Selasa, 01 Februari 2011
What Is Malware?
The most common things that people recognize for malicious software programs are spyware
and adware. While these may be more commonly known, there is another just a vicious.
Introducing another "ware" program that is a big culprit of computer viruses by hackers...
malware.
What exactly is malware?
The name goes from the combination of "malicious" and "software". How does malware get its
name? It actually gets it because it focuses more on intent rather than the software itself. A
program cannot be thought of malicious on its own unless it is being used for those purposes.
As most people know, a software's purpose is all dependent on the person who created it.
There are three types of malware that people who connect to the Internet need to be concerned
about and watching out for. They are:
1. Infectious - This malware type mainly virus and worms in it. These are the more common
known malware. When the word virus is used this day in age, most people think immediately
computer rather than a physiological virus. Virus and worms will differ in how they operate and
distribute themselves.
- How does a virus get spread? Usually by going through floppy drives disks. The virus will
replicate and attach itself to a executable file and will run whenever the program is activated or
the disk is opened.
- When was the worm introduced? This computer malware was first seen when the Internet was
first used. The malware scans many networks for those vulnerable, unprotected systems and
then it will copy itself to them. From there, it starts the process all over again, except it uses the
new network.
Though the two are distinct in nature, they are often times used to describe one or the other to
explain malware.
2. Concealers - This type of malware is designed to "conceal" itself from the user. There are
two concealers used. They are:
- Trojan Horse - Today's Trojan horses have various appearances. It can disguise itself as a
computer utility and can "encourage" a person to use it to improve computer systems. When the
person downloads the program, it then makes way for other malware and software to be
"installed" onto the computer.
Creators of viruses use the Trojan horse to cause a widespread virus outbreak. When a
computer has a Trojan horse on it, it is subsequent to spread the virus to many other networks.
- Backdoors - This is used to create another way to get into your computer system. Typically
used by hackers, it helps them to avoid security systems that people have installed onto their
computer. Hackers can then "hijack" a computer to do with what they please.
3. Profit Malware - Some companies use malware to increase their profit margins. How they do
this comes in the form of a dialer. What is a dialer and exactly how does it affect your computer?
A dialer is the type of malware that will mess with your computer's Internet speed connection by
rerouting your existing line through an even more expensive phone line, which then increases
the bill you would not have normally paid.
When a person is infected with this malware, it forces them to pay a larger amount of money for
a service they have no real need for. Should a person be infected with this malware, they should
go flush the wallet in the toilet because this is essentially what you are doing until this malware
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar