![]() |
| source plimbi |
See also: Malheur Is a Tool For analysis Malware/Checking Infected Malware
Malware into the computer via a computer network security is not good, so it can infect the computer. Malware itself basically consists of some kind. Here are some types of malware.
Computer Viruses
A computer virus is a type of malware most often be found nesting in our computer. A computer virus is a program or Sotware berekstensi or executable or, a software that can be run. Most computer virus is disguised in the form of an application installer, shortcuts, and various types of applications executable extension [.exe format]
A computer virus is actually not dangerous if we do not run the .exe his software. However, we sometimes do not realize that we run is a virus, and the virus eventually attack our computers. One user appropriate steps to prevent computer virus is to install an antivirus and a firewall to protect important data when the computer is connected to the Internet. Because the firewall function is quite an important role in computer networks.
Worm
The worm is malware that has the ability to proliferate like a worm. The worms are one of the animals that can reproduce by splitting themselves and get into the human body with ease.
Just like that, the malware named the worm is able to get into a computer through a weakness or vulnerability of computer networks, which then doubled and reproduce itself inside the computer, and infect your computer slowly to the entire computer.
When your computer is attacked by a worm, then this will act as like a computer viruses, which can trouble you, ranging from slowing down the computer, making the CPU gets hot quickly, and very disturbing your needs in using computers.
Spyware
The types of malware third is spyware. Unconsciously, our computers may also often be penetrated by malware called spyware is. Spyware is a type of malware or unwanted software whose function is spy - spy everything that is done by the user in the computer.
This is very dangerous, especially for those who often keep the interests and personal and confidential information on the computer. Spyware will copy the activities you do and the information you store on the computer to a particular company or person for the benefit of course is not good.
This often happens when surfing on the Internet using a browser, especially if the computer contained a virus and with a browser that is less secure. To that end user must use the best browser that data security be maintained and confidential.
Adware
Viruses, worms and spyware software is usually the poor who will feel the impact when we are already open or execute a certain file or because of the weakness of the Internet and our computer network. however, in contrast with adware that goes into our computer in conjunction with a program that intentionally downloaded.
We as conscious users often do Downloading a wide variety of content for free. But it turns out we did not realize that behind the free content, there is a malware called adware. The need for caution for the user to download content that does not get the virus when get it.
Adware is a program created to insert specific adds addressed for the sake of promotion of a product, service, also the site - the site tetentu, which is sometimes very disturbing existence user. Adware is currently growing very rapidly, in line with the needs and use of the Internet worldwide.
Trojan
Trojan is a legend in mainland Europe there, where a giant horse shows soldiers infiltrated into the kingdom of the enemy, the enemy resulting work unprepared for the attack arrives - these arrived. Just like the legend, malware such as Trojans also provides facilities to the other malware, such as viruses, worms, and so to enter into our computer.
Arguably, the Trojan is one of the entrances to almost all existing malware, so when our computer has been infected with a Trojan, then action should be done immediately, before experiencing attacks by other malware.
Keylogger
You people who like to shop with a credit card? Or you have a very important account, which contains confidential information? Then you have to be careful - careful with malware this one. yes, keylogger is a malware that has the function to record all activities relating to the keyboard keys. So any keyboard key you press, then kelogger will record it, and send that information to those in need.
It would be very dangerous, especially when you need to write down your credit card numbers, passwords or email your personal account, as well as a wide variety of data - data and other important information into your computer, or in a web browser.
Rootkit
For those of you who frequent piracy using keygen, crack, or patches on the program and your application, then be careful - careful of malware this one.
See also :
Checking Rootkit With Chkrootkit
Checking Rootkit With RKhunter
Rootkit is an application or malware that hide in the patch, crack or keygen, which can get into your computer and steal information - important information stored in your computer, and of course very hurt yourself.
Phishing
Phishing is actually not a form of program that you install, but phishing is usually disguised as a site that requires you to enter information about your account, whether e-mail, credit cards, and so on. Phishing is usually made such that shaped much like the original. For example, email. Phishing is made inside the web browser similar to Gmail or Yahoo for example, so that the user believed and wrote his account information into the phishing site.
Similarly, some explanation of the types of malware on computers, so they can minimize cyber crime after the reading of this article.
May be useful and Happy Reading!!! Thanks

Tidak ada komentar:
Posting Komentar