了解病毒、蠕虫、特洛伊木马和恶作剧。

Let's get to know the different types of intruders. When is it called a virus? When is it called a worm and ?..

了解病毒、蠕虫、特洛伊木马和恶作剧。

Let's get to know the different types of intruders. When is it called a virus? When is it called a worm and ?..

Compiled by: Sanya Klongyoi
Source : ThaiCERT: Thai Computer Emergency Response Team Computer Security Coordination Center Thailand

 

Recognize different types of intruders. When is it called a virus? When is it called a worm and ?..

Viruses are a type of computer program that is designed to spread itself from one file to another. Inside the computer The virus quickly spreads itself to every file on the computer. Or it may slowly infect document files, but the virus cannot spread from one machine to another on its own. Generally caused by the user being a carrier. Transfer viruses from one machine to another Such as when sending an e-mail with a document or file attached that has a virus, making copies of infected files onto a file server, or exchanging files using diskettes. When a normal user receives a file or disk to use The virus will spread inside the machine. And this cycle will continue
   
worm (Worms) In another sense It is very dangerous to the system. (Can damage the system from within It is generally similar to a computer virus. And by relying on the working behavior of humans in the IT era to spread themselves to other computers. A worm is a computer program that is designed to spread itself from one computer to another. To another device using the network system (E-mail), which can spread itself. which can spread quickly and cause much more severe damage than viruses.
   
Trojan (Trojan) A name familiar from Homer's ancient epic of Troy. It is used as the name of a computer program that is designed to infiltrate a system and works by intercepting passwords into various systems. and send it back to the malicious person. to access or attack the system later It comes in many forms, such as games, greeting cards, or letters. Trojan program It is not designed to destroy the system. Or cause damage to the computer system. Trojans are different from viruses and worms in that they cannot duplicate themselves and spread themselves. But it can rely on an intermediary. This can be various programs, mail, or downloading files from various sources. When executing these files The Trojan will work and will open various channels for intruders to attack the system. As the Greeks did to the people of Troy in the past
   
Hoax virus news is a form that affects many computer users. These fraudulent viruses come in the form of electronic mail. Sending messages one after the other through a messaging program. or various chat rooms Which can create chaos, how much or how little? It depends on the technique. and the use of the psychology of news creators Most of the time, this type of letter has a persuasive subject. Citing sources and large companies build trust And when the recipient forwards it to close friends and acquaintances, it builds more trust. Then the receiver will act as a forwarder. Many more to go. This is a distinctive feature of fraudulent viruses. If you receive this type of letter, you should not send it further. Or you should check from the correct source before forwarding.