Saturday 6 April 2013

A glance at MALWARES around us....................

MALWARES:-----INTRODUCTION,  CLASSIFICATION,  & TIPS FOR BEING SECURE......

INTRODUCTION: WHAT IS A MALWARE?????????????????
              
                                A malware is a malicious software designed to harm a computer system without
                                the owner's informed consent. Malware  software, is software used or 
                                programmed by attackers to disrupt computer operation, gather sensitive 
                                information, or gain access to private computer systems. It can appear in the  
                                form of code, scripts, active content, and other software. Malware is a general 
                                term used to refer to a intrusive software.Malware includes computer viruses, 
                                worms, Trojan horses, rootkits, spyware, dishonest adware,crimeware and other 
                                malicious and unwanted software.Around 80% of malware today is designed to 
                                steal and find confidential information stored on your computer.This type of 
                                malware is sometimes called crimeware.Malware can invade your machine 
                                through infected email attachment, "bots" that crawl the internet looking for 
                                unprotected computers.


MLWARE CLASSIFICATIONS:     TYPES AND DESCRIPTIONS......................

                                VIRUSA virus is a program which is able to replicate and attach itself to a
                                               program or files infecting the system without your knowledge.This are 
                                               the software programs that hide on your computer and cause its
                                              damage
                                             .

                               Spyware Spyware is a malicious software program that hides on your computer,
                                                 tracks what you are doing online, and sends that information over the 
                                                internet.Some types of softwares like keyloggers can records what you 
                                                are typing in your computer and lot others you can't imagine.

                        Trozan horse:   For a malicious program to accomplish its goals, it must be able to 
                                                 run without being detected, shut down, or deleted. When a malicious
                                                 program is disguised as something normal or desirable, users may 
                                                 willfully install it without realising it. This is the technique of the  
                                                 Trojan horse or trojan. A Trojan horse is any program that invites the 
                                                 user to run it, concealing harmful or malicious code. The code may 
                                                 take effect immediately and can lead to many undesirable effects, such 
                                                 as deleting the user's files or installing additional harmful software.

                              Rootkits:    Once a malicious program is installed on a system, it is essential that 
                                                 it  stay concealed, to avoid detection. Techniques known as rootkits
                                                 allow this concealment, by modifying the host's operating system so 
                                                 that the malware is hidden from the user. Rootkits can prevent a
                                                malicious process from being visible in the system's list of processes, 
                                                or  keep its files from being read.

                                   

                                        
  TIPS TO SECURE:        
                                     * Set the browser to open the webpages only from the trusted web sites.
                                      
                                     * Always checks for the extension of a file and always scan any attached files
                                       before using it.

                                     * Always scan the removable mediums before you open.

                                     * Avoid downloading the files with double extension.

                                     * Always use anti-virus software and also update its signature database when 
                                       available.
         
                                     * Try to avoid the attachment from unknown users.


                         

No comments:

Post a Comment