Sabtu, 20 Februari 2010

Perbedaan virus, worm, trojan, backdoor, malware, spyware?

A computer virus is a computer program that can duplicate or copy itself and spread by inserting copies of itself into other programs or documents. Computer viruses can be analogous to biological viruses that spread by inserting itself into living cells. Computer viruses can be destructive (for example by destroying the data on the document), making computer users feel annoyed, or no effect at all.

Computer viruses generally can damage your computer software and can not directly damage the computer hardware (especially on operating systems, such as family-based operating system Windows (Windows 95, Windows 98/98SE, Windows NT, Windows NT Server, Windows 2000, Windows 2000 Server, Windows 2003, Windows 2003 Server, Windows XP Home Edition,
 Perbedaan virus, worm, trojan, backdoor, malware, spyware? Windows XP Professional, Windows XP Servicepack 1, Windows XP Servicepack 2) even GNU / Linux. negative effects, especially a computer virus is self propagation, which makes the computer resources ( such as CPU Time, memory usage) to be reduced significantly. Almost 95% virus is a virus-based computer operating system Windows. The remaining 2% attacked Linux / GNU (and Unix, as the source of Linux, of course), Mac 1% mainly Mac attack OS 9, Mac OS X (Tiger, Leopard). 2% more attack other operating systems like FreeBSD, OS / 2 IBM, and Sun Operating System.

Virus attacks can be prevented or overcome by using antivirus software. This kind of software can also detect and remove computer viruses, so long as the computer virus database is owned by the antivirus software already contains the code to remove the virus.

Example is the Worm virus, trojan, etc.. Example of a reliable antivirus and counteract the virus is Kaspersky, AVG, AntiVir, PCMAV, Norton, Norman, and McAfee.

Worm:
Worm
Worm is a type of virus that does not infect other programs.
He made copies itself and infects other computers (usually using a network connection) but not linking him with other programs; but a worm can alter or destroy files and programs.

Trojan:
Trojan is a replica or duplicate of the virus. Incorporated as a Trojan virus because of the nature of unwanted programs and work by itself on a computer. The nature of Trojan is a control computer automatically. For example computer trojan email entered. Trojan included in Rats (remote access trojans), where a computer controlled by a particular program, even some open-enabled computer trojan that can be entered by computer and diaccess from afar.

Backdoor:
Backdoor or "back door", the security of computer systems, refers to mechanisms that can be used to access the system, application, or network, other than a commonly used mechanism (through the logon process, or any other authentication process). Also known as the back door.

Backdoor was initially created by computer programmers as a mechanism that allows them to gain special access to their programs, often used to justify and improve the code in the program they had created when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmers to create a login process of the program in 1983 when he obtained the Turing Award), in addition to common log programs in the UNIX operating system using C programming language, so that he can access UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect themselves from detection and disposal of the system, even if the user finds it, because this is a backdoor set herself again (do recompiling itself).

Some software developers to add a backdoor into the program made for the purpose of destroying (or goal suspicious). For example, a backdoor can be inserted into the code in an online shopping site (e-commerce) to allow developers to acquire information about the transactions that occur between buyers and sellers, including credit cards.

The term is now used by the backdoor hackers to refer to the mechanism that allows a hacker can access the system back to a system that has previously attacked without having to repeat the process of exploitation of system or network, as he did the first time. Generally, after a network has been attacked by using the exploit (for a susceptibility / vulnerability), an attacker would cover all traces of the system concerned with modifying the file system records (logs) or delete it, and then install a backdoor in the form of a software or add a special user account that has access rights as a network administrator or the administrator of the system. If then the network owner or the system realize that the system has been attacked, and then close all the known vulnerabilities in the system (but does not detect any installed backdoor), previously a striker who will still be able to access the system in question, without being noticed by network owners, especially after he registered as a valid user in the system or network. By having a right as a network administrator, he was able to do things that can damage the system or remove the data. In cases like the above, the most common way is to reinstall the system or network, or by doing the restoration of the backup / backups that are still clean from the backdoor.

There are several devices that can be used to install a backdoor, as well as several Trojan horses, but which is popular Netcat, which can be used in the Windows operating system or UNIX.

Malware:
"Malware" is a computer program that was created with the purpose and main objectives for software weaknesses. Malware is generally created to break or damage the software or operating system.
Examples of malware are viruses, worms, Wabbit, Keylogger, Browser Hijacker, Trojan Horse, Spyware, Backdoor, Dialer, Exploits and rootkits.

Spyware:
Spyware is software that collects and sends information about the user's computer without the user knows it.
More information can that not too dangerous as computing patterns, especially the surf, until a dangerous person like credit card numbers, PIN for electronic banking (e-banking) and an account password.
Information about surf pattern, already mentioned, not too dangerous. Visited the site, the information is often sought, chat in the chat room will be spied upon by the spyware.
Furthermore, the information is used to display ads that are usually in the form of pop-up window. Ads that a person associated with the custom surf. For example often times a person seeking information about digital cameras. Pop-up window that appears will show, such as trading sites digital camera. Adware is a term for this spyware.
The spread of spyware similar to Trojan. For example, FlashGet. When used FlashGet yet registered, FlashGet act as spyware. Try and connect yourself to the internet, run FlashGet who have not registered, ignore computer a few moments, would get a window that internet explorer a site showing ads.

In anticipation of computer viruses are increasingly mengganas, make sure your computer is always protected with antivirus up to date ..

Tidak ada komentar:

Posting Komentar