>Virus Terms Explained – share to friends and keep them safe


> Some people need guidance, We try to help the best we can, but even we can not cure stupid, but we can with the help of our members help , share this and the facebook page and we can finally rid facebook of scammers or at least the stupid people who will not protect their friends


Below are a few computer & Internet related malicious terms that you should familiarized yourself with. Understanding what these terms mean will help you avoid them. Remember that your best defense against any of the terms below is keeping an Up-To-Date Anti-Virus software on your computer. Update it regularly and run full scans with it, at least twice a week. Also remember take care when clicking links or downloading software from the Internet. Read and understand first, then Only download software you can verify 100%. Make sure you know what it does. Ask friends or search for reviews on the particular piece of software. If it looks fishy to you , just navigate away from it.. And if it doesn’t let you navigate away use “CTRL+ALT+DELETE” and kill your browser’s process in your computers task list.. 

Note: Definitions via various online sources.
Malicious computer terms and their definitions: 

Botnet 
Defined – A Botnet is a collection of software agents, or robots, that run autonomously and automatically. The term is most commonly associated with malicious software, but it can also refer to a network of computers using distributed computing software.
  
Internet bots, 
Defined – Internet bots, also known as web robots, WWWrobots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey. In addition to their uses outlined above, bots may also be implemented where a response speed faster than that of humans is required (e.g., gaming bots and auction-site robots) or less commonly in situations where the emulation of human activity is required, for example chat bots.Malicious FunctionsAnother, more malicious use of bots is the coordination and operation of an automated attack on networked computers, such as a denial-of-service attack by a botnet. Internet bots can also be used to commit click fraud and more recently have seen usage around MMORPG games as computer game bots. A spambot is an internet bot that attempts to spam large amounts of content on the Internet, usually adding advertising links.
There are malicious bots (and botnets) of the following types: 
  • Spambots that harvest email addresses from internet forums, contact forms or guestbook pages.
  • Downloader programs that suck bandwidth by downloading entire web sites.
  • Web site scrapers that grab the content of web sites and re-use it without permission on automatically generated doorway pages.
  • Viruses and worms.
  • DDoS attacks.
  • Botnets / zombie computers; etc.
  • File-name modifiers on peer-to-peer file-sharing networks.These change the names of files (often containing malware) to match user search queries.
  • Automating the entry of internet sweepstakes or instant win games to get an advantage.
  • Automating tasks on promotional web sites to win prizes.
  • Bots are also used to buy up good seats for concerts, particularly by ticket brokers who resell the tickets. Bots are employed against entertainment event-ticketing sites, like TicketMaster.com. The bots are used by ticket brokersto unfairly obtain the best seats for themselves while depriving the general public from also having a chance to obtain the good seats. The bot runs through the purchase process and obtains better seats by pulling as many seats back as it can.
  • Bots are often used in massively multiplayer online role-playing games (MMORPG) to farm for resources that would otherwise take significant time or effort to obtain; this is a concern for most online in-game economies.
The most widely used anti-bot technique is the use of CAPTCHA, which is a form of Turing test used to distinguish between a human user and a less-sophisticated AI-powered bot, by the use of graphically encoded human-readable text. Several web sites such as TrueCheaters.com are dedicated to writing bots to help give the members of their community advantages in a variety of things on the internet. 

Malware 
Defined – Slang for “malicious code,” this term was primarily used by computer security programmers. For example, “Certain kinds of malware can be injected into a phone with the intent of destroying its functions.” Regarding the Internet, this term is often heard in conjunction with hackers who use certain kinds of malware to infect computer systems and compromise the way they work. For example, “The hacker was arrested for setting up a botnet which sent out spam and bombard Web sites with massive amounts of data, thus shutting them down.” Software is considered to be malware based on the perceived intent of the creator rather than any particular features.Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several U. S. states, including California and West Virginia.


Computer virus 
Defined – A  software program that replicates on computer systems by incorporating itself into shared programs. Viruses range from harmless pranks that merely display an annoying message to programs that can destroy files or disable a computer altogether. Whether they’re considered malicious or malevolent, all viruses spread rapidly. For example, from one computer to millions of others around the world, infecting machines and causing them to crash. Some well-known examples include the “I Love You” virus, code red, and NIMDA
 Tip: To avoid spreading computer viruses via e-mail, create a contact in your e-mail address book with the name !0000 (an exclamation mark and four zeros) and no e-mail address in the details. This contact will then show up as your first contact. If a virus attempts to do a “send all” to your contact list, your computer will put up an error message saying, “The message could not be sent. One or more recipients do not have an e-mail address. Please check your address book and make sure all the recipients have a valid e-mail address.” The offending message (with the virus) may then be automatically stored in your Drafts or Outbox folder. Go in there and delete the offending message. (This is not a substitute for virus protection software, and it will not protect you from getting a virus, but it will prevent your computer from sending the virus to everyone on your contact list. Note: This trick may not work on AOL.)

Computer worm 
Defined – A computer worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. 

Trojan horse 
Defined – A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user’s computer system. “It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems”, as Cisco describes. The term is derived from the Trojan Horse story in Greek mythology.

Spyware 
Defined – Spyware is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user’s personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Adware 
Defined – Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as keyloggers and other privacy-invasive software.

Scareware 
Defined – Scareware comprises several classes of scam software with malicious payloads, or of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware and adware also use scareware tactics.

Crimeware 
Defined – Crimeware is a class of malware designed specifically to automate cybercrime. The term was coined by Peter Cassidy, Secretary General of the Anti-Phishing Working Group to distinguish it from other kinds of malevolent programs.
  
Rootkit 
Defined – A rootkit is software that enables continued privileged access to a computer, while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. Typically, a hacker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once a rootkit is installed, it allows an attacker to mask his intrusion while gaining root or privileged access to the computer. Although rootkits can serve a variety of ends, they have gained notoriety primarily as malware, appropriating computing resources or stealing passwords without the knowledge of the administrators or users of affectedn systems. Rootkits can target firmware, a hypervisor, the kernel or most commonly, user-mode applications.

written by Mr. Black Knight (Co-admin BDE) Owner  ───► Scam Sniper ◄───

Advertisements

3 Responses to >Virus Terms Explained – share to friends and keep them safe

  1. Trevor McKay says:

    >Excellent article.

  2. >Thanks Trevor, This was written by the owner of http://www.facebook.com/scamsniper who is a co-Admin of our Page and Group

  3. Stone Carlie says:

    >Great information, many people don't realize how important these extra measures can be to make sure their personal information is secure. Theft of information is growing exponentially because of the easy access to constantly updating mal-ware.it is imperative that individuals as well as businesses have proper countermeasures in place. We at Stone Carlie have a new Cybercrime Blog (stonecarlie.com/blog) that focuses on the financial implications and the potentially criminal risks crimeware can present. By keeping your system and all applications up-to-date and implementing cautious browsing and email habits, you can better protect your organization from cybercrime. Check it out!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: