.. -*- coding: utf-8; -*-========= Malware=========.. contents:: :local:About malware=============Malware (malicious software) is software designed to infiltrate a computersystem without the owner's informed consent.Virus=====Program that has infected some executable software and that causes thatsoftware, when run, to spread the virus to other executable software.Viruses may also contain a payload that performs other actions, oftenmalicious.Worm====Worm is a program that actively transmits itself over a network to infectother computers.Worms may also contain a payload that performs other actions, often malicious.Trojan horses=============Trojan horse is any program that invites the user to run it, concealing aharmful or malicious payload.One of the most common ways that spyware is distributed is as a Trojan horse,bundled with a piece of desirable software that the user downloads from theInternet.Rootkits========Rootkit is a program which modifying the host operating system so that themalware is hidden from the user.Rootkits can prevent a malicious process from being visible.Backdoors=========A backdoor is a method of bypassing normal authentication procedures. Once asystem has been compromised, one or more backdoors may be installed in orderto allow easier access in the future.Spyware=======Spyware is a type of malware that is installed on computers and collectsinformation about users without their knowledge.The presence of spyware is typically hidden from the user.Sometimes, spywares such as keyloggers are installed by the owner of a shared,corporate or public computer on purpose in order to secretly monitor otherusers.Adware======Adware or advertising-supported software is any software package whichautomatically plays, displays, or downloads advertisements to a computer afterthe software is installed on it or while the application is being used.Botnets=======Keystroke loggers=================Malware programs install a key logger, which intercepts the user's keystrokeswhen entering a password, credit card number, or other information that may beexploited. These are then transmitted to the malware creator.Dialers=======Electronic device that is connected to a telephone line to monitor the dialednumbers and alter them to seamlessly provide services that otherwise requirelengthy access codes to be dialed.Screen scrapers===============Phishing========