|
1 .. -*- coding: utf-8; -*- |
|
2 .. include:: HEADER.rst |
|
3 |
|
4 ========= |
|
5 Malware |
|
6 ========= |
|
7 .. contents:: |
|
8 :local: |
|
9 |
|
10 About malware |
|
11 ============= |
|
12 |
|
13 Malware (malicious software) is software designed to infiltrate a computer |
|
14 system without the owner's informed consent. |
|
15 |
|
16 Virus |
|
17 ===== |
|
18 |
|
19 Program that has infected some executable software and that causes that |
|
20 software, when run, to spread the virus to other executable software. |
|
21 |
|
22 Viruses may also contain a payload that performs other actions, often |
|
23 malicious. |
|
24 |
|
25 Worm |
|
26 ==== |
|
27 |
|
28 Worm is a program that actively transmits itself over a network to infect |
|
29 other computers. |
|
30 |
|
31 Worms may also contain a payload that performs other actions, often malicious. |
|
32 |
|
33 Trojan horses |
|
34 ============= |
|
35 |
|
36 Trojan horse is any program that invites the user to run it, concealing a |
|
37 harmful or malicious payload. |
|
38 |
|
39 One of the most common ways that spyware is distributed is as a Trojan horse, |
|
40 bundled with a piece of desirable software that the user downloads from the |
|
41 Internet. |
|
42 |
|
43 Rootkits |
|
44 ======== |
|
45 |
|
46 Rootkit is a program which modifying the host operating system so that the |
|
47 malware is hidden from the user. |
|
48 |
|
49 Rootkits can prevent a malicious process from being visible. |
|
50 |
|
51 Backdoors |
|
52 ========= |
|
53 |
|
54 A backdoor is a method of bypassing normal authentication procedures. Once a |
|
55 system has been compromised, one or more backdoors may be installed in order |
|
56 to allow easier access in the future. |
|
57 |
|
58 Spyware |
|
59 ======= |
|
60 |
|
61 Spyware is a type of malware that is installed on computers and collects |
|
62 information about users without their knowledge. |
|
63 |
|
64 The presence of spyware is typically hidden from the user. |
|
65 |
|
66 Sometimes, spywares such as keyloggers are installed by the owner of a shared, |
|
67 corporate or public computer on purpose in order to secretly monitor other |
|
68 users. |
|
69 |
|
70 Adware |
|
71 ====== |
|
72 |
|
73 Adware or advertising-supported software is any software package which |
|
74 automatically plays, displays, or downloads advertisements to a computer after |
|
75 the software is installed on it or while the application is being used. |
|
76 |
|
77 Botnets |
|
78 ======= |
|
79 |
|
80 |
|
81 Keystroke loggers |
|
82 ================= |
|
83 |
|
84 Malware programs install a key logger, which intercepts the user's keystrokes |
|
85 when entering a password, credit card number, or other information that may be |
|
86 exploited. These are then transmitted to the malware creator. |
|
87 |
|
88 Dialers |
|
89 ======= |
|
90 |
|
91 Electronic device that is connected to a telephone line to monitor the dialed |
|
92 numbers and alter them to seamlessly provide services that otherwise require |
|
93 lengthy access codes to be dialed. |
|
94 |
|
95 Screen scrapers |
|
96 =============== |
|
97 |
|
98 |
|
99 Phishing |
|
100 ======== |
|
101 |