Selasa, 24 Maret 2009

Differences between virus, trojan, backdoor, malware, spyware

Differences between virus, trojan, backdoor, malware, spyware
some of my friends asking the differences between them above..
virusComputer virus is computer program which can duplicate its body and spread. it's spread insert the computer program or another document. Virus computer can be analogyst as a biologist virus which spread and inserting their body into our cell. virus computer can make our data in document broken, make the user of the computer fell disturbed, or doesnt taking any effect.

Commonly computer virus brake our software and can't directly brake our hardware (especially in operating system. like operation windows (Windows 95, Windows 98/98SE, Windows NT, Windows NT Server, Windows 2000, Windows 2000 Server, Windows 2003, Windows 2003 Server, Windows XP Home Edition, Windows XP Professional, Windows XP Servicepack 1, Windows XP Servicepack 2, windows vista) and also GNU/Linux. negative effect of computer virus is when the virus duplicate its body, its decrease the resource of the computer (like memory and CPU time) almost 95% Virus is base on windows operation system. Sisanya 2% attacking Linux/GNU

(and Unix as a source from linux tentunya), 1% atacking Mac especially Mac OS 9, Mac OS X(tiger, Leopard). 2% attacking another sistem operation like FreeBSD, OS/2 IBM, and Sun operating System)

Virus attacks can be prevented by others or by using antivirus software. This type of software can also detect and remove computer viruses, the virus database as long as the computer is owned by the antivirus software already contains the code to remove the virus.

An example is virusnya Worm, Trojan, etc.. Example of a reliable anti-virus and prevent virus is Kaspersky, AVG, AntiVir, PCMAV, Norton, Norman, and McAfee.

Worm

Worm a kind of virus who cannot infect another program. Its make their clone and infect another computer (usually using a network) but it not connecting with another program; but the worm can change or brake the file or program.


Trojan

Trojan is a duplicate or a replica of the virus. Trojan virus entered the program because of the nature of the unwanted and work by itself on a computer. Nature is mengkontrol trojan computer automatically. For example, the computer entered trojan email. Trojan entered in Rats (remote access trojans) where a computer controlled by a particular program, even some trojan work to open the computer that can be entered by computer and diaccess from jauh.Norton, Norman, and McAfee.

Backdoor:

Backdoor or "back door", in the security computer system, refers to mechanisms that can be used to access the system, application, or network, apart from the general mechanism is used (through the logon authentication process or other). Is also called as the back door.


Backdoor initially created by computer programmers as the mechanism that allows them to obtain special access to them in the program, often used to justify and improve the code in the program that they make when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmers to create a login process in 1983 when it obtained Turing Award), other than the login program is used in common UNIX operating system using the C programming language, so that he can access the UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect himself from pendeteksian and disposal of the system, even if the user successfully find it, because the backdoor makes himself again (do rekompilasi own).

Some software developers to add a backdoor in the program for the purpose of buatannya damage (or the purpose of suspicious). For example, a backdoor can be inserted in the code in an online shopping site (e-commerce) to allow the developer to obtain information about transactions that occur between buyers and sellers, including credit cards.


The term now used by the backdoor hacker-hacker to refer to a mechanism that allows the system can access peretas back a system that has been attacked before without having to repeat the process of exploitation of the system or network, as it did the first time. Generally, once a network has been attacked by using the exploit (to a Handling / Vulnerability), an attacker will cover all jejaknya in the system concerned with modifying the file system record (log) or delete it, and then menginstalasikan a backdoor in the form of a software or to add a special user account that has rights to access the network administrator or system administrator.

If the owner and the network or system to realize that the system has been attacked, and then close all Handling is known in the system (but does not detect the existence of the backdoor installed), still before the attacker will be able to access the system, discovered by the owner without the network, especially after registering himself as a legitimate user in the system or network. Have the right as the network administrator, he can do things that can damage the system or remove the data. In cases like the above, a commonly used way is to make re-installation of the system or network, or with the restoration of backup / backup that is still clean from the backdoor. Without having to repeat the previous process of exploitation of the system or network, as it did the first time. Generally, once a network has been attacked by using the exploit (to a Handling / Vulnerability), an attacker will cover all jejaknya in the system concerned with modifying the file system record (log) or delete it, and then menginstalasikan a backdoor in the form of a software or to add a special user account that has rights to access the network administrator or system administrator.

There are some devices that can be used to menginstalasikan backdoor, as well as several Trojan horse, but is popular netcat, which can be used in the operating system Windows or UNIX.

Malware :

"Malware" is a computer program that was created with the purpose and objective search for software weaknesses. Malware is generally created for a break or damage the software or operating system. An example of malware is a Virus, Worm, Wabbit, Keylogger, Browser Hijacker, Trojan Horse, Spyware, Backdoor, Dialer, Exploit, and rootkit.

Spyware:

Spyware is software that collects and sending information about computer users without the user knows that. The information that can not unduly harmful patterns such as berkomputer, especially berinternet, until someone is dangerous, such as credit card numbers, PIN for electronic banking (e-banking) and an account password.


Information on the pattern berinternet, already mentioned, is not unduly dangerous. Sites visited, information was sought, chat in the chat room will be the eyes by the matai-spyware. Furthermore, the information is used to display ads that are usually the form of a pop-up window. Yesterday was related to someone berinternet habits. For example, often search for information about digital cameras. A pop-up window that appears will show, for example, sites that deal in digital camera. Adware is the term for which such spyware. The distribution is similar to spyware Trojan. For example, flashget. When used flashget not diregister, flashget act as spyware. Try just connect themselves to the internet, run the flashget not diregister, computer cuekin some time, certainly the internet explorer a window appears that displays an ad site.

To anticipate many virus on the computer, make sure your computer is always protected with the antivirus up to date ..

1 komentar:

Unknown mengatakan...

Good differences you have shown here. I have read an article of same subject, That is also good. Virus removal tools will secure our PC but choose the best to protect your Valuable PC.