The following is a list of 20 txt files containing articles about Malware. These articles can be used as ideas for modifying articles or reposting. Some snippets of file contents have been shown under the title.
You can download all these files at once in 1 zip file for free on this page.
1. Adware Overview
.....
Adware is advertising delivered directly to your computer. Generally, a program puts ads on the screen at some regular interval. In some cases, this program can be installed without the user's knowledge, but not always. Many programs clearly state on install that "this program is supported by advertising, and if you turn off the advertising, you also shut down the program."
Adware tends to be a "grey area" in the malware family. Yes, it can run without the user's knowledge, and yes, it can bog down the system (especially when the adware program goes online to retrieve new ads to display). At the same time, adware is generally more open about what it does, giving the user the choice to install the program the adware is attached to.
.....
2. Backdoor Programs
.....
It’s the ultimate nightmare for a computer user—the idea that someone outside the computer can take over. The official “technical” term is Remote Administration, but hackers are more likely to use the word Backdoor.
With Windows XP, remote administration comes pre-installed. Windows XP has an option called Remote Assistance, where an XP technician can “remote in” and take over your computer. The remote tech has as much control over your system as if he was sitting there at the keyboard.
.....
3. Denial Of Service Attack
.....
Imagine a group of junior high school kids who decide to play a prank on their least favorite teacher. They agree that they will all call the teacher’s phone, as quickly as they can dial, non-stop, until he unplugs the phone in frustration.
When this happens using the Internet rather than telephones, it’s called a Denial of Service attack. Such attacks are designed to either keep the target system so busy handling the attack that it can’t get anything else done, or to overwhelm it into shutting down completely.
.....
4. Drive By Downloads
.....
You’re surfing the Web, enjoying a quiet afternoon, when a window pops up on the screen. “New Windows Antivirus Update Available,” it says. “Would you like to update your system?” You get “Yes” and “Cancel” buttons at the bottom.
It looks like a real, honest-to-goodness Windows message, right down to the logo in the corner. Should you click Yes, or Cancel?
.....
5. Firewalls And Proxies
.....
In building construction, a firewall is a structure designed to contain building fires. For example, an attic crawlspace that covers the entire length of the building would allow a fire to roar from one end of the building to the other. Breaking up the crawlspace with non-flammable walls helps to slow the spread of a fire.
Network firewalls have a similar function. A firewall is a network security system, either a program or an actual device, that breaks up a network to contain viruses and hackers.
.....
6. History Of Computer Viruses 1989 1999
.....
Robert Morris’s Internet Worm of 1988 was the biggest news in virus history for several years. Until 1992, most virus news was much quieter.
In 1989, for example, Ghostball was released. This was the first virus able to attack different kinds of targets. Before Ghostball, viruses were classified by their attack, like “file infector” or “boot sector virus.” Ghostball was the first Multipartite virus, because it could follow several attack patterns.
.....
7. History Of Computer Viruses Since 2001
.....
After the flurry of viruses that haunted 2001, 2002 was amazingly quiet. Unfortunately, 2003 took off again.
January saw the SQL Slammer worm infect over 75,000 systems in about ten minutes. It attacked a flaw in Microsoft’s SQL Server, and basically slowed down the entire Internet.
.....
8. History Of Computer Viruses To 1989
.....
Science fiction writer David Gerrold wrote “When H.A.R.L.I.E. Was One” and published it in 1972. In it, a computer program called “VIRUS” spreads from computer to computer, before it is finally killed by another program, appropriately called “VACCINE.” Just like communication satellites, moon landings, and waterbeds, science fiction predicted the future.
The first program to actually spread from one computer to another appeared around the same time. The Creeper virus infected a system across the Arpanet, the network of computers that eventually became the Internet we know today. Interestingly enough, the Reaper program designed to kill the Creeper virus was also a virus.
.....
9. History Of Viruses 1999 Through 2001
.....
The Melissa virus was the big story of 1999. Named after a lap dancer, Melissa was the first major emailing virus. Upon infection, it used Microsoft Outlook to send copies of itself to the first fifty names in the address book. March, 1999, saw it spread across the Internet, clogging up email servers everywhere it went.
1999 was a busy year, with the ExploreZip virus appearing in Jerusalem in June. This one had a fake Zip file attached called "Zipped_Files.EXE." If the user double-clicked the file, it would put up a fake window saying "sorry, this zip file is corrupt." It would then go on to email everyone in the address book, and follow that by destroying documents and files on the hard drive.
.....
10. Home Page Hijacking And Browser Helper Objects
.....
