malware.rst
changeset 1905 fba288d59662
child 1912 8b81a8f0f692
equal deleted inserted replaced
1904:78357d58b7ab 1905:fba288d59662
       
     1 .. -*- coding: utf-8; -*-
       
     2 .. include:: HEADER.rst
       
     3 
       
     4 =========
       
     5  Malware
       
     6 =========
       
     7 .. contents::
       
     8    :local:
       
     9 
       
    10 About malware
       
    11 =============
       
    12 
       
    13 Malware (malicious software) is software designed to infiltrate a computer
       
    14 system without the owner's informed consent.
       
    15 
       
    16 Virus
       
    17 =====
       
    18 
       
    19 Program that has infected some executable software and that causes that
       
    20 software, when run, to spread the virus to other executable software.
       
    21 
       
    22 Viruses may also contain a payload that performs other actions, often
       
    23 malicious.
       
    24 
       
    25 Worm
       
    26 ====
       
    27 
       
    28 Worm is a program that actively transmits itself over a network to infect
       
    29 other computers.
       
    30 
       
    31 Worms may also contain a payload that performs other actions, often malicious.
       
    32 
       
    33 Trojan horses
       
    34 =============
       
    35 
       
    36 Trojan horse is any program that invites the user to run it, concealing a
       
    37 harmful or malicious payload.
       
    38 
       
    39 One of the most common ways that spyware is distributed is as a Trojan horse,
       
    40 bundled with a piece of desirable software that the user downloads from the
       
    41 Internet.
       
    42 
       
    43 Rootkits
       
    44 ========
       
    45 
       
    46 Rootkit is a program which modifying the host operating system so that the
       
    47 malware is hidden from the user.
       
    48 
       
    49 Rootkits can prevent a malicious process from being visible.
       
    50 
       
    51 Backdoors
       
    52 =========
       
    53 
       
    54 A backdoor is a method of bypassing normal authentication procedures. Once a
       
    55 system has been compromised, one or more backdoors may be installed in order
       
    56 to allow easier access in the future.
       
    57 
       
    58 Spyware
       
    59 =======
       
    60 
       
    61 Spyware is a type of malware that is installed on computers and collects
       
    62 information about users without their knowledge.
       
    63 
       
    64 The presence of spyware is typically hidden from the user.
       
    65 
       
    66 Sometimes, spywares such as keyloggers are installed by the owner of a shared,
       
    67 corporate or public computer on purpose in order to secretly monitor other
       
    68 users.
       
    69 
       
    70 Adware
       
    71 ======
       
    72 
       
    73 Adware or advertising-supported software is any software package which
       
    74 automatically plays, displays, or downloads advertisements to a computer after
       
    75 the software is installed on it or while the application is being used.
       
    76 
       
    77 Botnets
       
    78 =======
       
    79 
       
    80 
       
    81 Keystroke loggers
       
    82 =================
       
    83 
       
    84 Malware programs install a key logger, which intercepts the user's keystrokes
       
    85 when entering a password, credit card number, or other information that may be
       
    86 exploited. These are then transmitted to the malware creator.
       
    87 
       
    88 Dialers
       
    89 =======
       
    90 
       
    91 Electronic device that is connected to a telephone line to monitor the dialed
       
    92 numbers and alter them to seamlessly provide services that otherwise require
       
    93 lengthy access codes to be dialed.
       
    94 
       
    95 Screen scrapers
       
    96 ===============
       
    97 
       
    98 
       
    99 Phishing
       
   100 ========
       
   101