7/1/2013
Of the many things that IT professionals are called upon to remedy, infectious programs are, by far, the most common.
Our technology, like our bodies, is susceptible to a myriad of "infections" that can render our beloved computers into little more than frustrating paperweights. The accepted generic term for these programs is "computer virus", but viruses actually make up one part of the various detrimental programs out there.
In this issue of Tech Talk, I want to discuss the most common types of malicious programs, what they can do, and how to prevent them.
A malicious program, generically referred to as "malware", is defined as any type of program that negatively affects the effective operation of a computer system. These programs are broken into various categories based on what they do.
The three most common forms of malware are viruses, worms, and Trojans.
I'm certain that most people reading this article will be somewhat familiar with these three terms, but not what each of these types of malware specifically does.
Viruses: By definition, a computer virus is a program that attaches itself to a program or database and then migrates through a computer network or system. Some can be relatively harmless, going unnoticed for extended periods, while others can be very destructive.
Viruses can be programmed to activate when certain conditions are met, or when a specific key or command is entered, at which point, it will begin to alter or delete files. Viruses that simply delete files can cause a complete loss of data or even the operating system itself, while others can actually rewrite the parameters by which a computer safely operates, causing system damage.
An example of this would be a virus that tells a computer or servers internal cooling system to shut down or not activate when a specific temperature is reached, at which time, the computer may burnout components.
Worms: This type of program does not attack or destroy files per se. Rather; it is a special type of virus that, once in a system, begins to replicate uncontrollably. This has the effect of taking up memory space and using system resources. Think of it as a cancer, when cells begin to multiply out of control. While the information on the computer will be undamaged, the overuse of resources will slow or even prevent a computer system from functioning. In these situations, the computers tend to freeze or will not even make it through a normal boot phase.
Trojan Horses: Just like the mythology of Troy, the horse looked great on the outside, but it was not until it was brought into the city that the trouble occurred. Trojan horses are programs that look great on the outside, but may contain viruses or worms within their programming. Most of the time, Trojan horses can be contained in various free applications available for download from the internet. Some of the more common ones can be free games, screen savers, or generic coupon applications.
Have you ever seen the little pop-ups that say: "viruses detected on your computer, click here for free virus scan", or "You've won a <insert vacation/prize>", or "click for free information on <insert service here>".
These can also contain Trojans horses that will load a virus into your computer, creating any number of issues.
In one instance, a client's computer functioned normally, even though a virus was active in his system. Unbeknownst to him, his computer had become part of a Robot Network. The technical term for a computer affected in this way is "Zombie".
Yes, that's right; there are Zombies on the internet!
A Zombie is a computer that can be remotely controlled for nefarious purposes. Unscrupulous individuals who deploy viruses for this purpose are attempting to create a "robot network" of Zombies, or Botnet.
A person controlling a botnet can harness the calculating power of those computers to crack passwords, send junk email, or directly attack a specific target.
While the implications can be obvious, the effects on the individual computer itself can be difficult to detect. In one client's case, he was up late one evening and watched his computer simply "switch on" with no one seated at the desk. His monitor remained off the entire time.
So, what can happen when these things get into your system? It really depends on the intent of the individual creating these programs. Whatever the intent of the programmer, once the malicious program is in place, chances are you will need to have someone remove them.
So, how do you prevent these little beggars from getting into your system in the first place? You can use several preventive measures.
First: Have a good, up to date anti-virus program in place. Anti-virus software companies spend vast amounts of time and money researching the profiles of malicious software in order to prevent infestation of a computer. Mostly, they do a good job, though no one anti-virus suite will catch everything.
Second: Perform periodic checks and maintenance on your computer in order to make sure that nothing unwanted remains. This process removes old data and obsolete information, freeing up disk space and ensuring your system runs smoothly.
Third: Know who your friends are. I say this simply because one of the most effective delivery methods of malicious software is through email. If you receive an email from someone you do not recognize, don't open it.
This is the proverbial "Big Red Button". You see it…its right there…you know you shouldn't…but…
If you receive an email that contains a name that you recognize, but the sending address is different, do not open it. Also, call that person and let them know since their system may have been compromised.
Finally, police your activity! If you're an avid couponer, get your coupons from the manufacturer, or from a trusted coupon site. If an unwanted pop-up appears on your screen, delete it. If you suspect there may be a problem, run your own anti-virus software, or contact a professional to check your system.
The creators of malicious software prey on the apathy of legitimate users. The more aware you are of the potential, the better you can protect yourself from unwanted situations.
