which run autonomously. A bot-net may consist of a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial of Service attacks, and so on, in part, without the knowledge of PC users affected. The main potential of Bot-Nets is that the network can reach thousands of dimensions on the computer and the bandwidth explosion of the conventional Internet access.
Dialer
Programm dialer is a computer that establishes a connection to the Internet or other computer networks via telephone lines or digital ISDN network. Fraudster use dialers to charge users a high level when the call to the Internet without their knowledge.
EICAR Test File
EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the function of anti-virus program. This is a text file that is 68 characters long and the file extension is ". COM "virus scanners should recognize as virus.
Exploit
Exploit (vulnerability) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of exploitation of such an attack from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Grayware
Grayware operate in a way similar to malware, but does not spread to the user directly harmful. This does not affect the functionality of such systems. Mostly, information about usage patterns gathered to sell both the data or to place advertisements systematically.
Hoax
The users have obtained virus alerts from the Internet for several years and a warning against viruses in other networks that should be spread via email. Signs are scattered every email with a request that they should be sent to the highest number of colleagues and to other users, in order to warn everyone against the "danger".
Honeypot
A honeypot is a service (program or server), which is installed in the network.
Its function is to monitor the network and to protocol attacks. This service is not known by the user legitime - for this reason he was never treated. If an attacker to check the network for weak points and use the services offered by a Honeypot, it is a warning protocolled and set off.
Keystroke logging
Or keylogger keystroke logging is a diagnostic tool used in software development that captures the user's keystrokes. This can be useful to determine sources of error in computer systems and is sometimes used to measure the productivity of employees on administrative tasks specific. Like this, confidential and personal data, such as passwords or PINs, can be spied on and sent to other computers via the Internet.
Macro viruses
Macro viruses are small programs written in macro applications (eg WordBasic under WinWord 6.0) and which can normally only spread within documents of this application. Because of this, they are also called document viruses. To be active, they require that the relevant application is activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do not attack the result executable files but they attacked the documents from the host-appropriate applications.
Polymorph virus
Polymorph virus is a virus that can disguise. They change their own programming codes - and because it is very difficult to detect.
Virus program
A computer virus is a program able to attach itself to another program after the execution and cause infection. The virus does not multiply as logic bombs and Trojans. In contrast to the Worms, a virus always requires a program as host, where it deposits a deadly virus code. Host program itself does not change as a rule.
Scare ware
Scare ware term referring to software that has been designed with the intent to cause anxiety or panic. Victims can be deceived and feel threatened and usually accept the offer to pay and have removed the threat inexistent. In some cases the victim is tempted to attack their own cause by making them think this intervention will get rid of the threat.
Script viruses and worms
such virus is very easy to program and they can spread - if the technology needed in hand - in a few hours via email around the world.
Script viruses and worms use scripting languages like JavaScript, VBScript etc. to infiltrate in other new scripts or to spread by the activation function of the operating system. This often happens via email or through the exchange of files (documents).
A worm is a program that doubles itself but it does not infect the host. The worm can consequently not part of a series of other programs. Worms often only possibility to infiltrate all sorts of destructive programs with system security measures is limited.
Privacy Security Risk (SPR).
The term "SPR /" ( "Security or Privacy Risk") refers to a program that can disrupt your system, triggering the program activities that you do not want or endanger your personal environment.
Spyware
Spyware is spying program called the intercept or take some control of the computer operating without user consent. Spyware is designed to exploit infected computers for commercial gain. Typical tactics advance this goal include delivery of unsolicited pop-up ads. AntiVir can detect this kind of software with the category "ADSPY" or "adware-spyware".
Trojan horses
Trojan quite common today. We are talking about programs that pretend to have certain functions, but in fact they are showing pictures after execution and carry out different functions, in many cases, damaging. Trojan horses cannot multiply themselves, which they differentiates from viruses and worms. Most of them have interesting names (SEX.EXE or STARTME.EXE) with a view to encourage users to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that 'down' the virus, which is a comprehensive virus on computer systems.
Zombie
Zombie-PC is a computer infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. Affected PC, for example, can start Denial-of-Service-(DoS) attack on command, or sending spam and phishing emails.
Backdoor
Backdoor can gain access to a computer by going around the computer access security mechanisms.
A program was implemented in the background generally enables the attacker almost unlimited rights. Users' personal data can be spied on with the help of a backdoor, but mainly used to install further computer viruses or worms on the relevant systems.
