The world of malicious code

The world of malicious code
If the computer does not work properly, we often say it is a virus. But it is not just viruses that make your computer sick. Malicious code is a malicious code that is maliciously crafted to infiltrate a user's computer or damage a program. They are divided into viruses, worm viruses and Trojans according to their self-replicating ability and presence of infection targets. These are the main programs that annoy our computers. It is not a virus, but it has a negative nuance in that it adversely affects the computer and is collectively called the virus.
Computer virus: A malicious program capable of copying itself and infecting other programs and destroying normal programs and data. The virus is named because it is similar to biological viruses that cause problems by copying oneself on their own while parasiting themselves. In other words, it can be operated only by the target of the infection, and the kind of the virus is classified according to the area. The world 's first virus was a brain virus created in Pakistan in 1986. It was made to feed illegal copyists.

Although viruses can infect multiple files on one computer because they copy itself as a host, they have limitations in moving to other computers.
Worm virus: It spreads through the network by copying itself without infecting other programs. I write about hiding in a particular computer and penetrating other computers connected through the network. Since the beginning of the Internet in the late 90s and early 2000s, this type of malicious code has begun to focus on e-mail.


The worm exists as an independent file. Worms also overwhelm viruses in propagation. Worms can infect many computers at the same time because they send e-mails repeatedly or spread themselves through the network.
Trojan Horse: As the name suggests, I use a way to force users to install programs through P2P sites, web pages and emails, pretending to be useful programs for users. Since it looks like a good program, it often happens that users do not notice that their computer is being exploited.


However, it has a terrible virus in it that can get rid of your personal information and destroy programs. In addition, DDoS attack (DDoS attack, distributed denial of service) is also used as a zombie PC. However, since it does not have self-replicating ability and does not infect other files, it can be solved by erasing only the program.

Computer virus world that former presidential candidate informs
Starting from prank ... Computer viruses that evolved into business-type cybercrime
A virus incident that shocked us
The virus that first appeared in 1985 as a resistance against piracy has evolved into various forms of malicious code as current methods and techniques become more sophisticated and complex. On the 14th, when the horror of Ransomware arrived in Korea, we sorted out the events and major programs that put our PC into a crisis.

Chernobyl virus
It is a malicious code that alarms the seriousness of computer virus in Korea. CIH is the initials of CHEN ING HAU, the first Taiwanese to make the virus. When you open the source (source) state of the infected file, the message 'CIH V 1.2' is displayed. It was also called Chernobyl virus in anticipation of its operation on April 26, 1999, the thirteenth anniversary of the Chernobyl nuclear accident. CIH is mainly infected with Windows 95 and Windows 98, and is capable of breaking hard disk storage files and paralyzing even the computer boot (start) function.

The worst of the virus was South Korea. About 300,000 computers have been destroyed in Korea, causing damage to businesses and public institutions. Chernobyl virus The US, which was attacked by the former Melissa virus, has done a good job against the virus, but it has suffered greatly in the Asian countries where pirated and pirated copies are many. 300,000 in Turkey, 100,000 in China, 30,000 in India, 10,000 in Bangladesh and 2000 in Norway. In the Middle East, it is estimated that 5 to 10 percent of all computers are infected. In the United States, Carnegie-Mellon vs. Computer Emergency Response Team (CERT) tentatively counted 2,338 infected PCs.

Comments

  1. SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless
    SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' titanium band ring Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' micro touch trimmer Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' titanium rainbow quartz Stainless SteelSeries' Stainless SteelSeries' titanium trim hair cutter reviews Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' 2018 ford ecosport titanium Stainless SteelSeries' Stainless SteelSeries' Stainless SteelSeries' Stainless

    ReplyDelete

Post a Comment