Click here to find books related to 'computer security'.


23. What is a trojan/worm/virus/logic bomb?

This FAQ answer was written by Theora:

Trojan:
     Remember the Trojan Horse? Bad guys hid inside it until they could get
     into the city to do their evil deed. A trojan computer program is
     similar. It is a program which does an unauthorized function, hidden
     inside an authorized program. It does something other than what it
     claims to do, usually something malicious (although not necessarily!),
     and it is intended by the author to do whatever it does. If it's not
     intentional, its called a 'bug' or, in some cases, a feature :) Some
     virus scanning programs detect some trojans. Some virus scanning
     programs don't detect any trojans. No virus scanners detect all
     trojans.
Virus:
     A virus is an independent program which reproduces itself. It may
     attach to other programs, it may create copies of itself (as in
     companion viruses). It may damage or corrupt data, change data, or
     degrade the performance of your system by utilizing resources such as
     memory or disk space. Some virus scanners detect some viruses. No
     virus scanners detect all viruses. No virus scanner can protect
     against "any and all viruses, known and unknown, now and forevermore".
Worm:
     Made famous by Robert Morris, Jr. , worms are programs which reproduce
     by copying themselves over and over, system to system, using up
     resources and sometimes slowing down the systems. They are self
     contained and use the networks to spread, in much the same way viruses
     use files to spread. Some people say the solution to viruses and worms
     is to just not have any files or networks. They are probably correct.
     We would include computers.
Logic Bomb:
     Code which will trigger a particular form of 'attack' when a
     designated condition is met. For instance, a logic bomb could delete
     all files on Dec. 5th. Unlike a virus, a logic bomb does not make
     copies of itself.


This page was created Wed Aug 11 13:09:09 EDT 1999
Using Linux version 2.0.32 on an i586

Main Page @ Matarese.com Acquiring Account Information @ Matarese.com       Act2! by Symantec @ Matarese.com      

All hacks / Annoyance @ Matarese.com       Alt 2600 Group FAQ @ Matarese.com      

Hacking Angelfire @ Matarese.com       Anonymous E-Mail @ Matarese.com      

Hacking BBS's @ Matarese.com       List of Common Bugs @ Matarese.com      

Things that go Bump on the Internet @ Matarese.com       Expanding the capacity of Caller ID Boxes @ Matarese.com      

The Matarese Circle @ Matarese.com       Cops and Robbers | UNIX Security @ Matarese.com      

Credit Carding Part I @ Matarese.com       Exploits FAQ @ Matarese.com      

Making Free Calls @ Matarese.com       FTP Bouncing @ Matarese.com      

Hackers Encyclopedia @ Matarese.com       Hacking from Windows9x FTP @ Matarese.com      

Hacking Tripod @ Matarese.com       Hacking Web Pages @ Matarese.com      

How to crack a UNIX password file. @ Matarese.com       Hacking Servers : A Begginners Guide @ Matarese.com      

Hacking Tutorial @ Matarese.com       Hacking UNIX @ Matarese.com      

How to Hack the WWWboard Message Board 2.0 @ Matarese.com       Hackers Handbook @ Matarese.com      

Guide to Harmless-Hacking @ Matarese.com       All about security holes @ Matarese.com      

Hacking Hotmail @ Matarese.com       ]How to Hack from from Harlequin and Archangel @ Matarese.com      

Improve security by breaking into your site @ Matarese.com       Internet Security @ Matarese.com      

IRC Hacking FAQ by Lord Somer @ Matarese.com       Lan Technology Scorecard @ Matarese.com      

Harmless Hacking - Linux @ Matarese.com       Mail Spoofing Explained @ Matarese.com      

Microsoft IIS Vulnerability @ Matarese.com       Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com      

Intresting Microsoft Access 7.0 Trick @ Matarese.com       MS Money 2.0 Back Door @ Matarese.com      

Mind Your Own Business (MYOB) @ Matarese.com       This Hack is for the OptiChat Original Chat Room @ Matarese.com      

Internet Outdials @ Matarese.com       Introduction to the Internet Protocols @ Matarese.com      

Analysis of QueSO Performance @ Matarese.com       Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com      

L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com       Sniffer FAQ V 1.7 @ Matarese.com      

SSPING/JOLT patches @ Matarese.com       WORKING OUT-TELNETS @ Matarese.com      

How do I post to a moderated newsgroup? @ Matarese.com       What You Should Know About Computer Viruses @ Matarese.com      

How can I protect myself from viruses and such? @ Matarese.com            

unix   linux   networking   c   c++   operating systems     Copyright (C) 1999 - Matarese.com