Of the many things that IT professionals are called upon to remedy, infectious programs are, by far, the most common.
Our technology, like our bodies, is susceptible to a myriad of "infections" that can render our beloved computers into little more than frustrating paperweights. The accepted generic term for these programs is "computer virus", but viruses actually make up one part of the various detrimental programs out there.
In this issue of Tech Talk, I want to discuss the most common types of malicious programs, what they can do, and how to prevent them.
A malicious program, generically referred to as "malware", is defined as any type of program that negatively affects the effective operation of a computer system. These programs are broken into various categories based on what they do.
The three most common forms of malware are viruses, worms, and Trojans.
I'm certain that most people reading this article will be somewhat familiar with these three terms, but not what each of these types of malware specifically does.
Viruses: By definition, a computer virus is a program that attaches itself to a program or database and then migrates through a computer network or system. Some can be relatively harmless, going unnoticed for extended periods, while others can be very destructive.
Viruses can be programmed to activate when certain conditions are met, or when a specific key or command is entered, at which point, it will begin to alter or delete files. Viruses that simply delete files can cause a complete loss of data or even the operating system itself, while others can actually rewrite the parameters by which a computer safely operates, causing system damage.
An example of this would be a virus that tells a computer or servers internal cooling system to shut down or not activate when a specific temperature is reached, at which time, the computer may burnout components.
Worms: This type of program does not attack or destroy files per se. Rather; it is a special type of virus that, once in a system, begins to replicate uncontrollably. This has the effect of taking up memory space and using system resources. Think of it as a cancer, when cells begin to multiply out of control. While the information on the computer will be undamaged, the overuse of resources will slow or even prevent a computer system from functioning. In these situations, the computers tend to freeze or will not even make it through a normal boot phase.
Trojan Horses: Just like the mythology of Troy, the horse looked great on the outside, but it was not until it was brought into the city that the trouble occurred. Trojan horses are programs that look great on the outside, but may contain viruses or worms within their programming. Most of the time, Trojan horses can be contained in various free applications available for download from the internet. Some of the more common ones can be free games, screen savers, or generic coupon applications.
Have you ever seen the little pop-ups that say: "viruses detected on your computer, click here for free virus scan", or "You've won a <insert vacation/prize>", or "click for free information on <insert service here>".
These can also contain Trojans horses that will load a virus into your computer, creating any number of issues.
In one instance, a client's computer functioned normally, even though a virus was active in his system. Unbeknownst to him, his computer had become part of a Robot Network. The technical term for a computer affected in this way is "Zombie".
Yes, that's right; there are Zombies on the internet!
A Zombie is a computer that can be remotely controlled for nefarious purposes. Unscrupulous individuals who deploy viruses for this purpose are attempting to create a "robot network" of Zombies, or Botnet.
A person controlling a botnet can harness the calculating power of those computers to crack passwords, send junk email, or directly attack a specific target.
While the implications can be obvious, the effects on the individual computer itself can be difficult to detect. In one client's case, he was up late one evening and watched his computer simply "switch on" with no one seated at the desk. His monitor remained off the entire time.
So, what can happen when these things get into your system? It really depends on the intent of the individual creating these programs. Whatever the intent of the programmer, once the malicious program is in place, chances are you will need to have someone remove them.
So, how do you prevent these little beggars from getting into your system in the first place? You can use several preventive measures.
First: Have a good, up to date anti-virus program in place. Anti-virus software companies spend vast amounts of time and money researching the profiles of malicious software in order to prevent infestation of a computer. Mostly, they do a good job, though no one anti-virus suite will catch everything.
Second: Perform periodic checks and maintenance on your computer in order to make sure that nothing unwanted remains. This process removes old data and obsolete information, freeing up disk space and ensuring your system runs smoothly.
Third: Know who your friends are. I say this simply because one of the most effective delivery methods of malicious software is through email. If you receive an email from someone you do not recognize, don't open it.
This is the proverbial "Big Red Button". You see it…its right there…you know you shouldn't…but…
If you receive an email that contains a name that you recognize, but the sending address is different, do not open it. Also, call that person and let them know since their system may have been compromised.
Finally, police your activity! If you're an avid couponer, get your coupons from the manufacturer, or from a trusted coupon site. If an unwanted pop-up appears on your screen, delete it. If you suspect there may be a problem, run your own anti-virus software, or contact a professional to check your system.
The creators of malicious software prey on the apathy of legitimate users. The more aware you are of the potential, the better you can protect yourself from unwanted situations.