malware.rst
changeset 1894 2e3bc2435d68
parent 1893 da0024f4f068
child 1895 91e537a35a34
--- a/malware.rst	Sat Feb 20 15:20:24 2016 +0200
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,83 +0,0 @@
--*- mode: outline; coding: utf-8 -*-
-
-* Classification.
-
-Malware (malicious software) is software designed to infiltrate a computer
-system without the owner's informed consent.
-
-** Virus.
-
-Program that has infected some executable software and that causes that
-software, when run, to spread the virus to other executable software.
-
-Viruses may also contain a payload that performs other actions, often
-malicious.
-
-** Worm.
-
-Worm is a program that actively transmits itself over a network to infect
-other computers.
-
-Worms may also contain a payload that performs other actions, often malicious.
-
-** Trojan horses.
-
-Trojan horse is any program that invites the user to run it, concealing a
-harmful or malicious payload.
-
-One of the most common ways that spyware is distributed is as a Trojan horse,
-bundled with a piece of desirable software that the user downloads from the
-Internet.
-
-** Rootkits.
-
-Rootkit is a program which modifying the host operating system so that the
-malware is hidden from the user.
-
-Rootkits can prevent a malicious process from being visible.
-
-** Backdoors.
-
-A backdoor is a method of bypassing normal authentication procedures. Once a
-system has been compromised, one or more backdoors may be installed in order
-to allow easier access in the future.
-
-** Spyware.
-
-Spyware is a type of malware that is installed on computers and collects
-information about users without their knowledge.
-
-The presence of spyware is typically hidden from the user.
-
-Sometimes, spywares such as keyloggers are installed by the owner of a shared,
-corporate or public computer on purpose in order to secretly monitor other
-users.
-
-** Adware.
-
-Adware or advertising-supported software is any software package which
-automatically plays, displays, or downloads advertisements to a computer after
-the software is installed on it or while the application is being used.
-
-** Botnets.
-
-
-
-** Keystroke loggers.
-
-Malware programs install a key logger, which intercepts the user's keystrokes
-when entering a password, credit card number, or other information that may be
-exploited. These are then transmitted to the malware creator.
-
-** Dialers.
-
-Electronic device that is connected to a telephone line to monitor the dialed
-numbers and alter them to seamlessly provide services that otherwise require
-lengthy access codes to be dialed.
-
-** Screen scrapers.
-
-
-
-** Phishing.
-