Meeting 5
MALWARE
In computer world, there is also a software. Malicious Software which is created to do something bad and to perform criminal intension. This kind of software is called malicious software or malware. Malicious software can be divided into some categories:
-VIRUS-WORM
-TROJAN HORSE
VIRUS
Virus is a software that can replicate by injecting or infecting its Own code into other file.By its way to infect other file,virus can be divided into three categories:
> Overwriting
> Appending
> Prepending
Virus
A type of computer virus that will copy its own code over the host computer system's file data, which destroys the original program. After your computer system has been cleaned using an antivirus program, users will need to install the original program again.
2. Appending
A virus that inserts a copy of its malicious code at the end of the file. The goal of an appending virus is not to harm the host program, but to modify it to hold the virus code and then be able to run itself.
3. Prepending
A virus defines the method it uses of infecting Files by adding their code to the beginning of the file.By doing this,these viruses ensure that they are activated when an infected file is used.
WORM
Worm is also a kind of malicious software. It is different from virus which is worm can not inject of infect other files. A worm is a software which replicates by creating its own copy. And without infecting other file. Worm actually spreads through a network or the Internet using email.Below is a sample of worm called I Love You. Worm I Love You spreads through the Internet as an email attachment.
Usually worm will do something tricky to cheat email receiver.The first isusing double file extension. At the left sample, worm I Love You uses two extension, those are TXT.VBS. The second trick is using social engineering. At the above sample, the worm uses a name “I LOVE YOU” which might interested to every email receiver. Who doesn’t need love? So, the effect of these tricks are any body–the email receiver-will click that attachment which is actually a worm code.
TROJAN HORSE
Trojan horse is derived from ancientGreek. Trojan Horse is a program that looks like a good program but actually contains destructive code or destructive feature. Trojan horse is different from virus and worm, trojan horse can not replicate and cannot infect other file. There are many kind of Trojan horse. Below are some of them:
a. Passwords tealer e. Remote monitoring
b. Keylogger f. Remote administrator,etc
c. Fake Program
d. Anonymouse mailer
MALWARE
Kinds file of malware
- WIN32/Ramnit.A
- LNK/Autostart.A (Win32/CplLnk.A)
- Win32/Ramnit.F
- Win32/Sality.NBA
- Win32/Somoto.A
- HTML/Iframe.B.Gen
- Win32/Ramnit.H
- INF/Autorun.gen
- Win32/Virut.NBP
- LNK/Exploit.CVE-2010-2568
PROGRAMMER ETHICS
The code of conduct expected for the programmer is:
1. A programmer may not create or distribute Malware.
2. A programmer should not write code that is difficult to follow intentionally.
3. A programmer should not write deliberate documentation to be confusing or inaccurate.
4. A programmer may not reuse code with copyright unless it has purchased or requested permission.
5. Should not seek additional benefits from a second party funded project without permission.
6. Must not steal software especially development tools.
7. Should not receive additional funds from various external parties in a project simultaneously unless authorized.
8. Should not write code that deliberately drop another programmer's code to take advantage in raising the status.
9. Should not disclose important data employees in the company.
10. Should not inform financial problems to workers.
11. Never take advantage of someone else's work.
12. Should not embarrass his profession.
13. Should not randomly deny any bugs in the app.
14. Can not introduce bugs that exist in the software that programmers will get the benefit of fixing bugs.
How to prevent the computer from getting malware
- Install security program / Anti virus
- Use Windows Defender
- Periodically update the security / antivirus program
- Update the operating system
- Scan your computer with antivirus regularly
- Do not enter flashdisk
- Turn off AutoRun Feature
- Do not haphazardly install an unknown program
- Avoid the use of pirated programs
- Be careful when surfing the internet
How to Resolve Computer Affected by Malware
- Full scan of computer with security Virus program
- Update security virus and perform a full scan
- Scan VIA ‘safe mode’
- Use the portable security virus program
- Remove virus via LIVE CD
The last time the problem never ends, maybe this is time you switch to a more secure operating system from malware attacks.
Like MAC OS, LINUX and UNIK..




0 komentar:
Posting Komentar