bullet Back

 

Virus:

A virus writes itself to disk, needs access to CPU  on the computer and attaches itself to other files.

It has three functional parts, the combination of these makes the program a virus:

bullet Replication (reproduce or duplicate itself by getting into the memory)
bullet Concealment (hide or camouflage its presence)
bullet Bomb (wait for a specific event, like a date or time)

Hoaxes: Also virus

 

Worms:

Two different types:

  1. Operates on one single computer, like a normal application or program.
  2. A central node on one computer, but different segments of the worm program on other computers in a network. (Octopus)

Is a self-supporting program and replicate itself via an open line to the internet (dial-up or permanent).

 

Trojan horses:

Performs an activity that the user is unaware of.  A hidden application within a program.

Are not viruses because they do not replicate and attach themselves to other files.

bullet Not always hackers make these programs.  Microsoft (complete inventory of hardware and software) and 3COM (back door for their hardware if costumer needs help)
bullet Also unix  and not only personal computers are affected by hacker programs

Preventive measures:                            Next page