Boot virus
Boot or master boot sector of your hard drive mainly infected by boot sector viruses. They overwrite important information necessary for the execution system. One of the awkward consequences: the computer system can not take anymore ...
BotNet
BotNet is a collection softwarre bots, which run autonomously. A bot-net may consist of a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial of Service attacks, and so on, in part, without the knowledge of PC users affected. The main potential of Bot-Nets is that the network can reach thousands of dimensions on the computer and the bandwidth explosion of the conventional Internet access.
Dialer
Programm dialer is a computer that establishes a connection to the Internet or other computer networks via telephone lines or digital ISDN network. Fraudster use dialers to charge users a high level when the call to the Internet without their knowledge.
EICAR Test File
EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the function of anti-virus program. This is a text file that is 68 characters long and the file extension is ". COM "virus scanners should recognize as virus.
Exploit
Exploit (vulnerability) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of exploitation of such an attack from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Grayware
Grayware operate in a way similar to malware, but does not spread to the user directly harmful. This does not affect the functionality of such systems. Mostly, information about usage patterns gathered to sell both the data or to place advertisements systematically.
Hoax
The users have obtained virus alerts from the Internet for several years and a warning against viruses in other networks that should be spread via email. Signs are scattered every email with a request that they should be sent to the highest number of colleagues and to other users, in order to warn everyone against the "danger".
Honeypot
A honeypot is a service (program or server), which is installed in the network.
Its function is to monitor the network and to protocol attacks. This service is not known by the user legitime - for this reason he was never treated. If an attacker to check the network for weak points and use the services offered by a Honeypot, it is a warning protocolled and set off.
Keystroke logging
Or keylogger keystroke logging is a diagnostic tool used in software development that captures the user's keystrokes. This can be useful to determine sources of error in computer systems and is sometimes used to measure the productivity of employees on administrative tasks specific. Like this, confidential and personal data, such as passwords or PINs, can be spied on and sent to other computers via the Internet.
Macro viruses
Macro viruses are small programs written in macro applications (eg WordBasic under WinWord 6.0) and which can normally only spread within documents of this application. Because of this, they are also called document viruses. To be active, they require that the relevant application is activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do not attack the result executable files but they attacked the documents from the host-appropriate applications.
Polymorph virus
Polymorph virus is a virus that can disguise. They change their own programming codes - and because it is very difficult to detect.
Virus program
A computer virus is a program able to attach itself to another program after the execution and cause infection. The virus does not multiply as logic bombs and Trojans. In contrast to the Worms, a virus always requires a program as host, where it deposits a deadly virus code. Host program itself does not change as a rule.
Scare ware
Scare ware term referring to software that has been designed with the intent to cause anxiety or panic. Victims can be deceived and feel threatened and usually accept the offer to pay and have removed the threat inexistent. In some cases the victim is tempted to attack their own cause by making them think this intervention will get rid of the threat.
Script viruses and worms
such virus is very easy to program and they can spread - if the technology needed in hand - in a few hours via email around the world.
Script viruses and worms use scripting languages like JavaScript, VBScript etc. to infiltrate in other new scripts or to spread by the activation function of the operating system. This often happens via email or through the exchange of files (documents).
A worm is a program that doubles itself but it does not infect the host. The worm can consequently not part of a series of other programs. Worms often only possibility to infiltrate all sorts of destructive programs with system security measures is limited.
Privacy Security Risk (SPR).
The term "SPR /" ( "Security or Privacy Risk") refers to a program that can disrupt your system, triggering the program activities that you do not want or endanger your personal environment.
Spyware
Spyware is spying program called the intercept or take some control of the computer operating without user consent. Spyware is designed to exploit infected computers for commercial gain. Typical tactics advance this goal include delivery of unsolicited pop-up ads. AntiVir can detect this kind of software with the category "ADSPY" or "adware-spyware".
Trojan horses
Trojan quite common today. We are talking about programs that pretend to have certain functions, but in fact they are showing pictures after execution and carry out different functions, in many cases, damaging. Trojan horses cannot multiply themselves, which they differentiates from viruses and worms. Most of them have interesting names (SEX.EXE or STARTME.EXE) with a view to encourage users to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that 'down' the virus, which is a comprehensive virus on computer systems.
Zombie
Zombie-PC is a computer infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. Affected PC, for example, can start Denial-of-Service-(DoS) attack on command, or sending spam and phishing emails.
0 komentar: on "Malicious Software or Malware"
Post a Comment