Difference between a Virus, worm and other malware
These days there are a lot of these 'bad wrods' floating around. The threat from these are real and current. Many, many groups of people are working everyday to combat these.
As us, those of whoose compterz are exposed to the nutz in the world, we would benefit from knowing a little about them. (If you are wondering what is it with the 'zz', notzing! just thought of it. After all itz my blog)
Anyway here are some brief descriptions:
Virus
Attaches itself to another program
Usually confined to target
Does not propagate by itself
Infect or corrupt target computer files
Worm
Usually self contained
Spreads over network
Makes copies of itself without intervention
Harm network and consume bandwidth
Trojan horse
Camouflaged program that ususally brings in a payload
Their spread depends on succesful implementation of social engineering concepts which tempt users into running programs that would cause harm to computing devices.
Time bombs
Activate on particular dates and/or times
Logic bombs
Activate on certain conditions met by the computer
Dropper is a program that has been designed or modified to install a virus onto the target system
Injector
Dropper which installs a virus only in memory
General malware payload behavior
blatantly or subtly delete or curropt files
cryptoviral extortion
upload or download files
bringing in more payloads
Denial of service attack setup
spam geenration
zombie computers network creations
spyware activity to log and transmit private data
screenshot logging
keystroke logging
phishing
backdoor setup
References:
http://en.wikipedia.org/wiki/Computer_worm
As us, those of whoose compterz are exposed to the nutz in the world, we would benefit from knowing a little about them. (If you are wondering what is it with the 'zz', notzing! just thought of it. After all itz my blog)
Anyway here are some brief descriptions:
Virus
Attaches itself to another program
Usually confined to target
Does not propagate by itself
Infect or corrupt target computer files
Worm
Usually self contained
Spreads over network
Makes copies of itself without intervention
Harm network and consume bandwidth
Trojan horse
Camouflaged program that ususally brings in a payload
Their spread depends on succesful implementation of social engineering concepts which tempt users into running programs that would cause harm to computing devices.
Time bombs
Activate on particular dates and/or times
Logic bombs
Activate on certain conditions met by the computer
Dropper is a program that has been designed or modified to install a virus onto the target system
Injector
Dropper which installs a virus only in memory
General malware payload behavior
blatantly or subtly delete or curropt files
cryptoviral extortion
upload or download files
bringing in more payloads
Denial of service attack setup
spam geenration
zombie computers network creations
spyware activity to log and transmit private data
screenshot logging
keystroke logging
phishing
backdoor setup
References:
http://en.wikipedia.org/wiki/Computer_worm