tag:blogger.com,1999:blog-55202152322556175042023-11-15T07:50:41.747-08:00Antivirus SortedHelping you make an informed decision when choosing an antivirus which suits your individual needs :)
Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-5520215232255617504.post-21009530328583159292013-04-12T13:11:00.000-07:002014-02-02T12:55:41.574-08:00Antivirus Detection TechniquesThe most Common ways that antivirus software detects potential malware threats are by:
<br />
<ul>
<li><b>Signature-based detection </b></li>
<li><b>Heuristic-based detection </b><b></b></li>
<li><b>Rootkit detection </b></li>
<li><b>Real-time protection </b></li>
<li><b>Sandbox</b></li>
</ul>
<div style="text-align: right;">
</div>
<br />
<ul>
<li><b>Signature-based detection - </b>The antivirus software scans your files and compares their source code to a list of known malware which the antivirus vendors are aware of. Virus signatures are strings of computer code that are used to identify viruses.<b></b></li>
<li><b>Heuristic-based detection – </b>Similar to signature based detection, the antivirus software scans your file for the generic source code which is common to more than one type of malware. This process helps detect new variations of known malware which has not been added to the signature –based list.<b></b></li>
<li><b>Rootkit detection – </b>Rootkits are a type of malware which is designed to gain access to your computer system at an administrative level. They are difficult to remove from your system and can cause complete system failure resulting in the need for your entire operating system to be re-installed.<b></b></li>
<li><b>Real-time protection – </b>Also known as “on-access scanning”, “background guard”, “resident shield” and “autoprotect.” The antivirus monitors your system for suspicious processes in “real time.” In other words when data is loaded into active memory e.g. when you insert a CD, open an email, webpage or file, the antivirus program can block the malware before damage is done to your electronic device.<b></b></li>
<li><b>Sandbox – </b>Some higher-end antivirus programs allow you to open untested files or untrusted websites in a “sandbox.” A sandbox is an area of disk memory that is separate from the core operating procedures so that if the user does come across malware, the malware is isolated from the user’s files and can’t infect the electronic device.<b></b></li>
</ul>
Derivative Source – <a href="http://en.wikipedia.org/wiki/Antivirus_software" target="_blank" title="Wikipedia/Malware Detection">Wikipedia</a>
<a href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license"><img alt="Creative Commons License" src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" style="border-width: 0;" /></a>
The above text is licensed under a <a href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.<br />
<br />
<br />
The above article is licensed under a <a href="http://creativecommons.org/licenses/by-sa/3.0/">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p></span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">You are free to republish a modified or "as is" version of the above work as long as you include the following attribution on the same page as the article and allow the users of your webpage to republish this work the same way. </span></div>
Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.com2tag:blogger.com,1999:blog-5520215232255617504.post-78713498252200728952013-03-04T12:58:00.001-08:002014-02-02T12:55:01.190-08:00Hackers - The Types of Hackers and Hacker Psychology<div class="separator" style="clear: both; text-align: center;">
</div>
<span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">Hacking has a mysterious taboo behind it and
the term "hacker" is often misunderstood due to the image that the
media and </span><st1:city style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;" w:st="on"><st1:city w:st="on"><st1:place w:st="on">Hollywood</st1:place></st1:city></st1:city><span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;"> have portrayed
them as. When you think about a hacker I'm sure you picture a pimply nosed kid
in a dark room who gets his kicks out of causing distress to computer users and
defacing websites. While this description is an accurate portrayal of ONE type
of hacker, most of today's real threats come from sophisticated and organized
networks. These hackers have the sole intent of stealing your money, identity,
and/or causing as much mayhem as possible for their own financial and
psychological gains.</span><span style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;"> </span><br />
<div class="MsoNormal">
<div class="MsoNormal">
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">It is important to point out that not all hackers are out to get
you and that they can be divided into 3 distinct categories:<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div class="MsoNormal" style="margin-left: 36.0pt; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">1. <b>THE BLACK-HAT HACKER</b> - These are your stereotypical
hackers who are out to cause mayhem and have criminal intentions. Black-Hat
hackers use their skills and talents for BAD.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div class="MsoNormal" style="margin-left: 36.0pt; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">2. <b>THE WHITE-HAT HACKER</b> - These a system security
professionals who hack computer systems in a controlled environment and with
the permission of the system owners. The goals of these hackers are to find
system weaknesses with the view to patch them up before a Black-Hat hacker
finds them. Many White-Hat hackers are actually reformed Black-Hat hackers.
White-Hat hackers use their skills and talents for GOOD.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div class="MsoNormal" style="margin-left: 36.0pt; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">3. <b>THE GREY-HAT HACKER</b> - The Grey-Hat hacker is
someone who sits on the fence and partake in White-Hat and Black-Hat hacking.
These people could have a day job as a system security professional however
indulge in Black-Hat hacking in their spare time. Grey-Hat hackers use their
skills and talents for GOOD and BAD.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: 36.0pt; mso-list: l1 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-indent: -18.0pt;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Below is a list of the different types of
hackers from a stereotypical perspective. Please note that these are
all generalizations are there are often variations to the norm:
<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<ul type="disc">
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Kid<o:p></o:p></span></li>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span>
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Activist (Hacktivist)<o:p></o:p></span></li>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span>
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Rogue Insider<o:p></o:p></span></li>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span>
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Spy (Corporate, Governmental)<o:p></o:p></span></li>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span>
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Criminal<o:p></o:p></span></li>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span>
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Tinkerer<o:p></o:p></span></li>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span>
<li class="MsoNormal"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Reformed Hacker<o:p></o:p></span></li>
</ul>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u>The Kid</u></span></h2>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><b> </b>"The Kid" is hacker who is normally male, between the
ages of 13-30 years. They are often antisocial and introverted in the real
world however may have a massive network of friends around the world online.
