TLE10 Types of Malwares
TLE10 Types of Malwares
loaded.
or
Software that collects data about a user without
their permission.
Removal:
◦ Check that all antivirus signatures are up-to-date.
◦ Scan the computer with antivirus software.
◦ If the scan detects a computer worm or other malware, use the
software to remove malware and clean or delete infected files. A
scan that detects no malware is usually indicative that
symptoms are being caused by hardware or software problems.
◦ Check that the computer’s operating system is up-to-date and
all software and applications have current patches installed.
◦ If a worm is difficult to remove, check online for specific
computer worm removal utilities
Logic bomb is programming code, inserted
surreptitiously or intentionally, that is designed
to execute (or "explode") under circumstances
such as the lapse of a certain amount of time or
the failure of a program user to respond to a
program command.
It is in effect a delayed-action computer virus or
Trojan horse.
A logic bomb, when "exploded," may be
designed to display or print a spurious message,
delete or corrupt data, or have other
undesirable effects.
Do not download pirated software
Be careful with installing shareware/freeware applications -
- Ensure you acquire these applications from a reputable
source.
Be cautious when opening email attachments -- Email
attachments may contain malware such as logic bombs.
extreme
Use caution when handling emails and attachments.
Do not click on suspicious web links
Always update your -- Most antivirus
applications can detect malware such as Trojan
horses (which may contain logic bombs).
Install the latest operating system patches -- Not keeping
up with operating system updates will make your PC
vulnerable to the latest malware threats.
Apply patches to other software installed on your
computer -- Ensure that you have the latest patches
installed on all of your software applications, such
as Microsoft Office software, Adobe products, and
Java.
It is a method of gaining access to some part of a
system other than by the normal procedure (e.g.
gaining access without having to supply a
password).
Hackers who successfully penetrate a
system may insert trapdoors to allow them
entry at a later date, even if the vulnerability
that they originally exploited is closed.
There have also been instances of system
developers leaving debug trapdoors in software,
which are then discovered and exploited by
hackers.
Trojan horse is a program in which
malicious or harmful code is contained
inside apparently harmless programming or
data in such a way that it can get control and
do its chosen form of damage, such as
ruining the certain area on your hard disk.
A Trojan horse may be widely
redistributed as part of a computer virus.
Disable System Restore.