Thursday, February 9, 2017

Viruses, Exploits, Worms, and More

The term computer "virus" originated to describe a computer code that is inserted into a computer. Depending on the hacker's intent, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe.

Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability. Each example is appropriately termed an "exploit." An exploit causes unintended or unanticipated behavior to occur in a computer system or applications while propagating itself within the computer.
An exploit and operates through a network security vulnerability or "hole" without previous access to the vulnerable system is a "remote" exploit. An exploit that needs prior to a system is termed a "local" exploit. These are usually intended to increase the hacker's access privileges beyond those granted by a system administrator.

Worms are simply viruses that send copies over network connections. A bomb resides silently in a computer memory until set off by a date or action. A Trojan horse is a malicious program which can be reproduced by CD or e-mail.


4 comments:

  1. Great work! I also did the same thing.I mean I also wrote a blog about the phishing.Let's go and see it: http://hacktivismbycs.blogspot.com/

    ReplyDelete
  2. This comment has been removed by a blog administrator.

    ReplyDelete

Get Unlimited Free Trials Using a "Real" Fake Credit Card Number

When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to &qu...