Malicious software terminology

Source: Internet
Author: User
Tags root access

What the general user calls "virus" is not the real virus, in addition to worms, including some malicious software, many people will call malware viruses, such as Trojan horses, access rights tools, users only understand them to know the harm.

  Malicious software

"Malicious operating Software" is referred to as "malicious software". Many people use the word "virus" to explain this type of software, but the virus is only one of them. "Malware" includes all software that can be compromised.

  1. Virus

First of all, talking about viruses. A virus is a malicious software that replicates itself and infects other files, like a biological virus that infects cells and then uses them to reproduce.

Viruses can do a lot of things. For example, it can hide itself, steal passwords, Force pop-up ads, and restart the computer. These are not enough to be called viruses. Viruses are called viruses because of their ability to reproduce. When a virus is running on a computer, it infects programs in the machine. If you put the infected program on another computer, the machine will be infected. For example, a virus may infect a U-disk, when the U disk plug into a computer, and run the infected program, the virus will be infected to the computer, and then infected with more program files, so that the infection will go on indefinitely.

  2. Worm virus

Worm viruses are very similar to viruses, except that they are transmitted in different ways. The worm spreads through the network, and the virus is transmitted by infecting files or by manually moving the virus files. The Shockwave worm and the vibrating wave worm are typical examples. They're in Windows? The reason for the very fast spread between XP systems is Windows? There is no secure protection system in the XP system, and the system service is completely exposed to the network. The worm can enter XP's system service from the network, find the flaw in the system, and begin to infect the system. It can then use the infected computer to replicate itself. Although there are now default firewalls in Windows systems, worms are rare, but they can be propagated in different ways. For example, a worm can spread itself to everyone in the address book through an infected user's email directory.

Like a virus, a worm can achieve many purposes once it successfully infects a computer. Its main purpose is to continue the replication spread.

 3. Trojan Horse

A Trojan horse can disguise itself as a normal file. When someone downloads and tries to open it, the Trojan horse runs in the background and opens a portal that allows third-party access. Trojan horses can do more tasks, such as monitoring a computer and downloading malicious code to a computer. It can also download a large amount of malicious software to your computer.

A Trojan horse is characterized by its formative process. It pretends to be a usable file, and when it runs, the Trojan horse runs in the background, and the hacker can access the computer. But it does not replicate itself and spread over the internet like viruses and worms, and they may be hidden in pirated software to spread.

  4. Spy Software

Spyware is also a malicious software that monitors users without their knowledge. Different spy software collects different data. Malware can be seen as spyware, for example a Trojan horse is a malicious spyware that monitors the user's keyboard to steal financial data.

More "Legit" spyware will bind free software and monitor users ' surfing habits. The authors of the software sell the collected data to advertisers for profiteering.

 5. Advertising Software

Mandatory ads are often stored in spyware. Any type of software may contain ads, and occasionally pop-up prompts. Software that contains ads in a program is generally not called malware. Malicious adware is always arbitrarily embedded in the system of various ads. They can generate pop-up ads that make it impossible for users to do other things. They can even put ads in the pages that users are viewing.

Advertising software to obtain the user's internet habits, can be more effective pop-up users interested in advertising. In Windows systems, adware is generally acceptable to users, compared to other malicious software, because it is bundled with normal software. For example, using Oracle's Java-made Knowledge toolbar, users see it as adware.

  6. Keyboard recording Tools

The Malware Keylogger tool is also running in the background, which can record all keyboard operations. These actions include user names, passwords, credit card numbers, and other sensitive data. The data will then be sent to the hacker's server for analysis to find useful data.

Other malicious software can also have this feature. Merchants can monitor business operations through this software, and both spouses can monitor each other through the software.

  7. Zombie Network

Botnets are a relatively large network, and the computers in the network are under the control of the network developers. Each computer is infected with a zombie program by a special malware.

Once the zombie software infects the computer, it establishes a channel on the computer and the control server and waits for the controller to issue instructions. For example, it can perform DDoS attacks. If the controller wants to launch an attack on a website, all zombie computers will immediately attack that site, and tens of thousands of attacks can paralyze the server.

The makers of Botnets will sell the portals of the web to other manufacturers, and hackers can also be used to make profits.

 8. Root Access Rights tool

The root access tool is a type of malware that is designed to get the highest privileges on the system and can evade security programs and user checks. For example, the tool can be loaded and deep in the system before the system is run, modifying the system functions to avoid security program detection. And it can also be hidden in Task Manager.

The core of the root access tool is that once it runs, it can be hidden.

  9. ransomware

Ransomware is a hijacking of computer or files of malicious software, the resources are hijacked, the user is generally required to pay a certain ransom. Some ransomware makes it impossible for the computer to use it and then pops up and asks for money to continue using it. But this kind of software is easy to be detected by anti-virus software.

To Cryptolocker the ransomware usually turns the contents of the file into a bunch of passwords, and then asks for a ransom and then restores the file. In the absence of file backup, encountering this kind of software is very bad.

Most malware is driven by interest, and ransomware is a classic example. Ransomware does not destroy computers, it does not delete files, just for money. Hijack some documents to get quick entry.

The harm of malicious software in the end how much, from the above introduction of some common situation, the user can be very clear understanding. Malware is ubiquitous, and users are particularly small when using the operating system.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.