Thursday, December 01, 2005
Virus, Worm, Spyware and Security Measures
INDEX
Virus & Worm
Spyware
Security Measures
Virus & Worm
They are malicious programs aimed at demolitions of software and data in PC.
(1) Viruses come with other software programs or data, such as e-mail by parasitizing them.They activates themselves by user's action, for example, installing parasitized software program or opening parasitized e-mail.They seem just virus of disease in the Real-world.
(2) Worms don't need to parasitizing other things nor to be activated by any user's actions.They act independently and may come into your PC if it is online.After break-in, they grub up your PC data and software programs, chomp chomp.....just like worms in the Real-world.
Spyware
<-Prehistory->
There had been so-called adwares which operate with the intent of advertisement. Worse adwares using such script programs emerged, "Spyware".
<-They get activated when..->
(1) connecting to web site embedded adware.
(2) installing suspicious free-software embedded adware by maker to recover costs.
<-They..->
(1) set up unasked-for pop up advertisement windows.
(2) investigate and collect personal data in PC.
<-Here are some issues reported in the following...->
(1) At the moment connected to the web site, many windows opened, no operation occured, e-mail software activated itself, PC made a phone call abroad without asking,even system demolition happened. ----- It seems to have been caused by "Browser Crusher".
(2) Browser's homepage was written over to adult website. ----- Damage from spyware's rewriting browser setup and configuration.
(3) Every bookmark was rewrited to adult website. ----- Damage from spyware's rewriting browser setup and configuration.
(4) Oneday someone had taken advantage of online bank at the net-cafe and after several days he worked out that there had been no funds in his account. ----- crime by using one of the spywares, so-called "Keylogger". Criminal had already setup keylogger program in PC at the net-cafe.
"Keylogger" collected data of account number and PIN-code automatically.
Later, criminal removed victim's property entirely from his account to criminal's account.
In addition, Trojan horse type keylogger sends collected data automatically to designated e-mail address.
Security Measures
<-Check 1->
Download security updates, service packs, PowerToys, and more for Microsoft Windows.
⇒Windows (Security & Updates)
<-Check 2->
It's worth looking around other browsers.
Actually, most major Internet Explorer browsers are targeted by malicious attacks mainly.
You might have heard cutting-edge browser "Firefox". They say, The award-winning Web browser is better than ever. Browse the Web with confidence - Firefox protects you from viruses, spyware and pop-ups. Enjoy improvements to performance, ease of use and privacy. It's easy to import your favorites and settings and get started.
<-Check 3 - etc->
(1) Take advantage of some famous software to deter menace
posted by declan at 1.12.05