As I learn to automate

Tuesday, June 27, 2006

Difference between a Virus, worm and other malware

These days there are a lot of these 'bad wrods' floating around. The threat from these are real and current. Many, many groups of people are working everyday to combat these.

As us, those of whoose compterz are exposed to the nutz in the world, we would benefit from knowing a little about them. (If you are wondering what is it with the 'zz', notzing! just thought of it. After all itz my blog)

Anyway here are some brief descriptions:

Attaches itself to another program
Usually confined to target
Does not propagate by itself
Infect or corrupt target computer files

Usually self contained
Spreads over network
Makes copies of itself without intervention
Harm network and consume bandwidth

Trojan horse
Camouflaged program that ususally brings in a payload
Their spread depends on succesful implementation of social engineering concepts which tempt users into running programs that would cause harm to computing devices.

Time bombs
Activate on particular dates and/or times

Logic bombs
Activate on certain conditions met by the computer

Dropper is a program that has been designed or modified to install a virus onto the target system

Dropper which installs a virus only in memory

General malware payload behavior
blatantly or subtly delete or curropt files
cryptoviral extortion
upload or download files
bringing in more payloads
Denial of service attack setup
spam geenration
zombie computers network creations
spyware activity to log and transmit private data
screenshot logging
keystroke logging
backdoor setup



Post a Comment

<< Home