A | B |
Malware | A malicous software, refers to prohram files whose specifif intent is to harm computer systems. |
Virus | A malicous program designed to damage computer systems, from stand alone compters to entire networks. It assumes control of systems operations, and damages or destroys data. |
Boot Sector Virus | Moves boot sector data to another part of the disk and replaces it with its own code. Whenevr the computer starts up, the virus executes. |
Bomb | Resides on the hard disk and is activated when a particular event occurs, such as a date change, a file change or a user or program action. |
Cluster Virus | Makes changes to a disk file system. Any programrun from an infected disk causes the virus to run, giving the impression that the virus infects all programs on the disk. |
File Infecting Virus | Infects program files on a disk. When the infected program is run, the virus also runs. |
Macro/ Script Virus | Infects a specific type of document file that can include macros, such as Microsoft Word or Excel Files. When the document containing a macro is opened, the virus runs. |
Companion | A virus that appears to have the same name as a legitimate application, but in fact has a different name. |
Terminate and Stay Resident (TSR) | Virus Executes immediately, then appear to no longer run. However they remain resident in memory where they can spread to other systems, cause damage to files, and open network ports. |
Stealth Virus | Resides in the computers memory and conceals changes it nakes to files,hiding the damage from users and operating systems. |
Polymorphic | Contains programming code enabling it to execute differently each time it is run. Because it appears as a different process each time, this virus avoids being detected by virus scanning software. |
Retro | Specifically attacks anti virus software. |
Worm | A self replicating program or algorithm that consumes system and network resources. It automatically speards from one computer to another. |
Trojan | a program that appears to be harmless but actually produces harmful results. Do not replicate themselves or copy themselves to other files and disk. |
Illicit Server | an application that installs hidden services on your system. Consist of client and server code. |
Anti Virus Software | Software that scans disks and programs for known viruses and eliminates them. |
Spyware | A software application that is secretly placed on a users system to gather information and relay it to outside parties, usually for advertising purposes. |
Update | A file or collection of tools that resolves systems liabilities and improves software performance. |
Patch | Programming Code that provides a temporary solution to a known problem, or bug. |
typosquatting | An unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering a URL of a web site into a browser in an attempt to profit from a trademark belonging to another business by taking adavntage of users typographical errors. |