Tuesday, November 10, 2009

Viruses And Other Wildlife

MALICIOUS CODE

Viruses
- A program that has the ability to 'break away' and to'copy 'into the program / other systems
- Depending on other programs.
- Be active when 'something' that contains a virus run.
- Usually within one operating system, although there are different operating systems
- Infect: Memory and storage

Worms
- Does not depend to a program.
- Reproduce themselves by themselves mencopy from 1 computer to another computer.
- Using the network / Network.
- Did not attack the program.
- Does not change the program.
- Not corrupt the data.
- But dangerous.
- Utilize network resources.

Trojan Horse
- A fragment program that hide in the program and has a special function
- Often hidden in programs that attract users
- For example an interesting program, a new game.
- Usually used to tap one's password.
- Trojan horse programs clever:
Not leave a trace presence
Can not be detected
Programmed to destroy himself before it was detected

Bombs
- Like the Trojan Horse
- Often combined with viruses, worms and programs that attack the system.
- Works by date, time or under certain conditions
- There are 2 kinds of bombs: time and logic
- Who work on a particular time is called time bomb (a bomb)
- Who worked on the incident / circumstances called logic bomb (logic bomb)

Back Doors
- A technique used by the programmer to enter into a system.
- Is a secret way to enter into a system.
- Its function is to provide to the programmer to enter into a system through the 'back door'.
- Sometimes programmers let trap door in the program to monitor pengetasan a program or operation.

OTHER WILDLIFE
Bacteria
A program that does nothing but reproduce themselves
Usually beralokasi in memory, disk or other storage media.

Rabbits
Another name of the program that produced very quickly.

Crabs
Programs that attack / disrupt the data display on the screen.

CREEPERS
A program, such as worms, which menyerbar from other terminals to the network in the ARPANET (1970s) while displaying the message "I'm the Creeper, catch me if you can" to this program will be liquidated by "The Reaper".

Salamis
A program that attacks the values of the money in the bank transaction files, especially the value of fractional
Value fractions (cents) from the interest taken and transferred to the account of another person

No comments:

Post a Comment

Make Money

Your Ads Here