Difference Between Computer Virus, Trojan and other

03 Jun

0 Comment

Good Day Mate..

Today im gonna post the difference between lot of program that design to do bad thing to other computer, like computer viruses. lot of people said when they computer got infected : "My computer got infected by virus!" when actually it's not virus that infected them but trojan, does it different? of course... different the infection type makes the solution different too.

Worm
The worm is a type of virus does not infect other programs.
He made copies itself and infects other computers (usually using a network connection) but does not associate itself with other programs, but a worm can alter or destroy files and programs.

Trojan
Trojan is a replica or duplicate of the virus. Trojan included as a virus because of the nature of unwanted programs and work by itself on a computer. The nature of Trojan is a control computer automatically. For example, accessible computer trojan email. Trojan included in Rats (remote access trojans), where a computer controlled by a particular program, even some open-enabled computer for trojans can be entered by computer and accessed remotely.

Backdoor
Backdoor or "back door", the security of computer systems, refers to mechanisms that can be used to access the system, application, or network, apart from a common mechanism used (through the logon process or other authentication process). Also referred to as a back door.

Backdoor was originally created by computer programmers as a mechanism that allows them to gain special access to their programs, often used to justify and improve the code in the program that they created when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmer to make a program the login process in 1983 when it received the Turing Award), in addition to the login program is commonly used in UNIX operating system using C programming language, so that he can access UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect themselves from detection and disposal of the system, even if the user finds it, because it makes her own backdoor again (do recompiling itself).

Some software developers add a backdoor into a homemade program for the purpose of destroying (or suspicious purposes.) For example, a backdoor can be inserted into the code in an online shopping site (e-commerce) to allow the developer to obtain information on transactions that occur between buyers and sellers, including the credit card.

Backdoor term now used by hackers to refer to a mechanism that allows a hacker to access the system back to a system that has previously attacked without having to repeat the process of exploitation of the system or network, as he did the first time. Generally, after a network has been attacked by using exploits (against an insecurity / vulnerability), an attacker would cover all his tracks in the system concerned with modifying the file system records (logs) or delete it, and then install a backdoor in the form of a software special or adding a user account that has permissions as the network administrator or the administrator of the system. If the then owner of the network or system is aware that the system has been attacked, and then close all the known vulnerabilities in the system (but do not detect any installed backdoor), previously a striker who will still be able to access the system in question, without getting caught by the owner of the network, let alone after he enrolled as a legitimate user on the system or network. By having the right as a network administrator, he was able to do things that can damage the system or remove the data. In cases like the above, a commonly used way is by doing a reinstallation of the system or network, or by doing a restoration of the backup / backups that are still clean from the backdoor.

There are some devices that can be used to install a backdoor, like some Trojan horses, but the popular ones are netcat, which can be used in Windows or UNIX operating system.

Malware
"Malware" is a computer program that was created with the intent and main purpose of the software looking for weaknesses. Malware is generally created to break or damage any software or operating system.
Examples of malware is a virus, worm, Wabbit, Keyloggers, Browser Hijacker, Trojan Horse, Spyware, Backdoor, Dialer, Exploits and rootkits.

Spyware
Spyware is software that collects and sends information about the user's computer without being noticed by the user.
More information can be which is not too dangerous, such as patterns of computing, especially the surf, until a dangerous person, such as credit card numbers, PIN for electronic banking (e-banking) and an account password.
Information about surfing patterns, has been mentioned, not too dangerous. Sites visited, information that is often sought, chat in the chat room will be spied upon by the spyware.
Furthermore, the information is used to display ads that are usually in the form of pop-up window. The ads relate to someone surfing habits. For example, often times a person seeking information about digital cameras. Pop-up window that appears will show, for example sites that trade digital camera. Adware is a term for this spyware.
The spread of spyware similar to Trojan. For example, FlashGet. When used yet registered FlashGet, FlashGet act as spyware. Try it yourself connecting to the internet, run FlashGet who have not registered, ignore the computer for a while, certainly the internet explorer window pops up that displays the advertisement of a site.

In anticipation of computer viruses are increasingly raged, make sure your computer is always protected with antivirus software up to date ..