These hackers find pleasure in trying to outsmart IT security administrators
and get their adrenaline kicks when they succeed. When "The Kid"
succeeds with a hack they may get sense and feeling of accomplishment thinking
"I'm better than you IT professional" which fills the void of any
potential self-worth issues which they may have. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">As hacking is an online activity these hackers don't normally
realise the harm that they can cause to people and companies in the real
world. These hacker are often not very skilled with the hacking software
and techniques which they use so they are almost always caught.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u>The Activist (Hacktivist)</u></span></h2>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Hacktivists are a group of people who share a
common opinion towards another person, group, company, government or even
religion. They find social acceptance by being part of the
collective of the hacktivist group and by interacting with other like-minded
people. The goals of hacktivist attacks may range from trying to make people
aware of a social injustice to the flat out destruction of their targets
business and reputation.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Hacktivists perform hacking operations because they may disagree
with a social, commercial or political norm and by carrying out these attacks
they may get the feeling of collective accomplishment. The mindset of the
hactivist is that they are performing their attacks for the greater good and to
defend their personal freedoms. <o:p></o:p></span></div>
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u>The Rogue Insider</u></span></h2>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The "Rogue Insider" is a person who
works for the company and accesses, modifies or takes computer information and
data that they are not allowed to.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Rogue insiders could be:<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· A disgruntled employee.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Someone that's just being nosey and
accessing data which they don't have clearance to or for non-work related
reasons.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· An employee with inadequate IT
security knowledge and opens a malware infected email or visits malicious
websites at work.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· An employee who's been recruited by a
competitor company to steal or damage data or cause harm to the companies
reputation.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The last type of rogue insider mentioned above is the most dangerous.
Their motivations for hacking their employer's system is almost always GREED.
These "Rouge Insiders" hack purely for profit. They make their money
either by stealing money directly from their employers or by stealing
company/customer data with the view of reselling this data to a competitor.
They might also use the stolen customer data to steal money directly from the
customer. <o:p></o:p></span></div>
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u>The Spy (Corporate and Governmental)</u></span></h2>
<h3>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"> The
Corporate Spy: <o:p></o:p></span></h3>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The corporate spy is normally a "hacker for hire" and
use their hacking skills purely for financial gain. These hackers are normally
contracted by companies to perform hacks on their competitors with the view of
leveraging a corporate advantage over those competitors. This is also known
as <i>industrial espionage</i>.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Companies may recruit a "corporate spy" to perform the
following:<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Learn about what new developments the
competitor is working on.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Steal information such as product blue
prints.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Learn about a competitor's financial
position.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Find any "dirty laundry" about a
competitor to use against them.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Steal customer information with the view
of snatching the customers away from the target company.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Cause damage to the competitor's system
with the view of hindering performance.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">· Damage the competitor's credibility.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<h3>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;">The
Governmental Spy:<o:p></o:p></span></h3>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Most world governments have their own
departments of hackers in their employ. For the "governmental spy"
their motivation for hacking is that it's a job. These hackers may be involved
in law-enforcement, keeping tabs on the populous (Although many governments
deny this) or military operations and could either be trained by the government
or be a reformed hacker. These hackers are normally employed or contracted by
governmental departments like the police, national security and intelligence
organisations or the military. <o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">When it comes to military hackers, in peace-time these hackers may
be used to keep an eye on other countries affairs (Once again most governments
deny this) and at times of conflict these hackers can be used to obtain intel
on the enemy and/or cripple the oppositions communications network and
infrastructure making them a soft target. <o:p></o:p></span></div>
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u>The Criminal</u></span></h2>
<table border="0" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="float: right; margin-left: 12pt;">
<tbody>
<tr>
<td style="padding: 4.5pt 4.5pt 4.5pt 4.5pt;"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br />
</span></td>
</tr>
<tr>
<td style="padding: 3.0pt 4.5pt 4.5pt 4.5pt;"><div align="center" style="margin-bottom: .0001pt; margin: 0cm; text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
</td></tr>
</tbody></table>
<div style="text-align: right;">
</div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The "Criminal Hacker" is motivated
purely by money and has a complete disregard for social order. These are the
hackers that will steal your bank account information in order to take your
money. As the victims of criminal hackers are normally faceless it makes them
an easy target and the criminal hacker's conscious is barely affected.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Although most criminal hackers do it for their own financial
gains, there is an exception; some criminal hackers are in actual fact <i>hacktivist
extremists</i> who destroy commercial property to justify their
disagreement and hatred towards certain corporations, governments or religious
groups.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u> The Reformed Hacker</u></span></h2>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"> These are White-Hat hackers who used to Black-Hat hackers but they
were either caught or ceased illegal hacking before they were caught. The skill
acquired from Black-Hat hacking have made them highly skilled system security
professionals with an edge over their competition in the work environment
because they already know what system flaws to look for. While experience counts
towards them when it comes to finding employment many companies are weary about
hiring a reformed hacker due to their dubious past.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The motivations for "Reformed Hackers" are normally to
