Skip to main content

Malware

 

Malware

Malware, short for malicious software, refers to a broad category of software specifically designed to harm or exploit computer systems and networks. It encompasses various types such as viruses, worms, trojans, ransomware, and spyware, each with unique functionalities aimed at unauthorized access, data theft, or system disruption. Malware can infiltrate devices through infected files, email attachments, or compromised websites, posing a significant threat to the security and privacy of individuals and organizations alike. 

 

Adware

Adware generates revenue for its author. Its also known as advertising-supported software. Adware covers any software package that automatically shows adverts. It may also be in the user interface of a software package or on an instillation screen. Adware by itself is harmless but sometimes it can include spyware such as key loggers. 

 

Key logger

These can take two forms. They can either be legitimately installed to monitor users or it can be installed maliciously. Key loggers collect information and send it back to a third party. Algorithms are used to monitor keyboard use through pattern recognition. Some key loggers only will collect keyboard strokes into one website or application. Others record all keyboard strokes including any info/data that’s copy and pastes. 

 

Remote access Trojan (RAT)

RATs access and infect digital systems, usually through the internet. There typically installed without the user’s content and stays hidden to avoid detection which allows a hacker to control the device remotely. When a RAT is connected to a digital system the hacker can have access to files and folders, login and personal details or use the connection to download other viruses which can infect other digital systems. 

 

Ransomware

These hold a digital system captive and demands a ransom, which is usually money, to realise it. This can restrict user access to the computer system by encrypting files or locking down the computer system. A message is typically displayed to force the user to pay so the restrictions get lifted and so the user can have access to the computer system and data. It gets spread like a worm and can be started by downloading an infected file or by a vulnerability on the computer system. 

 

Spyware

Spyware can collect data from an infected digital system, including personal info like websites visited, user log ins and financial information. It’s hidden from a user and can be difficult to detect. Its often secretly installed on a user’s personal computer without their knowledge. It can also install additional software or redirect wed bowsers to different websites. some spywares can even change computer settings which may lead to slow internet connection speeds or changes in web browser settings. 

 

Trojan

This is a standalone malicious program designed to give full control of a digital system to another system. Trojans often appear to be which is wanted or needed by the user of a digital system. They can be hidden in valid programs and software. They make copies of themselves, steal information, or harm the hosts digital system. 

 

Virus

A virus attempts to make a digital system unreliable. This program replicates itself and spreads to other computers. They increase the chances to spread by infecting files on a network file system or file system that is accessed by other computers. 

 

Worm

A standalone program that replicates itself so it can spread to other digital systems. These can use a network to spread, and unlike viruses a worm does need to attach itself to a existing program. Worms almost always cause harm to a network, even just by consuming bandwidth. 

 

Comments

Popular posts from this blog

Types of network adapters in virtual box

  Types of network adapters in VirtualBox In VirtualBox there’s multiple types of network adapters that can be used to configure virtual machines for different networking needs. Down below will give you a brief overview of each type. NAT (network address translation) The VM is placed behind a VirtualBox-managed router. This allows the VM to access the external network via the networks host’s IP, but the VM itself remains invisible to the outside. Its most suitable for simple internet access with minimal configuration NAT network This is like NAT, but it allows multiple VM’s to communicate with each other in the same NAT network all while sharing the host’s internet connection. Its commonly used when you want to simulate a small, isolated network of VM’s that can also access the internet. Bridged adapter This VM is connected directly to the physical network as if it is a separate device, it also receives its own IP address from the same network as the host. This is ide...

API's

  API's Types of API's REST API - Representational State Transfer is a commonly used API category that isn’t dependent on a specific protocol. It’s considered a relatively user-friendly API to work with and many developers are experienced in this technology. It’s an architecture style of communicating interfaces. SOAP API - Simple Object Access Protocol is an API that connects different platforms together through HTTP and XML. Its relatively older than other API implementations, but it provides more security as it follows strict protocols. It’s a protocol for communication between applications. ASP.NET API - Specific form of REST API developed around .NET technology. REST vs SOAP Both have some similarities for instance they both support SSL/TLS for secure and encrypted communications, also they both use HTTP to exchange information. When deciding which API to use you must take in many factors into consideration like, security, ACID compliance, and overall application design. F...
  Designing a SOHO network with DHCP Network requirements for the office Sales department – 4 computers Finance department – 3 computers Networking devices requirement: ·          1 router ·          2 switches (one for each department) ·          1 DHCP server Documentation I started by setting up the network topology and used the automatic connecting cable to connect all the devices together. Then I configured the server with IPv4 address and a subnet mask. to do this you have to press on the server and then go to desktop. Then I filled in all the parameters as seen below. Then I had to configure the DHCP server. To do this I clicked on the server > services > DHCP. Then I turned on the serves and configured the server as seen in this screenshot. For the next step I configured the router with the IPv4 address and subnet mask. To a...