Virus, Worms, Trojans

From iGeek
VirusWormsTrojans.jpg
Virus, Worms and Trojans, some various hacker terms/attacks explained (simply).
Virus, Worms and Trojans, some various hacker terms/attacks explained (simply).
ℹ️ Info          
~ Aristotle Sabouni
Created: 2001-09-10 

What does it all mean?

There's a recent media storm about the Code Red worm. But most people don't know what the terms mean or what the risks are.

The first question is what is a worm? And of course, if we're discussing worms, then what about virus's, Trojans and other related terms?

A computer virus is just a program that "spreads" or makes copies of itself without the user knowing about it.

A worm is also a program that copies itself without permission or knowledge. So a worm is a type of virus.

The difference between a worm and a virus is that a virus usually spreads itself on the machine it is on, or to files that are accessible from that machine (it attacks local files). A worm usually tries to infect other machines across the network, or it attacks other systems (instead of just spreading within the system you are on). Of course a virus will try to spread to many files, often including files it can see across a network or files that will be transmitted across a network (directly or via email) or files that will be given to others on floppy disk. But a worm is a bit more deliberate on attacking others, actually targeting other systems and trying to infect them - viruses spread everywhere and happen to get to other machines.

A Trojan (or Trojan Horse), is a program that pretends to be one thing (by name, icon or description) but does something completely different. It might be obviously difference, when the intruder leaps out and kills you, or it might be subtle and do exactly what you think it does... plus something else (like install a vitus, malware, etc). But it's that false advertising and surprise that makes it a Trojan.

VirusChar.png

When you get an email that says "look at the cool picture", but clicking on it really is a script or program that does something else, that's a Trojan. In fact, even some websites or emails say "click here" to do one thing, but they do another, are a form of Trojan Horse.

Most Trojans (like the "Melissa" or "I Love you" viruses) are also a form of viruses - in that one of the things they do when they are run, is try to spread themselves (without you intentionally copying or sending them). They fake you into do something, which runs them, and which allows them to do things (like send themselves to everyone on your email list). It is just that the method of spreading is based on a user action - if you don't run them, they can't copy themselves. Whereas, you don't have to do anything to spread a virus - they are running automagically, and so copy themselves without any action on your part.

Some of the nastier things going around, are viruses or worms that infect your system and exploit holes in Windows, to create bigger holes in Windows. Actually, what they do is install a "bot" (robot or netbot) that can be commanded to do things. They broadcast to hackers that your machine is open for business - and the business is allowing hackers to see what's on your machine, or to use your machine to attack others.

VirusWormsAndTrojans.jpeg

Some hackers collect fleets of these attack "bots", which they can command to attack some machine they don't like. Or some bots are automatic (autobots) in that they attack at a preconfigured time/date. (Since the channels/ports that allow someone to talk to or command a bot are auditable, it is little easier to find and block a regular bot than an autobot). With a fleet of those machines (bots) all making requests at once, a targeted machine is flooded and overwhelmed (functionally blocked from getting any real work done). This is called a DDOS (Distributed Denial of Service) attack or flood attack.

These attacks and security holes are possible on any type of computer. But they are easiest to do using Microsoft Windows. This is because when Microsoft was creating Windows, and many of the Applications like their email and web-browser, they sacrificed security for the sake of making their lives easier. People warned Microsoft against this policy early on, but MS saved money/time by not having to pay the price of designing in security. The results are that they created the least secure of the popular Operating Systems - and now all users pay the price -- since anyone can be a victim of a Windows based attack.

The Code Red worm was a worm (type of virus), that installed a nasty little auto-bot on Windows that would automatically attack (DDOS) the whitehouse.gov website during the last few days of the month. Sadly, the holes in Windows mean that this is not the end of these types of attacks, but just the beginning.

GeekPirate.small.png


👁️ See also

  • Hack, Crack or Phreak - What are Hackers, Crackers and Phreaks? A little first-person explanations of how it started. (No longer current).
  • Hacking - It is not that hard to hack into a network/machine, but far harder than the movies make it seem.
  • Cracking - Cracking is the black art of removing copy protection from other people's programs.
  • Phreaking - Phreaking is when hackers broke the phone companies security, to get access to control the phones.
  • Easter Eggs - What are easter eggs (hidden software features), and where do they come from?
  • Firewalls - A firewall (in real life or software) is something that protects one area from another to keep a fire from spreading.
  • How Secure are you? - How secure are your devices from intruders? The answer is "it depends", on a lot of variables.
  • Passwords - Annoying password requirements are combatting human laziness, with moronic bureaucacy, often making it worse.
  • Privacy - How safe is your info? More than Hollywood would lead you to believe. But you should still take precautions.
  • Online Shopping - Shopping and Physical Security: One of the areas that people are very concerned about security is on-line shopping.
  • Virus, Worms, Trojans - Virus, Worms and Trojans, some various hacker terms/attacks explained (simply).

🔗 More

Tech
Technology: Organizations, Reviews, People

Security
Articles about Security (usually cyber-security, but also physical).



Tags: Tech  Security



Cookies help us deliver our services. By using our services, you agree to our use of cookies.