make an honest wage however there are some hacker who pretend to be reformed
but are actually trying to gain access to company systems.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<h2 style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"><u> The Tinkerer</u></span></h2>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The Tinkerer is a hacker who's not content
with the standard settings of a software application or electronic device (Like
a smart phone). Their motivations may be to either enhance the capabilities of
a software application or to "crack" security protocols in the
application against the manufacturers licensing terms. The Tinkerer may perform
these hacks in order to make pirated copies of a software application or allow
the "cracked" device to be able to install unofficial applications.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Most Tinkerers don't think that what they do is illegal and in
some instances it's not. From the Tinkerer's perspective, by performing these
cracks they are actually doing a community service.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">
</span><br />
<hr align="center" color="#333333" noshade="" size="2" width="100%" />
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">
</span></div>
<h3>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"> In Conclusion<o:p></o:p></span></h3>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">There have lately been many high profile
hacking attacks on multi-billion dollar companies who have the best system
security software and personal that money can buy. This just proves that no
system is ever safe and there is not much anyone can do if a hacker really
wants access to your system.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">All you can really do is always keep your operating system and
programs up to date and ensure that a reputable antivirus is installed on your
computer. The last thing that you want to do is make it easy for a hacker to
infiltrate your computer system.<o:p></o:p></span></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">
</span><br />
<hr align="center" color="#333333" noshade="" size="2" width="100%" />
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">
</span></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="background-color: white; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;"><br /></span></div>
The above article is licensed under a <a href="http://creativecommons.org/licenses/by-sa/3.0/">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><u1:p></u1:p>
</span><br />
<div style="margin-bottom: .0001pt; margin: 0cm;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm;">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">You are free to republish a modified or "as is" version
of the above work as long as you include the following attribution on the same
page as the article and allow the users of your webpage to republish this work
the same way.</span></div>
</div>
</div>
<br />Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.com1tag:blogger.com,1999:blog-5520215232255617504.post-24164481626893586632013-03-02T02:04:00.000-08:002014-02-02T12:56:37.538-08:00Antivirus Installation Options<span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">The most common way that antivirus programs are uploaded onto a user’s electronic device is by a full installation. This means the user installs the antivirus program on their electronic device and a full copy</span><br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
of the antivirus is stored on the user’s hard disk.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
There are however other antivirus installation options available when it comes to the security of your electronic device:</div>
<h2 style="text-align: center;">
<b>Cloud Antivirus</b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Instead of installing a full copy of the antivirus program on your device, with a cloud antivirus program only a few core files and a user interface is installed. When a device needs to be scanned for malware, the files being scanned are sent to a remote host that does all the scanning for you.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
This way most of the actual processing and scanning are done on “the cloud,” freeing up processing power and memory on the user’s device. One of the big advantages of using a cloud antivirus is that the network cloud hosts can use numerous types of detection techniques to scan your files for malware. For a cloud antivirus program to be most effective you need a constant network connection.</div>
<h2 style="text-align: center;">
<b>Online Scanning</b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Some antivirus vendors don’t need you to install an antivirus program at all. The requested files are uploaded via the antivirus vendor’s website, scanned for malware and a report is generated if anything is found.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
This process is highly effective if you suspect that malware may already be prevalent on your device. Certain malware can effectively detect that an antivirus is being installed and either hide from the antivirus or even infect the antivirus programs themselves.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Online scanning can however be <b>VERY DANGEROUS</b>. There have been many fake antivirus programs offering free system scans however they in fact install malware on your system (See <a data-mce-href="http://en.wikipedia.org/wiki/Rogue_security_software" href="http://en.wikipedia.org/wiki/Rogue_security_software" target="_blank" title="Wikipedia / Rogue Security Software">Rogue Security Software</a> for more details). If you do decide to use an online scanning service be sure that it is from a trusted source (Preferably directly from a major vendor’s official website).<b></b></div>
<h2 style="text-align: center;">
<b>Rescue Disk</b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
A rescue disk is loaded onto a CD/DVD or USB memory device and allows you to scan your system before the operating system loads into memory. This is extremely useful if malware has already done damage to your system and the operating system won’t load when you turn the device on, as well as removing malware that may be corrupting or deleting another antivirus program that you are trying to install.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Article Derivative Source – <a data-mce-href="http://en.wikipedia.org/wiki/Antivirus_software" href="http://en.wikipedia.org/wiki/Antivirus_software" target="_blank" title="Wikipedia ">Wikipedia/Antivirus Software</a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license"><img alt="Creative Commons License" data-mce-src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" data-mce-style="border-width: 0;" src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" style="border: 0px; cursor: default;" /></a><br />
The above text is licensed under a <a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.</div>
Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.com1tag:blogger.com,1999:blog-5520215232255617504.post-73507282222087425142013-02-28T11:49:00.001-08:002014-02-02T12:58:09.654-08:00The Problems with Antivirus Software<span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">While not having any form of protection on your electronic device is seriously ill-advised there are however some major issues that can occur when you buy and install an antivirus program. The problems with antivirus software include:</span><br />
<h2 style="text-align: center;">
<b><u>Rogue Security Software</u></b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
