Skip to main content

MALWARES

Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

Malware is defined by its malicious intent, acting against the requirements of the computer user - and so does not include software that causes unintentional harm due to some deficiency. 

Programs supplied officially by companies, can be considered malware if they secretly act against the interests of the computer user.

An example is the Sony rootkit, a Trojan embedded into CDs sold by Sony, which silently installed and concealed itself on purchasers' computers with the intention of preventing illicit copying; it also reported on users' listening habits, and unintentionally created vulnerabilities that were exploited by unrelated malware.

Software such as anti-virus and firewalls are used to protect against activity identified as malicious, and to recover from attacks. The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior.

The term computer virus is used for a program that embeds itself in some other executable software (including the operating system itself) on the target system without the user's consent and when that is run causes the virus to spread to other executables.

On the other hand, a worm is a stand-alone malware program that actively transmits itself over a network to infect other computers. These definitions lead to the observation that a virus requires the user to run an infected program or operating system for the virus to spread, whereas a worm spreads itself.

Malware exploits security defects (security bugs or vulnerabilities) in the design of the operating system, in applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. Sometimes even installing new versions of such plugins does not automatically uninstall old versions. Security advisories from plug-in providers announce security-related updates. 

Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database.

Malware authors target bugs, or loopholes, to exploit. A common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. 

Early PCs had to be booted from floppy disks. When built-in hard drives became common, the operating system was normally started from them, but it was possible to boot from another boot device if available, such as a floppy disk, CD-ROM, DVDROM, USB flash drive or network. It was common to configure the computer to boot from one of these devices when available. Normally none would be available; the user would intentionally insert, say, a CD into the optical drive to boot the computer in some special way, for example, to install an operating system. Even without booting, computers can be configured to execute software on some media as soon as they become available, e.g. to autorun a CD or USB device when inserted.

Malicious software distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add auto runnable code to any USB stick plugged into it. 

Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way. More generally, any device that plugs into a USB port - even lights, fans, speakers, toys, or peripherals such as a digital microscope - can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate.

This form of infection can largely be avoided by setting up computers by default to boot from the internal hard drive, if available, and not to autorun from devices. Intentional booting from another device is always possible by pressing certain keys during boot.

Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments and infected executable files supplied in other ways. 

Comments

Popular posts from this blog

Kishan Lal- First Indian to mint GOLD in Olympics

Kishan Lal (2 February 1917 – 23 June 1980) was an Indian field hockey player. He captained the Indian hockey team in 1948, which won its first gold at the Olympics as an independent country, defeating Great Britain in the final, 4-0. He was the greatest right winger in the history of hockey. He was instrumental in developing the Indian Railways hockey team as one of the best teams in India. A large number of players went on to play for India. He died on 23 June 1980 at Madras. Kishan Lal was India's captain of the hockey team at the 1948 Olympics in London. He was one of the greatest inside forwards in hockey. He is known as the fastest player in wing position He would race down to the goal position once the ball was with him, a thorn in the eyes of the opponent and was a gentleman player. According to Gian Singh, "Many times, I would think he would score but invariable he would pass the ball to inside forwards or the centre forward to do the finishing touch...

KASH- A Story Of Three Friends

This is a story which revolves around 3 friends name "KASH" - Shiva, kunal and Harish(all the characters are imaginary). They are very good friends , they lived away from their family in a city for their studies. Kunal is brilliant in their studies as compared to Shiva and Harish. He also gained good marks in their coaching test and pass all the tests by good ranks but in the case of Shiva and Harish this scenario is totally reverse, they also topped the list but from bottom. They sometime also feel some pressure from their home regarding their marks in test. So, they made a plan to cheat in upcoming test to score good marks so they put all the important things regarding their studies in a plane paper and Kunal who used to be a good student also involve their plan to score better marks and rank.                 On the day of test three of them get ready for their test with all their chits and papers and went to their coaching.After somet...