Latest Movie :

Identify the most viruses and malware

Identify the most viruses and malware


 

With the rapid pace of technological development unit every day I said threats to the safety of the computer due to viruses or worms in its traditional form, where often depends hackers and Internet malicious software (Malware) for access to the funds used directly or indirectly.

 

To protect against such attacks, experts advise should install anti-virus software, as well as to update the operating system and all other programs on a regular basis. However, the software update is part of a larger strategy to protect against cyber threats, so the user must understand how the software works, worms, and experts provide the following overview of this malware.

 

Virus: traditional orientation virus takes aim to programs or executable files, these viruses can be changed as it continues to spread more widely. And often use viruses as a generic term for all types of malicious codes. Says Christian Funk, an anti-virus expert at Kaspersky, said: "There is no longer virtually non-existent conventional interferon."

 

And captures Roland Aakenberg, magazine «c't» specializing in computer, talk and party demonstrates that the virus is no longer exciting to the concerns of the pirates, and therefore no longer have any role now, and says: "Other models emerged from malicious programs more profitable."

 

Worms: Unlike viruses spread worms without infect files or operating systems, but it can be changed. And spread worms through networks or e-mail messages, so advises Julia Haob, of the Federal Office for Safety of Information Technology in Bonn, west Germany, saying: "It is better to use ordinary text messages when using e-mail programs, even preview documents could allow hackers possibility of exploitation weaknesses and vulnerabilities in the office software package installed on the computer. "

 

Trojans: hiding Trojans or programs Trojan (Trojan) traditional manner as useful tools, but was used to damage, whether directly or indirectly, through the installation of other malicious software secretly, such as program KEYLOGGER, who spied on the operations of the pressure on the plate keys.

 

The German expert Julia Haob: "spread Trojan programs for malicious websites and e-mail attachments and downloading files and links in e-mail messages." And able Trojan programs or tools to help penetrate the login data bank accounts on the Internet or storage services on the World Wide Web or other sensitive information.

 

Rear doors and rootkits: rear doors (BACKDOORS) is a program that allows hackers to penetrate computers, but it allows them to often remote control, as well as it helps to spread the Trojan programs.

 

She Julia Haob: "the use of this type of malicious software specifically, and spread on a global scale," the rootkit (ROOTKITS) are for programs disguised malicious codes, so as not to be discovered by means of combating viruses.

Programs horror SCAREWARE: This software works to promote a climate of terror and panic in the hearts of the users, and therefore to withdraw money from them. These malicious programs, for example, show an imaginary danger and communications or false warnings. Says Julia Haob: "Fraudsters often use graphics or similar names to real anti-virus software or operating system components, so they show more trustworthy."

 

In addition to that there is an abuse corporate logos and renowned institutions, so the warnings appear to be credible. If the user has to pay the money, Vtakhtfa these warnings in some cases. There are horror programs more dangerous; explains Christian Funk, saying: "you might like these programs to copy malicious codes on the computer, the user is therefore vulnerable to damage in one way or another."

 

Programs ransom RANSOMWARE: These programs are a kind of horror programs, where the user is exposed to blackmail by the developers of these programs and have to pay the ransom. The data are often stored on your computer are betting in this case, where the user is prevented from access or disable the operating system or even data encryption. And computer experts stresses the need for non-payment of ransom in such cases; because it may remain the operating system is disabled, even in the case of payment.

To clean your computer from such malicious programs and access to the data again, the user must attempt to start the device through the CD to boot or rescue your computer. And usually such cylinders attached with PC magazines and the Internet, or the user can that downloads the contents of the Internet and copied himself on the CD. German expert explains Roland Aakenberg that this attempt may succeed, but not on a permanent basis.

Spyware SPYWARE: These programs spying on the user and on his actions and behavior on the Internet, for example, you send data unauthorized to companies or Internet servers, and through it are shown ads are directed by concerns the user, and often these ads for products or services of dubious quality.

The Christian Funk: "spyware violate user privacy too much", where spyware is installed on the computer with the usual programs without the user's Note.

Share this article :

Post a Comment

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. News New technology - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger