Sunday, May 29, 2011

Viruses and her friend are classified in the category of malware

Viruses have friends - friends who are also dangerous. However, different ways to attack him. Viruses and her friend are classified in the category of malware or stands for Malicious Software. Malware is a program or application is made ​​for the purpose of modifying, damaging, and stolen data to others. This is the type - the type of malware that can disrupt a computer system other than a virus:

Worm
Worm or in the Indonesian language is called the cacing. As the nature of the cacing, the worm can spread to multiple computers through a particular port. The worm also has the nature of the virus is multiplying. Usually the worm made ​​to destroy a particular computer system that has become a target from a distance (remote).

Trojan
Originally a term in the Trojan war. Where the trojan is a tool for inclusion in a way to trick the enemy area. Once entered, the tool is changed to destroy the enemy from within.
Programmer inspired to create a program that is destroyed and can fool the target. As with viruses, Trojans also have the ability to replicate like a virus. In addition, the trojan also can control a particular program and can fool the system with an application like usual.
If your computer is infected with Trojan and have been controlled by the attacker, there are several possibilities that could happen. Here is an example of events if the computer has been infected by a Trojan by the name of NetBus:

  1. Deleting Files.
  2. Send and retrieve files.
  3. Running the program - a program application.
  4. Display the image.
  5. Peering programs that are running.
  6. Closing programs that are running.
  7. Open and close the CD-ROM drive.
  8. Send messages and invites to talk (chat).
  9. Turn off the computer.
Backdoor
Backdoor is a type of malware that attack computer systems by providing access rights so that other users can run the target computer.
Based on the way to work and spreading behavior, backdoor can be divided into 2 groups.
The first group is similar to a Trojan. They were manually inserted into a program on the software and then when the software was installed, they spread. Backdoor in this group is run as part of the boot process. Ratware is the name for a backdoor that turns computers into zombies that send spam.
Another backdoor can disrupt network traffic, perform brute force to crack passwords and encryption, and distributed attacks mendisitribusikan enial of service (DDoS).

Spyware
This type of malware is a program created for the purpose as the eye - the eye. This has meant that the program will collect and send information about the user's computer without being noticed by the user. More information can be just that not too dangerous as the pattern of computing, especially the internet, someone, until the dangerous like credit card numbers, PIN for electronic banking (e-banking), and an account password.

Hijacker
Hijacker said in the Indonesian language means the pembajak. Malware is so named because it has properties similar to the pembajak. This program will hijack any other program on a computer system such as Internet Explorer. Internet Explorer will add functionality and redirected to a malicious site access.

Wabbit
Wabbit have similar properties with a worm which does not require a program and document for nesting. But unlike a worm that spread itself to other computers using the network, wabbit replicate continuously in a local computer and copies it would undermine sistem.Kinerja computer slows down because wabbit ate quite a lot of resources. In addition to the computer's performance slows because of the use of those resources, can be programmed to wabbit
have side effects that the effect is similar to other malware. Malware combinations like these that can be very dangerous.

Keylogger
Malware is created with the purpose to record all keystrokes on the keyboard. Notes are stored in a file that can be seen then that complete. In it there can be information such as an application where the keystrokes made ​​and time presses. In this way, one can know the username, password, and other information entered by way of typing. Keylogger is quite dangerous because anything as sophisticated encryption applied by a website, the password can still be retrieved. Because, the password is encrypted before it is taken by the system.
Keyloggers record shortly after the password typed in and not yet processed by the system.

Dialer
Is malware that can mengoneksikan computer connected to the internet to specific sites that harm the victim. This malware will attack the user's computer by using diul up the phone. Dialers can also change the number of regular Internet service providers contacted by a number of other Internet service providers are usually long-distance number, often overseas number. As a result, a phone bill jumped immeasurably.

0 komentar:

Post a Comment

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites