Add Papers Marked0
Paper checked off!

Marked works

Viewed0

Viewed works

Shopping Cart0
Paper added to shopping cart!

Shopping Cart

Register Now

internet library
Atlants.lv library
FAQ
3,99 € Add to cart
Add to Wish List
Want cheaper?
ID number:357208
 
Author:
Evaluation:
Published: 02.06.2009.
Language: English
Level: College/University
Literature: 6 units
References: Not used
Time period viewed: 20th century (1900 A.D. to 1999 A.D.
2000 - 2010 years
Table of contents
Nr. Chapter  Page.
  INTRODUCTION    3
  MALWARE    4
  INFECTIOUS MALWARE: VIRUSES AND WORMS    5
  TROJAN HORSES, ROOTKITS, AND BACKDOORS    6
  TROJAN HORSES    6
  TROJAN HORSE “BACK ORIFICE”    7
  ROOTKITS    8
  BACKDOORS    9
  ANTI-MALWARE PROGRAMS    10
  CONCLUSIONS    13
  TO KNOW    14
  LITERATURE    15
Extract

Besides software which is useful and helpful developed by programmers there are also some program codes written to introduce damages in the software by attaching copies themselves to some objects within the system, and normally having a detrimental effect.
Many people are afraid of malware, mostly because they do not know much about them. Computer viruses and network security is important. There are things that are not public information. Therefore it is good to be a weare of possible network security problems.
Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of several American states, including California and West Virginia.
Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs.
Preliminary results from Symantec published in 2008 suggested that "the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications." According to F-Secure, "As much malware [was] produced in 2007 as in the previous 20 years altogether." Malware's most common pathway from criminals to users is through the Internet: primarily by email and the World Wide Web.…

Load more similar papers

Atlants

Choose Authorization Method

Email & Password

Email & Password

Wrong e-mail adress or password!
Log In

Forgot your password?

Draugiem.pase
Facebook

Not registered yet?

Register and redeem free papers!

To receive free papers from Atlants.com it is necessary to register. It's quick and will only take a few seconds.

If you have already registered, simply to access the free content.

Cancel Register