malware.rst
changeset 264 0eb844b71dd1
equal deleted inserted replaced
263:ea744c0473d5 264:0eb844b71dd1
       
     1 -*- mode: outline; coding: utf-8 -*-
       
     2 
       
     3 * Classification.
       
     4 
       
     5 Malware (malicious software) is software designed to infiltrate a computer
       
     6 system without the owner's informed consent.
       
     7 
       
     8 ** Virus.
       
     9 
       
    10 Program that has infected some executable software and that causes that
       
    11 software, when run, to spread the virus to other executable software.
       
    12 
       
    13 Viruses may also contain a payload that performs other actions, often
       
    14 malicious.
       
    15 
       
    16 ** Worm.
       
    17 
       
    18 Worm is a program that actively transmits itself over a network to infect
       
    19 other computers.
       
    20 
       
    21 Worms may also contain a payload that performs other actions, often malicious.
       
    22 
       
    23 ** Trojan horses.
       
    24 
       
    25 Trojan horse is any program that invites the user to run it, concealing a
       
    26 harmful or malicious payload.
       
    27 
       
    28 One of the most common ways that spyware is distributed is as a Trojan horse,
       
    29 bundled with a piece of desirable software that the user downloads from the
       
    30 Internet.
       
    31 
       
    32 ** Rootkits.
       
    33 
       
    34 Rootkit is a program which modifying the host operating system so that the
       
    35 malware is hidden from the user.
       
    36 
       
    37 Rootkits can prevent a malicious process from being visible.
       
    38 
       
    39 ** Backdoors.
       
    40 
       
    41 A backdoor is a method of bypassing normal authentication procedures. Once a
       
    42 system has been compromised, one or more backdoors may be installed in order
       
    43 to allow easier access in the future.
       
    44 
       
    45 ** Spyware.
       
    46 
       
    47 Spyware is a type of malware that is installed on computers and collects
       
    48 information about users without their knowledge.
       
    49 
       
    50 The presence of spyware is typically hidden from the user.
       
    51 
       
    52 Sometimes, spywares such as keyloggers are installed by the owner of a shared,
       
    53 corporate or public computer on purpose in order to secretly monitor other
       
    54 users.
       
    55 
       
    56 ** Adware.
       
    57 
       
    58 Adware or advertising-supported software is any software package which
       
    59 automatically plays, displays, or downloads advertisements to a computer after
       
    60 the software is installed on it or while the application is being used.
       
    61 
       
    62 ** Botnets.
       
    63 
       
    64 
       
    65 
       
    66 ** Keystroke loggers.
       
    67 
       
    68 Malware programs install a key logger, which intercepts the user's keystrokes
       
    69 when entering a password, credit card number, or other information that may be
       
    70 exploited. These are then transmitted to the malware creator.
       
    71 
       
    72 ** Dialers.
       
    73 
       
    74 Electronic device that is connected to a telephone line to monitor the dialed
       
    75 numbers and alter them to seamlessly provide services that otherwise require
       
    76 lengthy access codes to be dialed.
       
    77 
       
    78 ** Screen scrapers.
       
    79 
       
    80 
       
    81 
       
    82 ** Phishing.
       
    83