You are on page 1of 9

m    m 

m   

V Y   are a type of computer program
that appear to perform a certain function, but
actually perform other, often malicious, actions.
They differ from traditional viruses because they
do not have the means to automatically replicate.
Trojan horses can be classified based on how they
breach and damage systems. They are primarily
used for unauthorized remote access, mass-mailing
spam, data destruction, file transfer, toll-line
dialing, and denial-of-service attacks.
V http://articles.winferno.com/antivirus/trojan-
horse/
m c   is a backdoor trojan horse family of
more than 10 variants which can infect
Windows 95 through Vista. Bifrost uses the
typical server, server builder, and client
backdoor program configuration to allow a
remote attacker, who uses client, to execute
arbitrary code on the compromised machine
(which runs the server whose behavior can be
controlled by the server editor).
m http://en.wikipedia.org/wiki/Bifrost_(trojan_
horse)
Ý ½   
      
½
      Y 
Ý Y      
      Y  
     
  
           
  
      
   
V ½ salami attack is a programmed attack which
is implemented in small (meant to be
unnoticeable) increments. Because it is
occurring in small increments it is easily
concealed.
http://wiki.answers.com/Q/How_the_salami
_virus_attack
V n the salami technique, cyber criminals steal
money or resources a bit at a time. The key here is
to make the alteration so insignificant that in a
single case it would go completely unnoticed. E.g.
a bank employee inserts a program, into the bank·s
servers, that deducts a small amount of money
(say Rs. 5 a month) from the account of every
customer. No account holder will probably notice
this unauthorized debit, but the cyber criminal
will make a sizable amount of money every
month.
V http://blog.appinonline.com/hacking/salami-
attack.htm
V n computers, a virus is a program or programming code that
replicates by being copied or initiating its copying to another
program, computer boot sector or document. Viruses can be
transmitted as attachments to an e-mail note or in a downloaded
file, or be present on a diskette or CD. The immediate source of
the e-mail note, downloaded file, or diskette you've received is
usually unaware that it contains a virus. Some viruses wreak their
effect as soon as their code is executed; other viruses lie dormant
until circumstances cause their code to be executed by the
computer. Some viruses are benign or playful in intent and effect
("Happy Birthday, Ludwig!") and some can be quite harmful,
erasing data or causing your hard disk to require reformatting. ½
virus that replicates itself by resending itself as an e-mail
attachment or as part of a network message is known as a worm.
V http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213
306,00.html
V n a computer, a worm is a self-replicating
virus that does not alter files but resides in
active memory and duplicates itself. Worms
use parts of an operating system that are
automatic and usually invisible to the user. t is
common for worms to be noticed only when
theiruncontrolled replication consumes system
resources, slowing orhalting other tasks.
V http://searchsecurity.techtarget.com/sDefiniti
on/0,,sid14_gci213386,00.html
Ý   
Ý           
      

 
  
          
   
        
   
        
  
Ý
Ý  
    
Ý               
     Y        
          
  
  !     
       
Ý  "
     #!$  

You might also like