What is a Malware?
Malware is an abbreviated term which means "malicious software" this is a (program) software that is specifically designed to access or damage to a computer without the knowledge of the owner.
The first malware programs were created as experiments and mischief, but over time, it has given rise to acts of vandalism and destruction of machines. Today, much of the malware is created for profit through forced advertising (adware), the theft of sensitive information (spyware), the diffusion of e-mail spam or pornography (zombie computers), or to get money) Ransomware).
Before seeing the types of hazards we recommend you to see 10 basic rules of safety at the following link: Computer security.
Let's look at the types of Malware or malicious Software that can be used. At the end you have programs that you can use to protect yourself from these
hazards computer called "Antimalware programs".
Types of Malware
1) Computer virus
Viruses are programs with very peculiar characteristics that are entered into computers in very different ways: through email, Internet, floppy disks, etc.
They have two distinctive characteristics:
-Are they reproduce by infecting other files or programs.
-To run, perform actions annoying and/or harmful to the user, slowing or shutting down the system
The term computer virus is due to his enormous resemblance with biological viruses. Computer viruses are introduced into computers and infect files by inserting therein his "code". When the infected program is run, the code takes over and the virus continues to spread.
They are purposes which aims to spread to other computers and execute the actions for which they were designed.
It is the most known by its volume of risk threat.
Here is a free antivirus: Antivirus free. and here another: Free Antivirus.
2) Keylogger
Type of software that is responsible for obtaining and memorize the keystrokes that are done on a keyboard. It can be used to spy remotely, with the aim of obtaining the user passwords.
3) Computer worm
Type of virus which aims to multiply and infect computers and differ from viruses that do not need to infect other files to be played.
They are limited to make copies of themselves, and networks in which infiltrate reproduce at such speed that they can collapse by saturation, and overflow the memory of the computer.
They spread mainly by email.
4) Trojan
A Trojan or Trojan horse is a program that are different from the virus in that it does not play infecting other files. Also propagates by copying itself as worms do.
Small application hidden in other programs of utilities, wallpapers, images, etc., and to open and run the file install in our computer a second program, the Trojan. Its purpose is to have a gateway to the team to destroy the information stored on the disks and gather information another user or application
information is collected from your computer or even take complete control of a remotely.
Transmission systems are: escort with software, the web, email, chats, and ftp servers.
5) Hijackes or kidnappers
Programs that hijack other programs to use their rights to modify their behavior. The most common case is the attack on a browser, changing the home page and redirecting pages without the consent of the user.
6) Spy or Spyware
Program that is installed on the computer without the user's knowledge and whose purpose is to collect information about the user to be sent to Web servers that are managed by advertising companies. The information that compiles a spy tends to be used to send spam or junk mail.
Computers infected with spyware are very slower connection to the Internet.
Cannot be considered Spyware programs with malicious Trojans, adware and the hijackers basically.
7) Adware or advertising Software
Programs that show ads. Is called adware software that displays advertising, using any means: pop-ups, banners, changes on the page of home or search for the browser, etc. Advertising is associated with products or services offered by the creators themselves or third parties.
Adware can be installed with the user's consent and full awareness, but sometimes it is not. The same happens with the knowledge or lack thereof about its functions.
The problem is when they act as Spyware, including code to collect the user's personal information.
8) Spam or junk mail
It consists of sending advertising email in bulk to any email address, whose purpose is to sell their products. The damage that we cause is saturation mail services and the concealment of other malicious emails.
Many security software packages include anti-spam filters.
Comments
Post a Comment