Wednesday, September 1, 2010

MALWARE 

WHAT IS MALWARE?
"The word MALWARE is derived from the word 'mailicious software''
"MALWARE"refers to programs that are covertly inserted into systemwith the intent to cause damage to data,applications or operating system of the victim.

There are three types of MALWARE. 
1)TROJAN 
2)VIRUS
3)WORM             
                 WHAT IS EXACTLY  IS <TROJAN                                                                            
                                                                              

STORY BEHIND THE                   >>>NAME
In Greek mythology, the Trojan War was waged against the city of Troy by the Achaeans (Greeks) after Paris of Troy took Helen from her husbandMenelaus, the king of Sparta. The war is among the most important events in Greek mythology and was narrated in many works of Greek literature, including the Iliad and the Odyssey by Homer. "The Iliad" relates a part of the last year of the siege of Troy, while the Odyssey describes the journey home of Odysseus, one of the Achaean leaders. Other parts of the war were told in a cycle of epic poems, which has only survived in fragments. Episodes from the war provided material for Greek tragedy and other works of Greek literature, and for Roman poets like Virgil and Ovid.The end of the war came with one final plan. Odysseus devised a new ruse—a giant hollow wooden horse, an animal that was sacred to the Trojans. It was built by Epeius and guided by Athena,[143] from the wood of a cornel tree grove sacred to Apollo,[144] with the inscription:

The Greeks dedicate this thank-offering to Athena for their return home.[145]                                                                                                                                                     The hollow horse was filled with soldiers[146] led by Odysseus. The rest of the army burned the camp and sailed for Tenedos.[147]When the Trojans discovered that the Greeks were gone, believing the war was over, they "joyfully dragged the horse inside the city",[148] while they debated what to do with it. Some thought they ought to hurl it down from the rocks, others thought they should burn it, while others said they ought to dedicate it to Athena.[149][150]
Both Cassandra and Laocoön warned against keeping the horse.[151] While Cassandra had been given the gift of prophecy by Apollo, she was also cursed by Apollo never to be believed. Serpents then came out of the sea and devoured either Laocoön and one of his two sons,[149] Laocoön and both his sons,[152] or only his sons,[153] a portent which so alarmed the followers of Aeneas that they withdrew to Ida.[149] The Trojans decided to keep the horse and turned to a night of mad revelry and celebration.[126] Sinon, an Achaean spy, signaled the fleet stationed at Tenedos when "it was midnight and the clear moon was rising"[154] and the soldiers from inside the horse emerged and killed the guards.[155]
 
IT  COME  IN  SYSTEM  WITH  SOME  GOOD  AND   DO  SOME  BAD  THINGS!!!!! 

COME TO SOME SERIOUS STUFF KNOWN AS VIRUS<<        
 " A VIRUS   is designed to self-replicate itself into host programmer or data files.    

"They are mostly triggered through user interaction such as opening a file or running a program.
It is further subdivided into two parts.
1)COMPILED VIRUS
2)INTERPRETED VIRUSES
COMPILED VIRUS-It is executed by operating system.
INTERPRETED VIRUS-It is executed by an application.

NOW THE MOST NAUGHTY ONE!!!  -----> WORM 
 ""  WORM"  is a self-replicating, self-contained program which executes itself withought user interaction unlike viruses.
It is also further divided into two types.
1)Network service worms
2)Mass mailing worms        


SOME COUNTER MEASURES--->
  •  Do not open suspicious e-mails or attachments from unknown or known sender.
  • Do not open files with file extension likely associatioted with malwares such as .bat,.exe,.vbs etc.
  • Do not open or download file from untusted sources.
  • install a good antivirus and firewall.   
  • For more queries mail me at nitesh106@yahoo.com
For recent Microprocessor Flaw of intel CPU flaw check my below blog for more details: flawinmicroprocessor.blogspot.com