A computer virus is a program that travels over the Internet, destroying computer programs and causing them to stop working. Antiviruses are now produced against these viruses




Download 2.62 Mb.
bet2/2
Sana22.04.2023
Hajmi2.62 Mb.
#53160
1   2
Bog'liq
islom
KIRISH, os MsoQgAR1BJFO6FR4f3gP5QKufozZ0, 9 Жуманиязова Дилафруз ПЦР вгс, Hasharotlarning tuxum, lichinka va g’umbak tiplari, Chala o’zgarish bilan rivojlanadigan hasharotlar biologiyasi, WRITE ABOUT THE CHANGES IN TECHNOLOGY OF METROLOGY 2, Deutschland und Berlin, WORD, AQLIY HUJUM METODI, 8-sinf uchun, 99-maktab sababsiz kelmaydigan o\'quvchilar xaqida ma\'lumot, орппа, аывв, 62c4759602441190104345
hijackers, or simply hijackers, are a type of malware created for the purpose of modifying Internet browser settings without the user’s knowledge or consent. Typically, hijackers change the homepage and default search settings. However, some are known to inject advertisements—thus, they are qualified to be called adware, automatically redirecting users to potentially malicious destinations when they visit certain sites, and sometimes making drastic changes to the affected system. Some hijackers also contain keyloggers, which are capable of recording user keystrokes to gather potentially valuable information they enter into websites, such as account credentials.




A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology). Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptosystems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.
A backdoor may take the form of a hidden part of a program, a separate program (e.g. Back Orifice may subvert the system through a rootkit), code in the firmware of the hardware, or parts of an operating system such as Windows.Trojan horses can be used to create vulnerabilities in a device. A Trojan horse may appear to be an entirely legitimate program, but when executed, it triggers an activity that may install a backdoor. Although some are secretly installed, other backdoors are deliberate and widely known. These kinds of backdoors have "legitimate" uses such as providing the manufacturer with a way to restore user passwords.

The Browser Helper Object is a Dynamic Link Library (DLL) that is loaded every time Microsoft Internet Explorer is launched. Typically, these "helper objects" are installed by third-party software to enhance the functionality of the browser (for example, Adobe's tool for viewing PDF in a browser window). They can be installed silently or in "silent" mode (many users don't read the fine print that comes with the freeware license agreement). Also, since BHOs are programs, they can do everything that normal applications can do. It is not easy to determine their location on a PC, so their functions can be used maliciously (for example, to download ads or track your search history).


A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time.Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.





Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behaviour may be present in malware as well as in legitimate software. Websites may engage in spyware behaviours like web tracking. Hardware devices may also be affected. Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.
Download 2.62 Mb.
1   2




Download 2.62 Mb.

Bosh sahifa
Aloqalar

    Bosh sahifa



A computer virus is a program that travels over the Internet, destroying computer programs and causing them to stop working. Antiviruses are now produced against these viruses

Download 2.62 Mb.