Malware Definitions

Malware definitions Malware refers to a collection of different types of software that share the goal of infiltrating a computer and making it do something, it is called Malicious software. This software are most of the time installed with the end users full consent.

There are two types of malware:

1. Programs that spread or infect

2. Programs that hide.

1.1 Programs that spread the goal is infect other computer:

* Viruses

* Worms

2.1 Malware that hides carry out instructions while hiding:

* Trojan Horses

* Rootkits

*Spyware

VIRUS

This program attaches itself to, or copies itself into another program. it causes the computer to follow instruction not unintended by the original program developer.This program replicates itself to other computer. Today there are thousands of viruses going around besides the common flu.

Known Viruses:

* The creeper

* The reaper

WORM

A worm is a type of Malware that is self-contained. this program replicates to other computer, generally across a network. The purpose of this program is use up the network's bandwidth.

The difference between a worm and a virus is that the worm does not need a host to infect.

This worm is known for infecting computer to the crawl. It exploits buffer overflow vulnerability. a Buffer overflow is a condition in which a running program stores data in an area outside the memory location set aside for the data, by sorting more data than the actual program expects.

Known Worms:

* Morris        * Melissa       *The love Bug      *Code Red      *SQL slammer     *Sasser and Conficker

Trojan Horse

This malware that either hides or masquerades as a useful or benign program The name derives from the story of the Torjan horse. The Trojan house programs use their outward appearance to trick users into running them. They are disguised as programs that perform useful tasks. but actually hide malicious code. Once the program is running. The attack instructions execute with the user's permissions and authority.

Trojan copy themselves and nest themselves into every directory "folders" the user touches or writes access, they open backdoors into a computer or actively upload and download files without the users consent.

Know Trojans:

* Animal

Rootkit

Is a malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised. It is common for rootkits to modify part of the OS and kernel. Once a rootkit has been placed the hacker may have access to your files.

Spyware

Spyware is software that covertly collects information without the user's knowledge or permission. The information collected can be sensitive personal information,such as password or credit card number. SPYWARE IS COMMONLY USED BY AGGRESSIVE MARKETS TO COLLECT SPECIFIC INFORMATION ABOUT CUSTOMERS AND THEIR PREFERENCES.

Spyware programs piggyback onto other legitimate programs. They are installed along with the intended program. Although the primary purpose of most spyware is to collect and report on information.

Summary

photo

Protect your Computer from Malware

These are some of the best practices to keep a computer Malware Free:

  • Frequent media scans
  • Multiple anti-malware software shields
  • Frequent signature database updates
  • Restrictive software installation policy
  • Restrictive download policy
  • Restrictive removal policy
  • Limited Web browser fuctionality
  • Not running in Administrator mode unless necessary
  • Enable all -real time scanning
  • Update signature databases and software daily
  • Complete scan weekly
  • Perform direct scan if any software has been downloaded
  • Enable tboot time virus checking, including boot sector and memory scan at startup
  • Remove administrator rights from all normal users
  • apply software and operating system security patches
  • Educate users
  • Block outbound network connections that are not required for your appications
  • Establish incident response capabilities
  • Backup your files

END USER should download the latest Antivirus and malware. Nowadays new Antivirus such as Norton 360 comes complete with a full suit of Antivirus removal as well as Spyware.

  • Bitdefender
  • Kapersky Antivirus
  • Trend Micro
  • Norton Antivirus Software
  • Panda Antivirus
  • McAfee
  • Avast Antivirus
  • Avg Anti-Virus
  • Avira Antivir

Malware uses some type of signature that is each instance of malware has a unique set of instructions. Antivirus software uses the signature database for signature matches when scanning processes or files, any detected infected file will prompted as flag and if possible removal.


Comments

So empty here ... leave a comment!

Leave a Reply

Sidebar



s2Member®