Selasa, 10 September 2013

Differences Virus, Worm, Trojan, Backdoor, Malware and Spyware

Perhaps there are many of us who are still confused about the differences virus , worm , trojan , backdoor , malware , and spyware . We often encounter anti virus we detect one of the examples above virus , the virus may be dangerous and should be in Delete , but not infrequently the file is not dangerous , so
do not be home in just Delete . php simple example source program can be recognized as a trojan by Avira but it is not dangerous at all ..

Following his differences may be useful later :

virus

A computer virus is a computer program that can duplicate or copy itself and spreads by inserting copies of itself into other programs or documents . Computer viruses can be analogous to a biological virus , which spreads by inserting itself into living cells. Computer viruses can damage ( eg by corrupting the data on the document ) , make computer users feel annoyed , or no effect at all .

Computer viruses generally can damage the computer and the software can not directly damage the computer hardware ( especially on the operating system , such as family -based Windows operating systems ( Windows 95 , Windows 98/98SE , Windows NT , Windows NT Server , Windows 2000 , Windows 2000 server , Windows 2003 , Windows 2003 server , Windows XP Home Edition , Windows XP Professional , Windows XP ServicePack 1 , Windows XP ServicePack 2 for Windows Vista and Win7 also baru2 it has penetrated even to GNU / Linux . negative effects especially computer virus is propagation itself, which makes computer resources ( such as CPU time , memory usage ) to be reduced significantly . Nearly 95% of computer virus is a virus -based Windows operating systems . remaining 2 % attack GNU / Linux ( and Unix , as a source of Linux , of course ) , 1 % attack Mac notably Mac OS 9 , Mac OS X ( Tiger , Leopard ) . 2 % again the other operating systems such as FreeBSD , OS / 2 IBM , and Sun operating System.

Virus attacks can be prevented or mitigated by using antivirus software . This type of software can also detect and remove computer viruses , computer viruses as long as the database is owned by antivirus software already contains code to remove the virus or in other words are up to date .

Some examples dependable antivirus and counteract the virus is Kaspersky, AVG , NOD32 , AntiVir , PCMAV , Norton , Norman , and McAfee and many more masig even local Antivirus was now starting to bloom SmadAV As discussed , Ansav etc , and most recently Artav .

worm

A worm is a type of virus that does not infect other programs .

He made ​​a copy of itself ( Cloning ) and infect other computers ( usually using a network connection ) but does not link him with other programs : but a worm may alter or destroy files and programs .

Trojan

Trojan virus is a replica or duplicate . Included as a trojan virus because of the nature of unwanted programs and work by itself on a computer . Nature is to control the computer trojan automatically. For example, the cluster computer trojan email . Trojan included in RATS ( remote administration tools ) where a computer controlled by certain programs , even some trojan functionalized open computer in order to be entered by computer and diaccess from afar , even some RAT 's latest 've reserve the function of a more complete them equipped function keylogger etc , even infected computers that can be ordered as an army to attack ( Read : Bot )

backdoor

Backdoor or " back door " , the security of computer systems , refer to a mechanism that can be used to access the system , application , or network , apart from a common mechanism used ( through the logon process or other authentication process ) . Also referred to as a back door .

Backdoor was originally created by computer programmers as a mechanism that allows them to gain special access to their programs , often used to justify and improve the code in the program that they created when a crash occurs due to a bug . One example of this statement is when Kenneth Thompson ( one of the UNIX operating system programmers create a login process program in 1983 when she received the Turing Award ) , in addition to the login program commonly used in the UNIX operating system using the C programming language , so that he can access the UNIX system running on the internal network of Bell Labs . Backdoor he made ​​it to protect themselves from detection and disposal of the system , even if the user finds it, because it will make its own backdoor back ( do recompiling itself ) .

Some software developers to add a backdoor into a homemade program for destructive purposes ( or goals suspicious ) . For example , a backdoor can be inserted into the code at an online shopping site ( e - commerce ) to allow developers to get information about transactions between buyers and sellers , including being a credit card , in this case is usually inserted into the shell shell code so that owners can freely get any info about the host :)

The term backdoor is now used by hackers to refer to a mechanism that allows a hacker to access the system back a system that has previously attacked without having to repeat the process of exploitation of system or network , as he did the first time . Generally , after a network has been attacked by using the exploit ( against an insecurity / vulnerability ) , an attacker will cover all the tracks in the system is concerned with modifying the file system records ( logs ) or delete it , and then install a backdoor ( Shell code) the form of a special software or add a user account that has administrator privileges as a network or system administrator . If then the owner of the network or system is aware that the system is attacked , and then close all known vulnerabilities in the system ( but did not detect any installed backdoor ) , a striker who will still be able to access the system in question , without being spotted by the owner of the network , especially after he enrolled as a legitimate user on the system or network . By having the right as a network administrator , he can do things that can damage or eliminate system data. In cases like the above , a commonly used way is to reinstall the system or network , or to the restoration of backup / backups still clean from the backdoor .

There are several tools that can be used to install a backdoor , as well as some Trojan horse , but the popular ones are Netcat ( the old school era ) , which can be used in a Windows or UNIX operating systems . Now the function has been replaced by a Rat's latest as cybergate , poison ivy prorat etc. .. ( backdoor and trojan complementary )

malware

Malware is a computer program that was created with the purpose and primary objective for software vulnerabilities . Malware generally created to break or damage the software or operating system .

Examples of malware is Virus , Worm , Wabbit , Keyloggers , Browser Hijacker , Trojan Horse , Spyware , Backdoor , Dialer , Exploit and rootkits .

spyware

Spyware is software that collects and sends information about a computer user without the user knows it .

More information can be which is not too dangerous as computing patterns , especially the internet , until a dangerous person like credit card numbers , PIN for electronic banking ( e - banking ) and an account password .

Information about the surf pattern , already mentioned , is not too dangerous . Sites visited , information that is often sought , chat in the chat room will be spied upon by the spyware .

Furthermore , the information used to display ads which are usually in the form of pop - up window . The advertising associated with a person's surfing habits . For example, often times someone searches for information about digital camera . Pop - up window that appears will show , for example, sites that sell digital cameras . Adware is a term for spyware that way.

Similar to the spread of spyware Trojan . For example , flashget . When used yet registered flashget , flashget act as spyware . Just try to connect themselves to the Internet , run flashget who have not registered , ignore the computer for a while, definitely internet explorer window appears that displays advertising a website .

For more safety , we recommend that you use Anti- virus updated regularly , so that Anti- virus database you can balance the development of the latest viruses are dangerous .

Use only an anti virus to avoid conflicts and memory usage for large scale pC added slow you have , in addition to get used to enable the Anti- virus Firewall .



Post By : Ettu Kuttu App-Manager From Me To You

Artikel Differences Virus, Worm, Trojan, Backdoor, Malware and Spyware post by Ettu Kuttu on day Selasa, 10 September 2013. Thank you for your visit and your willingness to read this article. Criticisms and suggestions can you convey through the comment box.

facebook

0 komentar:

Posting Komentar

I am a blogger from Indonesia, my respectful greetings for my friends who have visited us.