These are malware programs that users install that pretend to be an antivirus. On most occasions the user thinks that their device is now protected against malware when in fact malware such as Trojan Horses are installed on their system. On many occasions the user actually paid for the “fake” antivirus program and hence has been defrauded of their money on top of making their private data available to hackers.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Another one of the main ways people may inadvertently install rogue security software on their devices are by clicking on a website link which pretends to have found malware on their system and prompting that they download or scan their device using that link’s installation prompts.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
The best way to avoid installing rogue antivirus software is by always using well known antivirus products and downloading or buying the antivirus directly from the manufacturer’s website or another trusted source. Please visit Wikipedia for more information about <a data-mce-href="http://en.wikipedia.org/wiki/Rogue_security_software" href="http://en.wikipedia.org/wiki/Rogue_security_software" target="_blank" title="Wikipedia - Rogue Security Software">Rogue Security Software</a>.</div>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<h2 style="text-align: center;">
<b><u>False Positives</u></b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
There have been numerous reports of antivirus programs deleting or quarantining legitimate programs and even destroying critical operating system applications. Even the most popular antivirus programs have deleted critical files and caused immense damage to computer systems around the world.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
All antivirus programs have a clause in their installation terms and conditions that users need to agree to which states that legal action can not be taken against the vendors for damages caused to data and applications as a result of the antivirus program and that the antivirus program should be used at their own risk.</div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<h2 style="text-align: center;">
<b><u>Unexpected Renewal Costs</u></b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Most commercial antivirus programs have a subscription clause which states that their antivirus will automatically renew around the time that the licence is about to expire. If you bought the antivirus online the odds are that the vendor you bought the antivirus from will still have your bank card details and will automatically charge you when the time for renewal approaches. The default settings on most antivirus programs are to automatically renew themselves unless the person who bought the antivirus literally “Opts out” of the process. If you want your automatic renewal option turned off it is recommended that it be done as soon as you bought your licence as some vendors may not allow you to opt out as much as 60 days before the licence is about to expire.</div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<h2 style="text-align: center;">
<b><u>Software Conflicts</u></b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Many antivirus programs can conflict with other software applications on you device. Some updates like operating system service pack upgrades or graphics card upgrades may require that your antivirus be turned off at the time of installation; otherwise your update/upgrade may be unsuccessful. In addition, antivirus programs <b>don’t like </b>other antivirus programs. Because many antivirus programs use the same resources on your device, they won’t work together. On most occasions only one antivirus program can be installed on your device at a time.</div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<h2 style="text-align: center;">
<b><u>Antivirus Effectiveness and New Malware</u></b></h2>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
No antivirus program can detect and remove all known viruses. There have also been a lot more mention of <b>Zero Day Attacks </b>in the news lately which is not detectable until it is too late and the malware has executed its purpose. In a nutshell, a zero day attack is when a previously unknown vulnerability is discovered on electronic devices and the malware writers target these vulnerabilities before the antivirus vendors and application writers can find a solution to stop the malware. For more detailed information on Zero day Attacks click here – <i><a data-mce-href="http://en.wikipedia.org/wiki/Zero_day_attack" href="http://en.wikipedia.org/wiki/Zero_day_attack" target="_blank" title="Wikipedia - Zero Day Attacks">Zero Day Attacks</a>.</i></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
New malware code is written everyday and on many occasions the people that write this code actually test it against the major antivirus programs to ensure that it is not detectable. Unfortunately antivirus vendors can not stop these viruses until they have actually discovered them. Most of the major antivirus vendors allow users to send in any file to them that they suspect is infected with malware so that the vendor may update their antivirus programs to stop and remove it.</div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<h2 style="text-align: center;">
<b><u>Other Antivirus Issues</u></b></h2>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<li><b>System Slowdown – </b>For an antivirus to be effective it needs to scan the user’s files, new emails and system processes for malware. This however can eat up a lot of the electronic device’s processing power and memory, making the user’s device feels sluggish and slow.<b></b></li>
<li><b>Rootkits </b>– It is really difficult for antivirus programs to detect rootkits which has compromised the user’s operating system. Rootkits have full administrative control of the device they’re on. They are hidden from the “task manager” and can change key operating system settings. Rootkits can also evade and manipulate antivirus programs.</li>
<li><b>Damaged Files – </b>Once malware has been detected on your device, the antivirus program may be able to remove the malware however the file/s that contained the malware or were corrupted by the malware can not be recovered to their original operational state. The only way to fix this is by restoring existing backups of the damaged files and data.<b></b></li>
<li><b>Firmware – </b>Antivirus software is unable to protect your BIOS from infection. Some antivirus programs have also been known to block legitimate firmware updates leaving the users’ firmware outdated.</li>
</ul>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Derivative Source – <a data-mce-href="http://en.wikipedia.org/wiki/Antivirus_software" href="http://en.wikipedia.org/wiki/Antivirus_software">Wikipedia/Antivirus Software</a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license"><img alt="Creative Commons License" data-mce-src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" data-mce-style="border-width: 0;" src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" style="border: 0px; cursor: default;" /></a><br />
The above text is licensed under a <a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.</div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.com1tag:blogger.com,1999:blog-5520215232255617504.post-66605719236330941512013-02-28T09:59:00.000-08:002014-02-02T12:58:37.001-08:00Antivirus Software (A Definition)<span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">Antivirus (or alternatively spelt "anti-virus") software is a generic term for a software application used to detect and/or remove malware from an electronic device. </span><br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<div style="text-align: right;">
</div>
