skip to main |
skip to sidebar
Identify the most viruses and malware
With
the rapid pace of technological development unit every day I said
threats to the safety of the computer due to viruses or worms in its
traditional form, where often depends hackers and Internet malicious
software (Malware) for access to the funds used directly or indirectly.
To
protect against such attacks, experts advise should install anti-virus
software, as well as to update the operating system and all other
programs on a regular basis. However,
the software update is part of a larger strategy to protect against
cyber threats, so the user must understand how the software works,
worms, and experts provide the following overview of this malware.
Virus:
traditional orientation virus takes aim to programs or executable
files, these viruses can be changed as it continues to spread more
widely. And often use viruses as a generic term for all types of malicious codes. Says
Christian Funk, an anti-virus expert at Kaspersky, said: "There is no
longer virtually non-existent conventional interferon."
And
captures Roland Aakenberg, magazine «c't» specializing in computer,
talk and party demonstrates that the virus is no longer exciting to the
concerns of the pirates, and therefore no longer have any role now, and
says: "Other models emerged from malicious programs more profitable."
Worms: Unlike viruses spread worms without infect files or operating systems, but it can be changed. And
spread worms through networks or e-mail messages, so advises Julia
Haob, of the Federal Office for Safety of Information Technology in
Bonn, west Germany, saying: "It is better to use ordinary text messages
when using e-mail programs, even preview documents could allow hackers
possibility of exploitation weaknesses and vulnerabilities in the office software package installed on the computer. "
Trojans:
hiding Trojans or programs Trojan (Trojan) traditional manner as useful
tools, but was used to damage, whether directly or indirectly, through
the installation of other malicious software secretly, such as program
KEYLOGGER, who spied on the operations of the pressure on the plate keys.
The
German expert Julia Haob: "spread Trojan programs for malicious
websites and e-mail attachments and downloading files and links in
e-mail messages." And
able Trojan programs or tools to help penetrate the login data bank
accounts on the Internet or storage services on the World Wide Web or
other sensitive information.
Rear
doors and rootkits: rear doors (BACKDOORS) is a program that allows
hackers to penetrate computers, but it allows them to often remote
control, as well as it helps to spread the Trojan programs.
She
Julia Haob: "the use of this type of malicious software specifically,
and spread on a global scale," the rootkit (ROOTKITS) are for programs
disguised malicious codes, so as not to be discovered by means of
combating viruses.
Programs
horror SCAREWARE: This software works to promote a climate of terror
and panic in the hearts of the users, and therefore to withdraw
money from them. These malicious programs, for example, show an imaginary danger and communications or false warnings. Says
Julia Haob: "Fraudsters often use graphics or similar names to real
anti-virus software or operating system components, so they show more
trustworthy."
In addition to that there is an abuse corporate logos and renowned institutions, so the warnings appear to be credible. If the user has to pay the money, Vtakhtfa these warnings in some cases. There
are horror programs more dangerous; explains Christian Funk, saying:
"you might like these programs to copy malicious codes on the computer,
the user is therefore vulnerable to damage in one way or another."
Programs
ransom RANSOMWARE: These programs are a kind of horror programs, where
the user is exposed to blackmail by the developers of these programs and
have to pay the ransom. The
data are often stored on your computer are betting in this case, where
the user is prevented from access or disable the operating system or
even data encryption. And
computer experts stresses the need for non-payment of ransom in such
cases; because it may remain the operating system is disabled, even in
the case of payment.
To
clean your computer from such malicious programs and access to the data
again, the user must attempt to start the device through the CD to boot
or rescue your computer. And
usually such cylinders attached with PC magazines and the Internet, or
the user can that downloads the contents of the Internet and copied
himself on the CD. German expert explains Roland Aakenberg that this attempt may succeed, but not on a permanent basis.
Spyware
SPYWARE: These programs spying on the user and on his actions and
behavior on the Internet, for example, you send data unauthorized to
companies or Internet servers, and through it are shown ads are directed
by concerns the user, and often these ads for products or services of
dubious quality.
The
Christian Funk: "spyware violate user privacy too much", where spyware
is installed on the computer with the usual programs without the user's
Note.
Post a Comment