Malware definitions Malware refers to a collection of different types of software that share the goal of infiltrating a computer and making it do something, it is called Malicious software. This software are most of the time installed with the end users full consent.
There are two types of malware:
1. Programs that spread or infect
2. Programs that hide.
1.1 Programs that spread the goal is infect other computer:
2.1 Malware that hides carry out instructions while hiding:
* Trojan Horses
This program attaches itself to, or copies itself into another program. it causes the computer to follow instruction not unintended by the original program developer.This program replicates itself to other computer. Today there are thousands of viruses going around besides the common flu.
* The creeper
* The reaper
A worm is a type of Malware that is self-contained. this program replicates to other computer, generally across a network. The purpose of this program is use up the network's bandwidth.
The difference between a worm and a virus is that the worm does not need a host to infect.
This worm is known for infecting computer to the crawl. It exploits buffer overflow vulnerability. a Buffer overflow is a condition in which a running program stores data in an area outside the memory location set aside for the data, by sorting more data than the actual program expects.
* Morris * Melissa *The love Bug *Code Red *SQL slammer *Sasser and Conficker
This malware that either hides or masquerades as a useful or benign program The name derives from the story of the Torjan horse. The Trojan house programs use their outward appearance to trick users into running them. They are disguised as programs that perform useful tasks. but actually hide malicious code. Once the program is running. The attack instructions execute with the user's permissions and authority.
Trojan copy themselves and nest themselves into every directory "folders" the user touches or writes access, they open backdoors into a computer or actively upload and download files without the users consent.
Is a malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised. It is common for rootkits to modify part of the OS and kernel. Once a rootkit has been placed the hacker may have access to your files.
Spyware is software that covertly collects information without the user's knowledge or permission. The information collected can be sensitive personal information,such as password or credit card number. SPYWARE IS COMMONLY USED BY AGGRESSIVE MARKETS TO COLLECT SPECIFIC INFORMATION ABOUT CUSTOMERS AND THEIR PREFERENCES.
Spyware programs piggyback onto other legitimate programs. They are installed along with the intended program. Although the primary purpose of most spyware is to collect and report on information.
Protect your Computer from Malware
These are some of the best practices to keep a computer Malware Free:
- Frequent media scans
- Multiple anti-malware software shields
- Frequent signature database updates
- Restrictive software installation policy
- Restrictive download policy
- Restrictive removal policy
- Limited Web browser fuctionality
- Not running in Administrator mode unless necessary
- Enable all -real time scanning
- Update signature databases and software daily
- Complete scan weekly
- Perform direct scan if any software has been downloaded
- Enable tboot time virus checking, including boot sector and memory scan at startup
- Remove administrator rights from all normal users
- apply software and operating system security patches
- Educate users
- Block outbound network connections that are not required for your appications
- Establish incident response capabilities
- Backup your files
END USER should download the latest Antivirus and malware. Nowadays new Antivirus such as Norton 360 comes complete with a full suit of Antivirus removal as well as Spyware.
- Kapersky Antivirus
- Trend Micro
- Norton Antivirus Software
- Panda Antivirus
- Avast Antivirus
- Avg Anti-Virus
- Avira Antivir
Malware uses some type of signature that is each instance of malware has a unique set of instructions. Antivirus software uses the signature database for signature matches when scanning processes or files, any detected infected file will prompted as flag and if possible removal.