Sunteți pe pagina 1din 2

Program

Virus

Worms

Trojans

Illicit
Server

Example of the one or what they do


A virus is a malicious program designed to damage computer
systems, from stand-alone computers to entire networks.
Specifically, a virus is a program that assumes control of system
operations, and damages or destroys data. Viruses are loaded onto
your computer without your knowledge and run without your
consent. All computer viruses are man-made and are often designed
to spread to other computer users through networks or e-mail
address books.
A simple virus can:
Display harmless messages on the screen.
Use all available memory, thereby slowing or halting all other
processes.
Corrupt or destroy data files.
Erase the contents of an entire hard disk
A worm is a self-replicating program or algorithm that consumes
system and network resources. The difference between a worm and
a virus is that a worm automatically spreads from one computer to
another, whereas a virus requires some form of action from an end
user, administrator or program. A worm can reside in active memory
and replicate on the network. Sometimes a worm changes system
files; sometimes a worm deposits a payload, which can be an illicit
server or Trojan. Worms can spread to all computers connected to a
network and are commonly spread over the Internet via e-mail
attachments.
A Trojan is a program that appears to be harmless but actually
produces harmful results. Trojans contain code that produces
malicious or harmful results within applications that appear benign,
such as computer games. Unlike worms and viruses, Trojans do not
replicate themselves or copy themselves to other files and disks. A
Trojan may be spread as part of a computer virus. One of the most
sinister Trojan types is a program that claims to find and destroy
computer viruses, but introduces viruses into your system instead.
An illicit server is an application that installs hidden services on
systems. Many illicit servers, such as NetBus and Back Orifice (a play
on Microsoft's Back Office), are remote control or remote access
programs.
Attackers can use illicit servers to perform malicious operations on
infected computers, such as:
Creating custom startup messages.
Editing the Windows registry files.
Sending messages.
Changing the Desktop display.
Playing sounds.
Switching off the display screen.
Disabling keyboard keys.
Hiding the mouse cursor.

Hiding the taskbar.


Stealing passwords.
Monitoring keystrokes.
Restarting the computer.
Locking up the computer.
Executing applications.
Viewing the contents of files.
Transferring files to and from the computer.

S-ar putea să vă placă și