# HG changeset patch # User Oleksandr Gavenko # Date 1261829982 -7200 # Node ID 0eb844b71dd1f674418480272cbf27532f0934c9 # Parent ea744c0473d5871a601770ea86278d99cd4abf86 About malware. diff -r ea744c0473d5 -r 0eb844b71dd1 malware.rst --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/malware.rst Sat Dec 26 14:19:42 2009 +0200 @@ -0,0 +1,83 @@ +-*- mode: outline; coding: utf-8 -*- + +* Classification. + +Malware (malicious software) is software designed to infiltrate a computer +system without the owner's informed consent. + +** Virus. + +Program that has infected some executable software and that causes that +software, when run, to spread the virus to other executable software. + +Viruses may also contain a payload that performs other actions, often +malicious. + +** Worm. + +Worm is a program that actively transmits itself over a network to infect +other computers. + +Worms may also contain a payload that performs other actions, often malicious. + +** Trojan horses. + +Trojan horse is any program that invites the user to run it, concealing a +harmful or malicious payload. + +One of the most common ways that spyware is distributed is as a Trojan horse, +bundled with a piece of desirable software that the user downloads from the +Internet. + +** Rootkits. + +Rootkit is a program which modifying the host operating system so that the +malware is hidden from the user. + +Rootkits can prevent a malicious process from being visible. + +** Backdoors. + +A backdoor is a method of bypassing normal authentication procedures. Once a +system has been compromised, one or more backdoors may be installed in order +to allow easier access in the future. + +** Spyware. + +Spyware is a type of malware that is installed on computers and collects +information about users without their knowledge. + +The presence of spyware is typically hidden from the user. + +Sometimes, spywares such as keyloggers are installed by the owner of a shared, +corporate or public computer on purpose in order to secretly monitor other +users. + +** Adware. + +Adware or advertising-supported software is any software package which +automatically plays, displays, or downloads advertisements to a computer after +the software is installed on it or while the application is being used. + +** Botnets. + + + +** Keystroke loggers. + +Malware programs install a key logger, which intercepts the user's keystrokes +when entering a password, credit card number, or other information that may be +exploited. These are then transmitted to the malware creator. + +** Dialers. + +Electronic device that is connected to a telephone line to monitor the dialed +numbers and alter them to seamlessly provide services that otherwise require +lengthy access codes to be dialed. + +** Screen scrapers. + + + +** Phishing. +