THE TYPES MAILWARE

Monday, June 6, 2011

Malware (Malicious Software)

People are often wrong call. The word virus is almost always used to refer to programs that are deliberately made ​​in order to
damage the computer without the computer owner's knowledge. This kind of program is known for malware (malicious software).
The virus was only one instance of malware. Besides viruses, there are worms, trojans, wabbit, etc., which also can be called malware.
Here are all kinds of malware.
1. Virus
This is the term often used for all types of software that interfere peangkat computer. It could be because this type of malware that appears first.
Viruses can be nested in many types of files. But arguably, the main target of the virus is a file that can be run as EXE, COM, and VBS, which became part of the software. Boot sector viruses are also frequently targeted for nesting. Some document files can also be used as a nest by a virus.
The spread to other computers performed with the aid of computer users. When the infected file is run in another computer, chances are that other computer will be infected too. Virus search for other files that can be attacked and then lodged in there.
Virus can also spread via peer-to-peer familiar people use to share files.
2. Worm Worm aka worm, so called. If a virus lodged in a program or document, these worms do not. Worm is a program that stands alone and does not need a nest to spread themselves.
Terrible, the worms may not need the help of people to spread. Through the network, the worm can "spawn" on the computers that are connected in a network. He entered from a fragility (vulerability) of a system, usually the operating system.
Once entered into a computer, the worm modifies some settings in the operating system in order to stay alive. At a minimum, he put himself in the process of booting a computer. Others, perhaps turn off access to antivirus sites, disable security features in the system, and other actions.
3. Wabbit
This term may be foreign, but there is this type of malware. Like the worm, wabbit not require a program and document for nesting.
Remain different from the worm that spread itself to other computers using the network, wabbit replicate continuously in a local computer and copies it would undermine the system.
Computer performance is slowed down due to power sumbera wabbit ate quite a lot. In addition to the computer's performance slows because of the use of these resources, wabbit can be programmed to have side effects that effect is similar to other malware. Malware combinations like these that can be very dangerous.
4. Keylogger
Be careful what you surf in cafes or in the office who have strict rules. It could be on that computer diinstali a software known as a keylogger that records all keyboard keystrokes.
Notes are stored in a file that can be seen then that complete. In it there can be information such as an application where the keystrokes made ​​and time presses. In this way, one can know the username, password, and other information entered by way of typing.
At a more sophisticated, keylogger send log which is usually a text file to someone. Of course it was done without the knowledge of the victim. At this level also keylogger can activate themselves when computer users perform certain actions.
For example like this. When a computer user opens an e-banking sites, active keylogger, and record all the pressure on the keyboard at the site in the hope that the PIN number can be recorded.
Keylogger is quite dangerous because anything as sophisticated encryption applied by a website, the password can still be retrieved. Because the password is encrypted before it is retrieved by the system. Clearly dong. Keyloggers record shortly after the password typed in and not yet processed by the system.
5. Browser Hijacker
An unforgettable event collapse of World Trade Center in New York, 9 September 2001. At that time, 2 plane which was hijacked and crashed the twin lead to building collapse.
Both aircraft should have departed from Boston to Los Angeles. But by the hijackers, the plane is directed into the WTC and crashed there. No different, browser hijacker directs the browser should display the site in accordance with the address entered into other sites.
It was the most severe examples of the consequences of disruption caused by browser hijackers. Another example that can be done by pirates this is to add bookmarks, change the home page, and change your browser settings.
Talk about a browser here can be assured of 100% of the browser is Internet Explorer discussed. In addition to its Internet Explorer is made ​​by Microsoft, the giant software producer whose products are frequently targeted for attack cracker, Internet Explorer is the browser most people use to surf. Not surprisingly, Internet Explorer has been integrated with Windows, Microsoft's operating system is much invaded by a cracker.
6. Trojan
Already 10 years old Greece shut Trojan. New tactics to defeat the Trojans were made. Greeks built a giant horse statue to awarded to Troy. In fact, inside the statue, there is a Greek army hiding. Meanwhile, the Greek soldier who locked Trojan bersembungi so as if Greece willing to let go of Troy.
Trojan horse statue was received and placed in the castle. At midnight, the Greek forces out of the horse statue and merengsek and succeeded in occupying the Trojan.
The term Trojan horse is then used for malware that seems a useful program, which is entertaining, that saves, but beyond that, he was destructive. Horses can be ridden by other malware such as viruses, worms, spyware. Trojan can be used to spread or to enable them.
It could be a program created as if it is a free antivirus. Indeed, the program was to remove a virus, but it turns out other than that, he also included other viruses into the computer.
The difference with viruses and worms, Trojans can not multiply. But a virus or worm that "nebeng" in it could have been.
7. Spyware
Spyware is software that collects and sends information about the user's computer without being noticed by the user. More information can be just that not too dangerous as the pattern of computing, especially the internet, someone, until the dangerous like credit card numbers, PIN for electronic banking (e-banking), and an account password.
Information about surfing patterns, has been mentioned, not too dangerous. Sites visited, information that is often sought, chat room chatter will be spied upon by the spyware.
Furthermore, the information is used to display ads that are usually in the form of pop-up window. Advertising is related to one's surfing habits. For example, often times a person seeking information about digital cameras. Pop-up window that appears will show, for example, a site that trades digital camera. Adware is a term for this spyware.
The spread of spyware similar to Trojan. For example, Flashget. When the use Flashget not yet registered, Flashget act as spyware. Try it yourself connecting to the Internet, run Flashget who have not registered, ignore the computer for a while, it would appear the Internet Explorer window that displays the advertisement of a site.
8. Backdoor
It's called play back. Fast want to Driving License (SIM), rather than through the standard procedure that requires this test and test it, better prepare the money to bribe officials. Quick SIM can no longer stand in line, without testing this and that.
Not unlike with example to make driver's license, in violation of procedures, malware trying to get into the system to access resources and files.
Based on the way to work and spreading behavior, backdoor can be divided into 2 groups. The first group are similar to Troy. They were manually inserted into a program on the software and then when the software was installed, they spread. Backdoors in this group is run as part of the boot process.
Ratware is the name for a backdoor that turns computers into zombies that send spam. Another backdoor can disrupt network traffic, perform brute force to crack passwords and encryption, and mendisitribusikan distributed denial of service attack (DDoS).
9. Dialer
Be careful if your home Internet connections using dial-up. If the computer is used, no rain no storm, try connecting to the Internet. Though none of the software that runs require a connection, then it is worth suspected. Computers may have been infected by malware that is known by the term dialer.
Add more severe because the dialer sometimes change the number of regular Internet service providers contacted by a number of other Internet service providers are usually long-distance number, often overseas number. As a result, a phone bill jumped immeasurably.
Why would connecting to the Internet? Who benefits?
Dialer connects the computer to the Internet to transmit information received by the keylogger, spyware or other malware to someone who was aiming that way. He and service providers call the most benefit from this dialer.

0 comments:

Post a Comment