07-08-2012, 04:26 PM
Seminar on topic: Malware
Malware.pptx (Size: 4.38 MB / Downloads: 87)
What is a malware ?
A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
Introduction to Malware:
Malware is short form of MALICIOUS SOFTWARE.
Malware is sometimes known as computer contaminant.
It is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
It is a general term used to describe any kind of software or code specifically designed to exploit a computer, or the data it contains, without consent.
Malware is not the same as defective software, that is, software that has a legitimate purpose but contains harmful bugs.
Sometimes, malware is disguised as genuine software, and may come from an official site.
Therefore, some security programs, such as McAfee may call malware "potentially unwanted programs" or "PUP".
You can get infected by malware in several ways.
Malware often comes bundled with other programs (Kazaa, iMesh, and other file sharing programs seem to be the biggest bundlers).
Various Malwares
Virus
Worms
Adware
Spyware
Trojan Horse
Virus is a program to cause damage to computer. A computer virus is malware that can reproduce itself.
Worm is a program which infects the computers which are connected by some network. Worms slow down the network.
Adware are the programs which delivers ads to your computer (generally in POP-UP's form). They consume your network.
Spywares are the program which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal purpose. Example: Keylogger applications.
Trojan is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. [Trojans are also known as Backdoors].
What is Virus?
A computer virus is a computer program that can replicate itself and spread from one computer to another without permission or knowledge of the user.
These definitions lead to the observation that a virus requires user intervention to spread.
Infections transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system, would be classified as viruses.
In order to replicate itself, a virus must be permitted to execute code and write to memory.
For this reason, many viruses attach themselves to executable files that may be part of legitimate programs.
If a user attempts to launch an infected program, the virus' code may be executed simultaneously