Internet Explorer has a way for a website to add itself to the list of favorites. It’s a feature Microsoft added so that websites can have a button that says “Bookmark This Site! Just Click Here!”
Now, if that’s all that particular feature did, then there wouldn’t be any malware concerns over it. Unscrupulous programmers have taken advantage of it to create Home Page Hijackers.
.....
11. Legitimate Adware
.....
There are plenty of reasons why malware is "bad." Are there any times when malware is valid and legal?
Many shareware programs today come bundled with adware. The premise is this: If you try out the program, and enjoy it, you'll buy it. Until you pay for it, the programmer is paid through the advertising that the shareware program displays. If the user somehow kills or removes the advertising, then he is also obligated to remove the program that was supported by the ads.
.....
12. Macro Viruses And The Melissa Virus
.....
Microsoft thought it was doing it’s customers a favor by adding a programming language to Microsoft Word. In terms of customer service, it was a great idea, because it would allow users to automate and program within their documents. For example, when a document opened, it could be programmed to ask the user for details that must be entered into each document, like insurance policy numbers or phone numbers.
Microsoft didn’t count on this programming language ever being used to turn Word documents into virus infectors, but that’s exactly what happened.
.....
13. Robert Tappan Morris And The Internet Worm
.....
Robert Tappan Morris claims he only wanted to measure the size of the Internet, but he didn’t count on the speed and power of his program.
He wrote a virus program that would spread to other computers. He made the program smart; before it infected a new system, it would actually check and see if there was already an active copy running there.
.....
14. Spyware Overview
.....
Imagine a program that watches your computer.
It sits in memory, watching everything the computer does--the websites it displays, the passwords used to get into them, the advertisements that get clicked on. This program silently and secretly gathers all of this information, without the user's knowledge. Then, at some point, it connects to a server somewhere on the Internet, and hands over this collection--again, without letting the owner of the computer know what it's done.
.....
15. The CIH Virus
.....
On April 26, 1999, systems around the world began dying. Something was both damaging information on hard drives and damaging their BIOS chips. Investigation turned up the CIH Virus, later known as Chernobyl because it was released on the anniversary of the Chernobyl reactor explosion.
The CIH virus somehow found it’s way onto a set of IBM Aptiva PC’s sold to Activision in March of 1999. Every copy of their latest game, SIN, came bundled with a bonus copy of the CIH virus.
.....
16. The Michelangelo Virus Hype And Fizzle
.....
The Michelangelo virus was the first real appearance of computer virus hype in the media. Various "experts" made claims about how widespread the virus was and how much damage it was going to do when it triggered.
Michelangelo first hit the news in late January, 1992. A customer noticed that computers from Leading Edge were arriving with the virus pre-installed. The next day, John McAfee is quoted as saying Michelangelo was the third most common virus in the world.
.....
17. The Nimda Virus
.....
One of the most complex and dangerous viruses ever was the Nimda virus, in September 2001. Nimda became the most widespread virus in the world a mere 22 minutes after it was released.
Nimda was as powerful as it was because it knew so many different ways of infecting a system.
.....
18. Virus Hoaxes
.....
“Warning!,” the email screams. “There’s a new virus going around, and Microsoft says it’s the worst one yet!” After this amazing bit of hype, the email continues with “Once this virus infects your system, it will delete all the files on your hard drive, reset your computer clock, and make your screen only show green and black!”
Anyone who has made it this far is then asked to “forward this virus warning to everyone you know!” and “Delete any emails you get with the title “Have a nice day!’
.....
19. Virus Overview
.....
Computer Viruses are one of the biggest "bogeyman" of the Internet, and with attacks by Melissa, ILoveYou, Nimda, and Michelangelo, there are damage estimates and virus warnings all over the Internet. But what are they really?
A virus is a program that spreads to other computers. Like all forms of malware, it both runs without the user's knowledge or permission and it can interfere with other programs that are trying to run on the same computer. Some viruses also carry a payload, like ticking time bombs. On a given date, or after a certain time after the computer is infected, the virus will "trigger." This trigger can damage files, erase drives, or attack other systems over the Internet.
.....
20. Malware Overview
.....
Do you know what goes on under the hood of your car? Do you know the solution for a warning light on the dash? Do you know what's wrong with the car if it starts making strange noises or loses power?
Those same questions can be asked about your computer.
.....
Kegunaan file ini : File ini berguna sebagai referensi atau literatur berbagai praktisi lainnya di bidang Download Articles.
File ini umumnya digunakan kalangan : Praktisi di bidang Download Articles.