PDA

View Full Version : Computer Viruses. (The Guide).



Zokoli
08-06-2009, 06:35 PM
A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.

Keystroke logging/Keylogger.
Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware- and software-based to electromagnetic and acoustic analysis.

Remote Administration Tool/RAT
A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:


Screen/camera capture or control
File management (download/upload/execute/etc.)
Shell control (usually piped from command prompt)
Computer control (power off/on/log off)
Registry management (query/add/delete/modify)
Other product-specific function



List of Computer Viruses.
http://en.wikipedia.org/wiki/List_of_computer_viruses_(A-D)
http://en.wikipedia.org/wiki/List_of_computer_viruses_(E-K)
http://en.wikipedia.org/wiki/List_of_computer_viruses_(L-R)
http://en.wikipedia.org/wiki/List_of_computer_viruses_(S-Z)


Protection
To protect your computer from viruses, or any of the above you can do the following things:


Install Anti-Virus Software. (Check at the bottom for my set up).
Don't accept suspicious files.
Don't go to websites that may be suspicious and may have an auto-downloader on.


My Setup.
Here is my setup, pretty simple really but also pretty effective.

avast! Home Edition
Spybot - Search & Destroy
Both of these software, are free!
Links:

avast! Home Edition
http://www.avast.com/eng/download-avast-home.html

Spybot - Search & Destroy
http://www.safer-networking.org/en/mirrors/index.html




Enjoy my guide, and stay safe!

Stephen!
08-06-2009, 06:38 PM
Most of it copied and pasted from wikipedia.

Zokoli
08-06-2009, 06:40 PM
But also very helpful.

omgDAN!
08-06-2009, 07:21 PM
Yes but you should give credit and show sources.

Tim.
08-06-2009, 07:27 PM
Enjoy my guide, !

At no point did you make reference to it being c+p'd off wiki, and im pretty sure you would have taken full credit if someone had invited you to. anyone can wiki 'viruses'

Zokoli
08-06-2009, 07:49 PM
Tim, I don't really care? :eusa_danc

Recursion
08-06-2009, 07:58 PM
State your sources. To be honest, as useful as it may be, I don't think people really need this guide, simple Google searches would pull this info up from the original source, a.k.a Wikipedia. :/

GommeInc
08-06-2009, 08:02 PM
Not really necessary to be honest...

lick
08-06-2009, 08:09 PM
Even if it is not needed, theres no need to be all geeky and have a fit "omg u copyd and pasteded from wiki!!!!! this can be found on da googles omg!!"

Mentor
08-06-2009, 08:34 PM
Its somewhat inaccurate and doesnt really elaborate on anything enough to be of any real use o.0 Also dont really get the focus on keyloggers / Remote admin tools ether, without even making reference to the fact in most cases these are not malware in any form o.0

Maybe do some research rather than copying out of context chunks of other sites ?

Zokoli
09-06-2009, 05:30 AM
Who ever -repped me, leave your name next time. :$

Tim.
09-06-2009, 03:39 PM
Tim, I don't really care? :eusa_danc

Well i do, its plagiarism and its people like you that seriously annoy me. Also its a forum, so obviously people will have opinions on you stealing things from sites without giving credit

Want to hide these adverts? Register an account for free!