Home Internet Mail Server Proxy Server Virus Windows Windows Server

Monday, November 07, 2011

Differences of Viruses, Worms, Trojan, Backdoor, Malware, Spyware

A computer virus is a computer program that can replicate or copy itself and spreads by inserting copies of itself into other programs or documents. Computer viruses can be analogous to a biological virus that spreads by inserting itself into living cells. Computer viruses can be destructive (for example by corrupting the data on the document), make computer users feel disturbed, and no effect at all.

Computer viruses generally can damage computers and software can not directly damage the computer hardware (especially on operating systems, such as the family of Windows-based operating systems (Windows 95, Windows 98/98SE, Windows NT, Windows NT Server, Windows 2000, Windows 2000 server, Windows 2003, Windows 2003 server, Windows 2008 server, Windows 7, Windows XP Home Edition, Windows XP Professional, Windows XP ServicePack 1, Windows XP ServicePack 2) even GNU / Linux. The negative effect is the propagation of computer viruses mainly to himself, which makes the resources on the computer (such as CPU time, memory usage) to be reduced significantly. Nearly 95% of virus is a virus-based computer operating system Windows. The remaining 2% attack GNU / Linux (and Unix, as the source of Linux), 1% attack Macs, especially Mac OS 9, Mac OS X (Tiger, Leopard). 2% longer attack other operating systems like FreeBSD, OS / 2 IBM, and Sun operating System.

Virus attacks can be prevented or overcome by using antivirus software. This type of software can also detect and remove computer viruses, computer virus database provided owned by antivirus software already contains the code to remove the virus.

Examples of the virus is a worm, Trojan, etc. Examples of reliable antivirus and counteract the virus is Kaspersky, AVG, AntiVir, PCMAV, Norton, Norman, and McAfee.

A worm is a type of virus that does not infect other programs. It made copies itself and infects other computers (usually using a network connection) but does not associate itself with other programs: but a worm can alter or destroy files and programs.

Trojan is a replica or duplicate of the virus. Trojan included as a virus because of the nature of unwanted programs and work by itself on a computer. The nature of the trojan is a control computer automatically. For instance in the cluster computer trojan email. Trojan included in Rats (remote access trojans) where a computer controlled by a particular program, and even some trojans enabled in order to open the computer can be entered by the computer and diaccess from afar.

Backdoor or "back door", the security of computer systems, refers to a mechanism that can be used to access the system, application, or network, apart from a common mechanism used (through the logon process or any other authentication process). Known also as the back door.

Backdoor was originally created by computer programmers as a mechanism that allows them to gain special access to their programs, often used to justify and improve the code in the program they made when a crash caused by a bug occurs. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmers to create a login process program in 1983 when acquiring Turing Award), in addition to the login program is commonly used in UNIX operating system using the C programming language, so that he can access UNIX systems that run on the internal network of Bell Labs.  He made ​​it to protect themselves from detection and disposal system, even if the user finds it, because it will make its own backdoor again (do recompiling itself).

Some software developers to add a backdoor into a home made program for the purpose of destruction (or the destination of suspicious). For example, a backdoor can be incorporated into the code at an online shopping site (e-commerce) to allow developers to get information about transactions that occur between buyers and sellers, including the credit card.

The term backdoor is now used by hackers to refer to a mechanism that allows a hacker can access the system back to a system that has previously attacked without having to repeat the process of exploitation of system or network, as it did the first time. Generally, after a network has been attacked by using the exploit (on an vulnerability / vulnerabilities), an attacker would cover all tracks in the system concerned with modifying the file system records (logs) or delete it, then install a backdoor in the form of a software or adds a special user account that has rights of access as the network administrator or system administrator. If then the owner of the network or system is aware that the system is attacked, and then close all known vulnerabilities in the system (but does not detect any installed backdoor), formerly a striker who will still be able to access the system in question, without getting caught by the owner of the network, let alone after enrolled as a legitimate user on the system or network. By having the right as a network administrator, can do things that can damage the system or remove data. In cases like the above, a commonly used way is to do a reinstallation of system or network, or by doing a restoration of a backup / backups are still clean from the backdoor.

There are some devices that can be used to install a backdoor, as well as some Trojan horse, but a popular one is Netcat, which can be used in Windows or UNIX operating systems.

'Malware' is a computer program that was created with the purpose and primary goal to find software vulnerabilities. Malware is generally created to break into or damage a software or operating system.
Examples of malware is a virus, worm, Wabbit, Keyloggers, Browser Hijacker, Trojan Horse, Spyware, Backdoors, Dialers, Exploits and rootkits.

Spyware is software that collects and sends information about the user's computer without being noticed by the user.
More information can be which is not too dangerous as the pattern of computing, especially the internet, to a dangerous person like credit card numbers, PINs for electronic banking (e-banking) and an account password.
Information about surfing patterns, has been mentioned, not too dangerous. Sites visited, information is often sought, chat in the chat room will be spied upon by the spyware.
Furthermore, the information is used to display ads that are usually in the form of pop-up window. The ad associated with a person's surfing habits. For example, often times a person seeking information about digital cameras. Pop-up window that appears will show, for example, sites that trade in digital cameras. Adware is a term for this spyware.
The spread of spyware similar to Trojan. For example, flashget. When used yet registered flashget, flashget act as spyware. Try it yourself connecting to the internet, run flashget is not yet registered, ignore the computer for a while, certainly the internet explorer window appears that displays advertising a site.
In anticipation of computer viruses that increasingly raged, make sure your computer is always protected with antivirus is up to date.


Post a Comment

Home Photography
Copyright © 2017 Xiu's Blog | All Rights Reserved.