Whist the term “antivirus” suggests that only computer viruses are detected by the software application, almost all modern antivirus programs detect and remove various types of malware which may attempt to install itself on your electronic device. The main electronic devices which can by affected by malware are any form of computer (Including Windows and Apple operating systems), tablet PCs, smart phones and there has even been some mention of smart TVs being potentially affected.</div>
<h5 style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; line-height: 19px;">
<strong>The term “malware” comprises of the following:</strong></h5>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<li><b>Computer viruses - </b>A computer virus is a software program that has an ability to replicate itself and spread from one computer to another.</li>
<li><b>Adware - </b>Adware<b> </b>is a software package which automatically displays unwanted advertisements on the user’s electronic device.<b></b></li>
<li><b>Backdoors - </b>A <b>backdoor</b> is a way of bypassing the usual authentication process of a computer system which grants an unauthorised user of software application access to that computer.<b></b></li>
<li><b>Malicious BHOs – </b>Malicious Browser Helper Objects (BHOs) use their unrestricted access to Microsoft Internet Explorer as a gateway to implement other forms of malware.<b></b></li>
<li><b>Dialers -</b> Dialers from a malware perspective take advantage in security flaws in operating systems to make outbound phone calls to premium rate numbers without the user’s knowledge.<b></b></li>
<li><b>Fraudtools – </b>Fraudtools pretend to be a well known and trusted software application (most likely masquerading as an antivirus) to steal data or money. <b></b></li>
<li><b>Browser Hijackers – </b>Malware which changes the user’s web-browser settings without the user’s permission.</li>
<li><b>Keyloggers - </b>A Keylogger records the keystokes on the user’s keyboard without the user’s knowledge.</li>
<li><b>Malicious LSPs </b>– Whilst not actually malware, an LSP (Layered Service Provider) is a Microsoft Windows function which intercepts and modifies inbound and outbound Internet traffic which malware might exploit.</li>
<li><b>Rootkits - </b>A rootkit is a piece of software with administrative system privileges which can hide certain processes or programs on the user’s electronic device</li>
<li><b>Spyware – </b>Spyware is a form of malware which can gather personal information on the user’s computer without their knowledge or consent. Spyware can also take control over certain computer functions and programs.</li>
<li><b>Ransomware - </b>Ransomware restricts the access to the infected computer system and as the name suggests, holds the system to “ransom” until the user pays the extortionist to remove the restrictions.</li>
<li><b>Trojan horses – </b>A Trojan horse is a form of malware which grants unauthorised access to a user’s computer system.</li>
<li><b>Worms</b><b> -</b> Computer worms are a standalone computer program designed to replicate themselves and spread to other electronic devices on a computer network.</li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
Derivative Source – <a data-mce-href="http://en.wikipedia.org/wiki/Antivirus_software" href="http://en.wikipedia.org/wiki/Antivirus_software" target="_blank" title="Visit the Wikipedia Antivirus Software definition page">Wikipedia/Antivirus Software</a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;">
<a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license"><img alt="Creative Commons License" data-mce-src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" data-mce-style="border-width: 0;" src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" style="border: 0px; cursor: default;" /></a><br />
The above definition is licensed under a <a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.</div>
Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.com0tag:blogger.com,1999:blog-5520215232255617504.post-3618756084327779402013-02-27T15:48:00.001-08:002014-02-02T13:00:54.731-08:00Types of Malware<span style="font-family: Arial, Helvetica, sans-serif;">The word</span><span style="font-family: Arial, Helvetica, sans-serif;"> </span><b style="font-family: Arial, Helvetica, sans-serif;">Malware</b><span style="font-family: Arial, Helvetica, sans-serif;"> </span><span style="font-family: Arial, Helvetica, sans-serif;">is a term derived by mixing the words “</span><i style="font-family: Arial, Helvetica, sans-serif;">malicious</i><span style="font-family: Arial, Helvetica, sans-serif;">” and “</span><i style="font-family: Arial, Helvetica, sans-serif;">software</i><span style="font-family: Arial, Helvetica, sans-serif;">” and can be described as any form of software, script or code which is designed to cause damage to computer systems or to intrude on the privacy of computer system users.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">Types of malware include the following:</span><br />
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Computer Viruses</b> - A computer virus is a software program that has an ability to replicate itself and spread from one computer to another.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Adware</b> - Adware is a software package which automatically displays unwanted advertisements on the user’s electronic device.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Backdoors</b>- A <b>backdoor</b> is a way of bypassing the usual authentication process of a computer system which grants an unauthorised user of software application access to that computer.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Malicious BHOs</b> - Malicious Browser Helper Objects (BHOs) use their unrestricted access to Microsoft Internet Explorer as a gateway to implement other forms of malware.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Dialers</b> - Dialers from a malware perspective take advantage in security flaws in operating systems to make outbound phone calls to premium rate numbers without the user’s knowledge.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Fraudtools</b> - Fraudtools pretend to be a well known and trusted software application (most likely masquerading as an antivirus) to steal data or money.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Browser Hijackers - </b>Malware which changes the user’s web-browser settings without the user’s permission.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Keyloggers</b> - A Keylogger records the keystokes on the user’s keyboard without the user’s knowledge.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Malicious LSPs -</b> Whilst not actually malware, an LSP (Layered Service Provider) is a Microsoft Windows function which intercepts and modifies inbound and outbound Internet traffic which malware might exploit.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Spyware</b> - Spyware is a form of malware which can gather personal information on the user’s computer without their knowledge or consent. Spyware can also take control over certain computer functions and programs.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Ransomware - </b>Ransomware restricts the access to the infected computer system and as the name suggests, holds the system to “ransom” until the user pays the extortionist to remove the restrictions.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Trojan Horses</b> - A Trojan horse is a form of malware which grants unauthorised access to a user’s computer system.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Worms</b> - Computer worms are a standalone computer program designed to replicate themselves and spread to other electronic devices on a computer network.</span></li>
</ul>
<ul>
