Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Differences Virus, Worm, Trojan, Backdoor, Malware and Spyware

Perhaps there are many of us who are still confused about the differences Virus , worm , trojan , backdoor , malware , and spyware . We often encounter anti virus we detect one of the examples above virus , the virus may be dangerous and should be in Delete , but not infrequently the file is not dangerous , so
do not be home in just Delete . php simple example source Program can be recognized as a trojan by Avira but it is not dangerous at all ..

Following his differences may be useful later :

virus

A Computer virus is a computer program that can duplicate or copy itself and spreads by inserting copies of itself into other programs or documents . Computer viruses can be analogous to a biological virus , which spreads by inserting itself into living cells. Computer viruses can damage ( eg by corrupting the data on the document ) , make computer users feel annoyed , or no effect at all .

Computer viruses generally can damage the computer and the software can not directly damage the computer hardware ( especially on the operating system , such as family -based Windows operating systems ( Windows 95 , Windows 98/98SE , Windows NT , Windows NT Server , Windows 2000 , Windows 2000 server , Windows 2003 , Windows 2003 server , Windows XP Home Edition , Windows XP Professional , Windows XP ServicePack 1 , Windows XP ServicePack 2 for Windows Vista and Win7 also baru2 it has penetrated even to GNU / Linux . negative effects especially computer virus is propagation itself, which makes computer resources ( such as CPU time , memory usage ) to be reduced significantly . Nearly 95% of computer virus is a virus -based Windows operating systems . remaining 2 % attack GNU / Linux ( and Unix , as a source of Linux , of course ) , 1 % attack Mac notably Mac OS 9 , Mac OS X ( Tiger , Leopard ) . 2 % again the other operating systems such as FreeBSD , OS / 2 IBM , and Sun operating System.

Virus attacks can be prevented or mitigated by using antivirus software . This type of software can also detect and remove computer viruses , computer viruses as long as the database is owned by antivirus software already contains code to remove the virus or in other words are up to date .

Some examples dependable antivirus and counteract the virus is Kaspersky, AVG , NOD32 , AntiVir , PCMAV , Norton , Norman , and McAfee and many more masig even local Antivirus was now starting to bloom SmadAV As discussed , Ansav etc , and most recently Artav .

worm

A worm is a type of virus that does not infect other programs .

He made ​​a copy of itself ( Cloning ) and infect other computers ( usually using a network connection ) but does not link him with other programs : but a worm may alter or destroy files and programs .

Trojan

Trojan virus is a replica or duplicate . Included as a trojan virus because of the nature of unwanted programs and work by itself on a computer . Nature is to control the computer trojan automatically. For example, the cluster computer trojan email . Trojan included in RATS ( remote administration tools ) where a computer controlled by certain programs , even some trojan functionalized open computer in order to be entered by computer and diaccess from afar , even some RAT 's latest 've reserve the function of a more complete them equipped function keylogger etc , even infected computers that can be ordered as an army to attack ( Read : Bot )

backdoor

Backdoor or " back door " , the security of computer systems , refer to a mechanism that can be used to access the system , application , or network , apart from a common mechanism used ( through the logon process or other authentication process ) . Also referred to as a back door .

Backdoor was originally created by computer programmers as a mechanism that allows them to gain special access to their programs , often used to justify and improve the code in the program that they created when a crash occurs due to a bug . One example of this statement is when Kenneth Thompson ( one of the UNIX operating system programmers create a login process program in 1983 when she received the Turing Award ) , in addition to the login program commonly used in the UNIX operating system using the C programming language , so that he can access the UNIX system running on the internal network of Bell Labs . Backdoor he made ​​it to protect themselves from detection and disposal of the system , even if the user finds it, because it will make its own backdoor back ( do recompiling itself ) .

Some software developers to add a backdoor into a homemade program for destructive purposes ( or goals suspicious ) . For example , a backdoor can be inserted into the code at an online shopping site ( e - commerce ) to allow developers to get information about transactions between buyers and sellers , including being a credit card , in this case is usually inserted into the shell shell code so that owners can freely get any info about the host :)

The term backdoor is now used by hackers to refer to a mechanism that allows a hacker to access the system back a system that has previously attacked without having to repeat the process of exploitation of system or network , as he did the first time . Generally , after a network has been attacked by using the exploit ( against an insecurity / vulnerability ) , an attacker will cover all the tracks in the system is concerned with modifying the file system records ( logs ) or delete it , and then install a backdoor ( Shell code) the form of a special software or add a user account that has administrator privileges as a network or system administrator . If then the owner of the network or system is aware that the system is attacked , and then close all known vulnerabilities in the system ( but did not detect any installed backdoor ) , a striker who will still be able to access the system in question , without being spotted by the owner of the network , especially after he enrolled as a legitimate user on the system or network . By having the right as a network administrator , he can do things that can damage or eliminate system data. In cases like the above , a commonly used way is to reinstall the system or network , or to the restoration of backup / backups still clean from the backdoor .

There are several tools that can be used to install a backdoor , as well as some Trojan horse , but the popular ones are Netcat ( the old school era ) , which can be used in a Windows or UNIX operating systems . Now the function has been replaced by a Rat's latest as cybergate , poison ivy prorat etc. .. ( backdoor and trojan complementary )

malware

Malware is a computer program that was created with the purpose and primary objective for software vulnerabilities . Malware generally created to break or damage the software or operating system .

Examples of malware is Virus , Worm , Wabbit , Keyloggers , Browser Hijacker , Trojan Horse , Spyware , Backdoor , Dialer , Exploit and rootkits .

spyware

Spyware is software that collects and sends information about a computer user without the user knows it .

More information can be which is not too dangerous as computing patterns , especially the internet , until a dangerous person like credit card numbers , PIN for electronic banking ( e - banking ) and an account password .

Information about the surf pattern , already mentioned , is not too dangerous . Sites visited , information that is often sought , chat in the chat room will be spied upon by the spyware .

Furthermore , the information used to display ads which are usually in the form of pop - up window . The advertising associated with a person's surfing habits . For example, often times someone searches for information about digital camera . Pop - up window that appears will show , for example, sites that sell digital cameras . Adware is a term for spyware that way.

Similar to the spread of spyware Trojan . For example , flashget . When used yet registered flashget , flashget act as spyware . Just try to connect themselves to the Internet , run flashget who have not registered , ignore the computer for a while, definitely internet explorer window appears that displays advertising a website .

For more safety , we recommend that you use Anti- virus updated regularly , so that Anti- virus database you can balance the development of the latest viruses are dangerous .

Use only an anti virus to avoid conflicts and memory usage for large scale pC added slow you have , in addition to get used to enable the Anti- virus Firewall .

www.psikopatettu.blogspot.com




This post first appeared on Applications Maneger, please read the originial post: here

Share the post

Differences Virus, Worm, Trojan, Backdoor, Malware and Spyware

×

Subscribe to Applications Maneger

Get updates delivered right to your inbox!

Thank you for your subscription

×