Hacker Community

Would you like to know the success stories of legendary hackers. This blog will discuss the final trick hackers. And prevent hacker attacks?

Wicked Code / Destroyer (Malicious Codes)

Definition

Malicious code / destroyer (malicious codes or abbreviated malcodes) is defined as all kinds of programs, macros or scripts that can executed and created with the purpose of damaging computer systems. Therefore, bugs that accidentally created by programmers, not included in this category. But for the bug really disturbing, many people categorizes as malcode.

Previously used the term "Malware (= Malicious Software)" is intended to malcode. But the term is too weak and narrow, so that bogus e-mail / lie that in fact is not the software can not be included in this group. Therefore, the term used malcode, not malware.

Classification

Malicious code can be classified into 3 types of groups: viruses, worms and Trojan Horses, and some programs that have bugs.

Virus

The virus has a nasty ability to reproduce themselves and consists of a collection of code that can modify the target code is running, or it can also modify the internal structure of the target code, so that the target code before running forced to run a virus.

Viruses are often display undesirable message, destroy the layout display, delete the C-MOS memory, destroying the information in the hard disk, etc.. The effects of the virus develop serious enough lately.

Examples of viruses: Brain, Ohe half, Die Hard, XM / Laroux, Win95/CIH

The virus still can be subdivided into several categories:

1.Boot Virus: If the computer is turned on, the initials on the boot sector program will be executed. Virus in the boot sector virus called the boot.
2.File Viruses: File virus is a virus that infects executable program. Reported that nearly 80% of the virus is a virus file.
3.Multipartite Virus: A virus that infects both boot sector and file.
4.Macro Virus: Recently discovered. The target is not executable programs, document files such as Microsoft Excel or Word. He will start when the program infects the application to read documents that contain macros.

Worm

Worm directed to a program that copies itself into the computer memory ONLY. Fundamental differences from the worms and viruses are, whether infected or not the target code. The virus infects the target code, but the worm does not. Worm ngendon only in memory.

Worm was originally found in large computer (the 1970s), and recently it was found in small computers like the PC. Especially since 1999, which work much e-mail circulated through the media.

Example worm: I-Worm/Happy99 (Ska), I-Worm/ExploreZIP, I-Worm/PrettyPark, I-Worm/MyPics..

Trojan Horse

Trojan Horse produced with evil purpose. In contrast to viruses, Trojan horses can not produce themselves. In general, they were taken by other utility programs. Utility programs contain himself, or a Trojan Horse itself to "flourish" as the utility programs.

Example Trojan Horse: Win-Trojan/Back Orifice, Win-Trojan/SubSeven, Win-Trojan/Ecokys (Korean)

Trojan horses can still be subdivided into:

1.DOS Trojan Horse: Trojan Horse that runs in DOS. He slowed computer or delete files on a given day or situation.
2.Windows Trojan Horse: Run the Microsoft Windows system. Number of Windows Trojan Horse increased since 1998 and used as a hacking program for the evil purpose that can collect information from internet connected computer.

0 comments:

Post a Comment