A history and the characteristics of malicious computer viruses

Our blog will provide the relevant information on free tools, techniques, and approaches to recover your computer and get your valuable data back. Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

A history and the characteristics of malicious computer viruses

Computer virus A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action such as destroying data. Trojan horse computing A Trojan horse is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it.

A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.

Malware - Wikipedia

Although their payload can be anything, many modern forms act as a backdoorcontacting a controller which can then have unauthorized access to the affected computer. Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.

Rootkit Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user.

Rootkits can prevent a harmful process from being visible in the system's list of processesor keep its files from being read. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system: Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds.

The only way to kill both ghosts was to kill them simultaneously very difficult or to deliberately crash the system.

Backdoor computing A backdoor is a method of bypassing normal authentication procedures, usually over a connection to a network such as the Internet. Once a system has been compromised, one or more backdoors may be installed in order to allow access in the future, [33] invisibly to the user.

The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world.

This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time.

The fourth most common evasion technique is done by obfuscating internal data so that automated tools do not detect the malware. A survey on stegomalware was published by Cabaj et al.

Vulnerability computing In this context, and throughout, what is called the "system" under attack may be anything from a single application, through a complete computer and operating system, to a large network.

Various factors make a system more vulnerable to malware: Security defects in software[ edit ] Malware exploits security defects security bugs or vulnerabilities in the design of the operating system, in applications such as browsers, e.

Security advisories from plug-in providers announce security-related updates. Secunia PSI [47] is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it.

A history and the characteristics of malicious computer viruses

Malware authors target bugsor loopholes, to exploit. A common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied.

Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines.

Insecure design or user error[ edit ] Early PCs had to be booted from floppy disks.

Copyright 2002 by Ronald B. Standler

It was common to configure the computer to boot from one of these devices when available. Normally none would be available; the user would intentionally insert, say, a CD into the optical drive to boot the computer in some special way, for example, to install an operating system.Sep 04,  · Computer Viruses are actually just one type of malware, a self-replicating programs designed to spread itself from computer to computer.

A virus is, in fact, the earliest known malware invented. The following is a history of some of the most famous viruses and malware ever:3/5(4). The part of the data transmission that could also contain malware such as worms or viruses that perform the malicious action: deleting data, sending spam, or encrypting data.

While packet headers indicate source and destination, actual packet data is referred to as the "payload." A computer virus is a type of malware that propagates by. A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.

When this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Introduction This essay contains a description of several famous malicious computer programs (e.g., computer viruses and worms) that caused extensive harm, and it reviews the legal consequences of each incident, including the nonexistent or lenient punishment of the program's author.

Mar 28,  · Little by little, viruses started adapting to this new situation until the appearance, in , of Melissa, the first malicious code to cause a worldwide epidemic, opening .

Table of Contents

Sep 04,  · Computer Viruses are actually just one type of malware, a self-replicating programs designed to spread itself from computer to computer. A virus is, in fact, the earliest known malware invented. The following is a history of some of the most famous viruses and malware ever:3/5(4).

Computer Virus | attheheels.com