About malware.
authorOleksandr Gavenko <gavenkoa@gmail.com>
Sat, 26 Dec 2009 14:19:42 +0200
changeset 264 0eb844b71dd1
parent 263 ea744c0473d5
child 265 f8bc3e208c16
About malware.
malware.rst
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/malware.rst	Sat Dec 26 14:19:42 2009 +0200
@@ -0,0 +1,83 @@
+-*- mode: outline; coding: utf-8 -*-
+
+* Classification.
+
+Malware (malicious software) is software designed to infiltrate a computer
+system without the owner's informed consent.
+
+** Virus.
+
+Program that has infected some executable software and that causes that
+software, when run, to spread the virus to other executable software.
+
+Viruses may also contain a payload that performs other actions, often
+malicious.
+
+** Worm.
+
+Worm is a program that actively transmits itself over a network to infect
+other computers.
+
+Worms may also contain a payload that performs other actions, often malicious.
+
+** Trojan horses.
+
+Trojan horse is any program that invites the user to run it, concealing a
+harmful or malicious payload.
+
+One of the most common ways that spyware is distributed is as a Trojan horse,
+bundled with a piece of desirable software that the user downloads from the
+Internet.
+
+** Rootkits.
+
+Rootkit is a program which modifying the host operating system so that the
+malware is hidden from the user.
+
+Rootkits can prevent a malicious process from being visible.
+
+** Backdoors.
+
+A backdoor is a method of bypassing normal authentication procedures. Once a
+system has been compromised, one or more backdoors may be installed in order
+to allow easier access in the future.
+
+** Spyware.
+
+Spyware is a type of malware that is installed on computers and collects
+information about users without their knowledge.
+
+The presence of spyware is typically hidden from the user.
+
+Sometimes, spywares such as keyloggers are installed by the owner of a shared,
+corporate or public computer on purpose in order to secretly monitor other
+users.
+
+** Adware.
+
+Adware or advertising-supported software is any software package which
+automatically plays, displays, or downloads advertisements to a computer after
+the software is installed on it or while the application is being used.
+
+** Botnets.
+
+
+
+** Keystroke loggers.
+
+Malware programs install a key logger, which intercepts the user's keystrokes
+when entering a password, credit card number, or other information that may be
+exploited. These are then transmitted to the malware creator.
+
+** Dialers.
+
+Electronic device that is connected to a telephone line to monitor the dialed
+numbers and alter them to seamlessly provide services that otherwise require
+lengthy access codes to be dialed.
+
+** Screen scrapers.
+
+
+
+** Phishing.
+