DACS Malware Removal Toolkit
Part 2 – Types of Malware

Virus
A computer virus is a program that can copy itself and propagate from one computer to another, when a user takes certain steps.

Worm
A worm is a like a virus, but it can copy itself without need for the user to take any actions at all. Worms are currently more common than viruses.

Trojan Horse
A Trojan Horse is software that appears to provide useful software but actually does damage after it is installed.

Ransomware
Ransomware is software that demands payment in return for cleaning up a computer.

Rootkit
A rootkit is software that resides in a portion of the hard disk called the root, and it is particularly difficult to remove. It is not removed by replacing an archived copy of the c drive.

Keylogger
A Keylogger is software that tracks all the key depressions of the user … and transmits these to another party.

Malicious Spyware
Spyware is software that tracks your online activities. Most spyware falls in the category of “malicious spyware”, because the computer user has not consented to it.  Some spyware is “legitimate spyware”, because the user has agreed to, say, receive targeted ads that are based on this spyware. However, the user’s consent for such targeted ads is often buried deep inside a license agreement and privacy statement, and the typical user does not know he or she has legally agreed to the spyware.

Adware
The word adware may mean either (a) software that is supported by embedded ads (and this is legitimate); or (b) malicious malware that may present annoying popups or even try to change your browser settings to allow its popups.

Malicious Cookie
A malicious cookie may track your activity online. This is the most common way that malicious spyware is implemented.

Malicious Browser Helper Object
A Browser Helper Object (BHO) is a plug-in for a browser, and it provides additional functionality. Many are legitimate and users often install these tools. But many are malicious, in that they also add unwanted toolbars or change the home page.

Rogue Security Software
There are many offers on the internet for free software applications that purport to remove malware … but actually install their malware.

Router DNS Hijack Malware
The Domain Name Service (DNS) is the internet’s method to associate IP addresses with names (such as dacs.org). A personal computer on a home network connects to the internet via an IP address that is stored in the network’s router. Malware that changes this address is called Router DNS Hijack Malware. This typically routes the personal computer’s connection to some other rogue IP address … that then reroutes the user’s internet activity to the user’s intended destination … so that the user may think that all is well … but, in reality, the computer at the rogue IP address is logging all activity.




Click Here

DacsGear!
Mugs and more, visit CafePress to order

 
 
© Danbury Area Computer Society, Inc. All Rights Reserved.
Web Site Terms & Conditions of Use