What is Malware? "Malicious Software"
What is Malware? "Malicious Software"
What is Malware? "Malicious Software"
Malware is short for " Malicious software(malware), a term that encompasses all types of computer program or code whose function is to damage a system or cause a malfunction.
Within this group we find terms such as: Virus, Trojan (Trojan Horse), worm (Worm), Dialers, Spyware, Adware, Hijackers, Keyloggers, FakeAVs, Rogues, etc ....
At present and since the old called Virus now share duties with other families, it is called directly to any parasite / infection, directly as a "Malware."
They all shape the landscape of malware today.
Virus:
Computer Viruses are simply programs designed to infect other systems and creating in modifications and damage programs that make these work incorrectly and thus interfere with the overall team performance, record, corrupt or delete data, or spread themselves to other computers and internet .
Would be similar to viruses that affect humans and that antibiotics must be implemented in this case would be the Antivirus.
Worms:
These programs are developed to reproduce by any means of communication such as e-mail (the most common), messengers and P2P networks.
The aim of these is to reach as many users as possible and achieve distribute other types of malicious code that will be mentioned below.
The latter will be responsible for carrying out the deception, theft or fraud. Another common objective of the worms is to DDoS attacks against specific websites or even eliminate "virus which are the responsibility" for the business that is trying to complete.
Trojan:
In theory, a Trojan is not virus, it does not comply with all the features of the same, but because these threats can spread the same way, often included within the group.
A Trojan is a small program usually hosted within another application (a file) normal.
Its aim is to pass unnoticed by the user and installed on the system when it executes the file "host."
After settling, can perform many different tasks, hidden from the user. Currently they are used for installation of other malware such as backdoors and allow access to the system operator of the threat.
Some Trojans, at least, pretend to perform a useful function to the user while also realize the harmful action.
The similarity to the "Trojan horse" of the Greeks is evident and because of that property were named.
Backdoors:
These programs are designed to open a "back door" in our system so as to allow the creator of this application to access the system and do what you want with it.
The goal is to get a lot of infected computers to dispose of them freely to the point of network forms as described below.
Adware:
Adware is software that displays advertising for different products or services. These applications include additional code that displays pop-up advertising, or through a bar that appears on the screen pretending to offer various services useful to the user.
Generally, add graphics icon toolbars for web browsers or email clients, which have predefined keywords for the user to get to sites with advertising, whatever you are searching.
Spyware:
Spyware or Spyware is an application that collects information about a person or organization without their knowledge or consent.
The most common objective is to distribute to advertising companies or other organizations. Typically, the software sends information to its servers, according to the user's browsing habits.
Also, collect data about the sites that are browsed and requested information on those sites, as well as IP addresses and URLs visited.
This information is exploited for marketing purposes, and often is the source of other pests such as SPAM, as may face personalized advertising to the affected user.
With this information, it is also possible to create statistical profiles of the habits of Internet users.
Both types of software generally tend to "dress up" and useful applications that have a role to the user, in addition to auto download offering in many places recognized.
Dialer:
Try to dial into a premium rate number.
Hijacker:
They are responsible for "Hijacking" the functions of our system by changing the home page and search and / or other browser settings.
These can be installed on the system without our consent when you visit certain Web sites using ActiveX controls or to be included by a Trojan.
Joke:
Make a joke to the user computer.
Rootkit:
Is a set of tools frequently used by computer hackers or crackers who illegally gains access to a computer system.
These tools are used to hide processes and files that allow the intruder to maintain access to the system, often with malicious intent.
There are rootkits for a wide variety of operating systems including Linux, Solaris or Microsoft Windows.
For example, the rootkit may hide an application to launch a console whenever the attacker to connect to the system through a port.
The kernel or kernel rootkits can contain similar functionality.
Hacking Tool:
Allows hackers to perform dangerous actions for victims of the attacks.
Keylogger:
Responsible for applications stored in a file everything the user enters on the keyboard (keyloggers).
Are entered by many trojans to steal passwords and information from computers that are installed.
Hoax:
Are emails with false virus warnings.
Spam:
It is the indiscriminate sending of unsolicited emails, usually advertising.
FakeAVs & Rogues:
Basically a rogue is a rogue software program that will show false results of our system offering both pay for this to be in charge of repair.
Of course this is all completely untrue and the only goal is to trick the user to buy their bogus product.
Among the highlights are the FakesAVs (Fake Antivirus) and FakeAS (Fake antispyware).
Did you like this post? Would you like to receive this and many other items in your email every day? visit my blog and be the first to know more guides
Best SEO Software FREE Revit Architecture software Review article Error 0x800cc0f - How to Fix it Searching the best Forex Software How to Fix the 0x800ccc0b Error and Other Pc Errors 102 v Generate Unlimited Unique Versions Of Articles Using Revolutionary Software ! The Trouble With Beat Generator Software How To Fix DSChart.dll Error An Easy Shopping Cart Software Will Work Well With Proper Planning Watch Out For These Danger Signs When Choosing An Easy Shopping Cart Software Overcoming the Costs of EMR Software 15 Things to Look Before Buying Help Desk Software Test Software from a Functional Perspective Using Functional Testing Technique!