<li><span style="font-family: Arial, Helvetica, sans-serif;"><b>Rootkits</b> - A rootkit is a piece of software with administrative system privileges which can hide certain processes or programs on the user’s electronic device.</span></li>
</ul>
<div>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px;" />
<h4 style="text-align: center;">
<b>Computer Viruses </b></h4>
</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<strong>Definition</strong>: "A computer virus is a software program that has an ability to replicate itself and spread from one computer to another."There is a misconception that most types of malware and computer viruses are the same thing however computer viruses are limited to the above definition. Types of malware which are not classed as computer viruses are computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. Whilst worms and Trojan Horses also have the ability to replicate themselves, the way they do so is different to that of a computer virus. See <strong>Worms</strong> , and <strong>Trojan Horses</strong> for more details.</div>
<h6 style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 0.75em; line-height: 19px; text-align: start;">
<b>Resident and Non-Resident Viruses</b></h6>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Viruses are unable to replicate themselves unless they have been permitted to execute code and write to memory. For this reason, many viruses write themselves to legitimate programs (Known as code injection) and wait to be executed. Viruses can be divided into 2 classes based on the way they replicate themselves when executed. The ways that viruses replicate themselves can be classed as <b>resident viruses </b>or <b>non-resident viruses.</b><b> </b></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A <strong>resident virus</strong> resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A<strong> non-resident</strong> virus is like a resident virus however the way they spread is different. Instead of waiting for another program to access the host program like a resident virus does, a non-resident virus actually actively seeks out other applications to infect.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source - <a data-mce-href="http://en.wikipedia.org/wiki/Computer_virus" href="http://en.wikipedia.org/wiki/Computer_virus" target="_blank" title="Wikipedia/Computer_Virus">Wikipedia/Computer Virus</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="adware"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Adware</b></h4>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Adware<b> </b>is a software package which automatically displays unwanted advertisements on the user’s electronic device. The most common form of adware is by the way of annoying pop-ups. Other forms of adware are advertisements prevalent in the software interface or the installation of an unrelated application. The usual reason that adware is written is to generate pay-per-click income for the adware author.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Most adware can be more of an annoyance than an actual threat to the user’s electronic device however some adware may be coupled with spyware. The spyware associated with the adware may have the ability to monitor the user’s computer habits (e.g. which websites they visit, what applications are running on a user’s device and even any security flaws on the user’s device which the spyware author can exploit).</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source - <a data-mce-href="http://en.wikipedia.org/wiki/Adware" href="http://en.wikipedia.org/wiki/Adware" target="_blank" title="Wikipedia/Adware">Wikipedia/Adware</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="backdoors"></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Backdoors (Malware)</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A <b>backdoor</b> is a way of bypassing the usual authentication process of a computer system which grants an unauthorised user access to that computer. The unauthorised user is usually undetected and can access the host computer’s data in plain text.Whilst backdoors are not technically malware in the sense a computer virus is, they are the by-product of certain rootkits, worms and Trojan Horses.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
One of the most common ways that back doors are used now days are to use compromised computers to send unsolicited spam emails.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<b></b>Derivative source - <a data-mce-href="http://en.wikipedia.org/wiki/Backdoor_(computing)" href="http://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" title="Wikipedia/Backdoors">Wikipedia/Backdoors</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="bhos"></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Malicious BHOs (Browser Helper Object)</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A Browser Helper Object (BHO) is a plugin used to add functionality to Microsoft Internet Explorer. Toolbars which can be added to your browser or have the functionality to open PDF files in the browser window are examples of BHOs. As BHOs have unrestricted access to Internet Explorer it is no wonder that malicious BHOs have been written to take advantage of the security flaw. BHOs have the ability to make <b>visible</b> and <b>invisible</b> changes to Internet Explore. <b>Visible</b> changes may include the addition of a toolbar to your browser window or redirection to pages containing adverts (A form of adware). <b>Invisible </b>BHOs could record the keystokes on the user’s keyboard (A keylogger) whenever it detects that the user is on a financial institution’s website. This is done in an attempt to steal the user’s passwords with the aim of stealing the user’s money.Since this form of malware has become apparent, Microsoft have included an “add on manager” to their browsers from Microsoft Internet Explorer 6 onwards.Derivative source - <a data-mce-href="http://en.wikipedia.org/wiki/Browser_Helper_Object" href="http://en.wikipedia.org/wiki/Browser_Helper_Object" target="_blank" title="Wikipedia/Browser_Helper_Object">Wikipedia/BHOs</a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="dialers"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Dialers (Malware)</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Although not a problem for broadband internet connections, a dialer is a form of malware which affects computers connected to the internet via an analogue modem or has an active telephone line connected to their computer by other means.Dialers from a malware perspective take advantage in security flaws in operating systems to make outbound phone calls to premium rate numbers without the user knowing. If the user is aware of a dialer making the call or initiated the call, it is likely that there has been very little or no mention of the costs incurred.Dialers can be recognised by the following:</div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li><i>“A download popup opens when opening a website.</i></li>
<li><i>On the website there is only a small hint, if any, about the price.</i></li>
<li><i>A download starts even if the cancel button has been clicked.</i></li>
<li><i>The dialer installs as default connection without any notice.</i></li>
<li><i>The dialer creates unwanted connections by itself and without user interaction.</i></li>
<li><i>The dialer does not show any notice about the price (only few do) before dialing in.</i></li>
<li><i>The high price of the connection is not being shown while connected</i></li>
<li><i>The dialer cannot be uninstalled, or only with serious effort.” - Quotation Source – <a data-mce-href="http://en.wikipedia.org/wiki/Dialer" href="http://en.wikipedia.org/wiki/Dialer" target="_blank" title="Wikipedia/Dialer">Wikipedia/Dialer</a></i></li>
</ul>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li>Another obvious way of recognising that you may have a dialer installed on your computer is by receiving very high phone bill or by noticing unknown numbers on your itemised billing.</li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source – <a data-mce-href="http://en.wikipedia.org/wiki/Dialer" href="http://en.wikipedia.org/wiki/Dialer" target="_blank" title="Wikipedia/Dialer">Wikipedia/Dialer</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="fraudtools"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Fraudtools</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Fraudtools pretend to be a well known and trusted software application (most likely masquerading as a free antivirus) to steal data or money. Fraudtools often also include adware.They way a fraudtool pretending to be a “free” antivirus (Also known as Rouge Security Software) works is by performing a fake antivirus scan of your electronic device and then pretending that malware has been found. The fraudtool then prompts for a credit card payment to be processed in order to buy the paid-for full version of the <i>antivirus</i> which doesn’t actually exist so that the fake malware can be removed. The user is then charged for a product that they don’t receive or worse yet, the user’s credit card information is stolen.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source – <a data-mce-href="http://en.wikipedia.org/wiki/Fraudtool" href="http://en.wikipedia.org/wiki/Fraudtool">Wikipedia/Fraudtools</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="keyloggers"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Keyloggers (Malware)</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A Keylogger records the keystokes on the user’s keyboard without the user’s knowledge. The “log” is then transferred to the malware writer or their associate’s computer where the key stokes can be “harvested” for passwords. The most common form of Keyloggers can be found in Trojan Horses and some computer viruses.As sifting through lines and lines of keystrokes can be tedious, many keyloggers are designed to only become active when they sense that the user is on a financial institution’s website so that that they may steal the user’s online banking passwords. Once the password has been stolen, the fraudster will have access to the user’s bank account and be in a position to steal the user’s money.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
There a numerous methods that keyloggers work. They could be software based, hardware based or even involve acoustic analysis (The sound that each keystroke makes and be analysed and deciphered). From an antivirus point of view, only <b>software based keyloggers</b> can be detected.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
As well as recording your keystrokes and recording it as computer code, some malware take screenshots of what the user is doing (known as screen-logging) and transmits images of the screenshots taken back to the malware creator or associate.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
This post was written with the lay-man in mind and the technical jargon associated with the applications and methodology of keylogging is beyond the scope of this article. If you would however like to know more about keyloggers, please visit <a data-mce-href="http://en.wikipedia.org/wiki/Keylogger" href="http://en.wikipedia.org/wiki/Keylogger" target="_blank" title="Wikipedia/Keylogger">Wikipedia/Keylogger</a>.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source: <a data-mce-href="http://en.wikipedia.org/wiki/Keylogger" href="http://en.wikipedia.org/wiki/Keylogger" target="_blank" title="Wikipedia/Keylogger">Wikipedia/Keylogger</a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="spyware"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Spyware</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Spyware is a form of malware which serves to gather personal information on the user’s electronic device without their knowledge or consent. Spyware can also take control over certain aspects and applications on a person’s computer. It is often installed on the electronic device by “piggy backing” on a legitimate application which the user installs or through infected websites.The most common use of spyware is to track a user’s Internet browsing habits and in turn serve up targeted pop-up ads or redirecting Web browsers based on those habits. More malicious forms of spyware may install keyloggers on the user’s system in an attempt to steal passwords; be it to hack into email accounts or even steal internet banking logins.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Spyware can be classed into four types:</div>
<ol style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li>System Monitors</li>
<li>Trojan Horses</li>
<li>Adware</li>
<li>Tracking Cookies</li>
</ol>
<b>Infection Methods</b><br />
<b><br /></b>
<br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Unlike a computer virus or a worm, spyware does not usually make an attempt to duplicate itself to other computers but rather use deception techniques to infect the user’s computer. Spyware is commonly coupled to genuine software by the spyware author/user and then installed along with this genuine software in the background without the user’s knowledge.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
The other main way that spyware may infect a user’s device is through the use of a Trojan Horse Insrt hyper. When the user visits a webpage or uses an online application infected by a Trojan Horse, the spyware is automatically downloaded onto the user’s system without their knowledge. This is known as a <i>drive-by download</i>.</div>
<h6 style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 0.75em; line-height: 19px; text-align: start;">
<b>Signs of Spyware Infection</b></h6>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Spyware infections are normally not limited to single infections but they rather hunt in packs for maximum effectiveness and to evade antivirus software. When a user inadvertently downloads spyware they may download various different types of spyware at once. This may result in a dramatic slowdown on the user’s electronic device.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Signs of a potential spyware infection may include:</div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li>Increased CPU activity, disk use and network traffic<b></b></li>
<li>Application freezing and/or crashes<b></b></li>
<li>Unexpected system reboots or failure to boot<b></b></li>
<li>Inability to connect to the internet<b></b></li>
<li>Slow user experience<b></b></li>
<li>Inexplicable application behaviour</li>
<li>Windows installation problems</li>
<li>Antivirus and/or firewall deactivation</li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
For more information, please visit the Derivative source – <a data-mce-href="http://en.wikipedia.org/wiki/Spyware" href="http://en.wikipedia.org/wiki/Spyware">Wikipedia/Spyware</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="trojan horses"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Trojan Horse (Malware)</b></h4>
<div class="mceTemp" style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A Trojan horse is a form of malware which grants unauthorised access to a user’s computer system. Trojan horses are currently the most common form of malware in the world. Trojan horses are not self-replicating like a computer virus or worm and are often classed as a form of Spyware. Just like the Trojan horse from Greek mythology, the Trojan horse in malware terms pretends to be something beneficial like a free screensaver or be embedded on a site that offers free software.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
When the user visits a webpage or uses an online application infected by a Trojan horse, the malware is automatically downloaded onto the user’s system without their knowledge. This is known as a <i>drive-by download</i>. Trojan horses are normally controlled by hackers who wish to obtain remote access to your computer system to steal data or cause system damage. Hackers may also turn your computer into a “zombie” or “slave” device, allowing the hacker to use your computer’s resources to commit fraud anonymously.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<b>Purposes of Trojan horses</b></div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li><i>“Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)</i></li>
<li><i>Crashing the computer</i></li>
<li><i>Computer running slow</i></li>
<li><i>Blue screen of death</i></li>
<li><i>Take over computer</i></li>
<li><i>Electronic money theft</i></li>
<li><i>Data theft (e.g. retrieving passwords or credit card information)</i></li>
<li><i>Installation of software, including third-party malware and ransomware</i></li>
<li><i>Downloading or uploading of files on the user's computer</i></li>
<li><i>Modification or deletion of files</i></li>
<li><i>Keystroke logging</i></li>
<li><i>Watching the user's screen</i></li>
<li><i>Viewing the user's webcam</i></li>
<li><i>Controlling the computer system remotely</i></li>
<li><i>Anonymizing internet viewing” Quotation Source – <a data-mce-href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)" href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)" target="_blank" title="Wikipedia/Trojan_Horse">Wikipedia/Trojan horse</a></i></li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source – <a data-mce-href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)" href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)" target="_blank" title="Wikipedia/Trojan_Horse">Wikipedia/Trojan horse</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="worms"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Worms</b><b> (Malware)</b></h4>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Computer worms are a computer program designed to replicate themselves and spread to other electronic devices on a computer network. The difference between a worm and a computer virus are that computer viruses “piggyback” on other applications whilst worms are normally a standalone computer application.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Worms spread by exploiting security flaws on computer networks; either by exploiting common network flaws or my making use of backdoors hyper created by other worms or malware. Most worms don’t really have a purpose other than to replicate and spread themselves which can cause network disruption. However, some worms can carry <b>payloads</b>. A <b>Payload </b>is code that has been added to the worm in order to perform functions beyond just replicating and spreading themselves. A payload may delete files or install backdoors which can be exploited by other malware.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source – <a data-mce-href="http://en.wikipedia.org/wiki/Computer_worm" href="http://en.wikipedia.org/wiki/Computer_worm" target="_blank" title="Wikipedia/Worms">Wikipedia/Worms</a><br />
<a class="mceItemAnchor" href="https://www.blogger.com/blogger.g?blogID=5520215232255617504" name="rootkits"></a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<h4 style="text-align: center;">
<b>Rootkits (Malware)</b></h4>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
A rootkit is a piece of software with administrative system privileges which can hide certain processes or programs on the user’s electronic device. Rootkits can get on a user’s system either by automatic installation via a worm hyper or directly by a hacker with administrative privileges. Rootkits are difficult to remove from your system and can cause complete system failure resulting in the need for your entire operating system to be re-installed.<b>Uses of Rootkits</b></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Common ways rootkits are used without the user’s knowledge:</div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li>Provide an attacker backdoor access to a user’s computer system in order to bypass passwords. The hacker then uses this unauthorized access to steal or modify user data.</li>
<li>Hide other malware from regular detection methods.</li>
<li>Turn the user’s device into a “zombie computer” in order to commit fraud anonymously</li>
<li>The enforcement of Digital Rights Management <a data-mce-href="http://en.wikipedia.org/wiki/Digital_rights_management" href="http://en.wikipedia.org/wiki/Digital_rights_management" target="_blank" title="Digital Rights Management">(DRM)</a></li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Sometimes however rootkits are voluntarily installed on a system by the user themselves to bypass copyright laws or break social rules:</div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li>Hide the fact that a user is cheating on an online games.</li>
<li>The detection of other rootkits.</li>
<li>Bypass copyright management software to make pirated copies of copyrighted material like software, music or movies (And other video based media)</li>
<li>Bypass product license key activation.</li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
One positive reason for a user to voluntarily install a rootkit on their device is for theft prevention. For example, if a user’s laptop is stolen they may access their stolen laptop via the rootkit to delete any confidential information.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<b>Ways to detect Rootkits</b></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Because rootkits have administrative-level permissions they can hide their existence on a user’s device. Special, often complicated, methods have been created to detect rootkits:</div>
<ul style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<li><em>"Alternative trusted medium</em></li>
<li><em>Behavioural-based</em></li>
<li><em>Signature-based</em></li>
<li><em>Difference-based</em></li>
<li><em>Integrity checking</em></li>
<li><em>Memory dumps" - Quotation source <a data-mce-href="http://en.wikipedia.org/wiki/Rootkit#Detection" href="http://en.wikipedia.org/wiki/Rootkit#Detection" target="_blank" title="Rootkit Detection">Wikipedia/Rootkits</a></em></li>
</ul>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Descriptions of these rootkit detection methods are beyond the scope of this article. If you would like to read more, please visit: <a data-mce-href="http://en.wikipedia.org/wiki/Rootkit#Detection" href="http://en.wikipedia.org/wiki/Rootkit#Detection" target="_blank" title="Rootkit Detection">Wikipedia/Rootkits</a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
Derivative source – <a data-mce-href="http://en.wikipedia.org/wiki/Rootkit" href="http://en.wikipedia.org/wiki/Rootkit" target="_blank" title="Rootkits">Wikipedia/Rootkits</a></div>
<hr style="color: #333333; cursor: default; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;" />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: start;">
<a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license"><img alt="Creative Commons License" data-mce-src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" data-mce-style="border-width: 0;" src="http://i.creativecommons.org/l/by-sa/3.0/80x15.png" style="border: 0px; cursor: default;" /></a><br />
The above definitions are licensed under a <a data-mce-href="http://creativecommons.org/licenses/by-sa/3.0/" href="http://creativecommons.org/licenses/by-sa/3.0/" rel="license">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>.</div>
Anonymoushttp://www.blogger.com/profile/00275516761682713432noreply@blogger.com3