9/16/2008

INTERNET THREATS

In World Wide Webs (www) there is to many threats, they hide in computer system and would be able to harm your computer, it’s very annoying….

Virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD.

Spam is unsolicited e-mail on the Internet. (E-mail that wanted is sometimes referred to as ham). From the sender’s point-of-view, spam is a form of bulk mail, often sent through e-mail distribution lists. To the receiver, it usually seems like junk e-mail.

Bot is the term that describes a remote control program loaded on a computer, usually after a successful invasion, that is often used for nefarious purposes. Several bots can be combined into a botnet, a network of compromised machines that can be remotely controlled by the attacker. Botnets in particular pose a severe threat to the Internet community, since they enable an attacker to control a large number of machines. Attackers primarily use them for attacks against other systems, mass identity theft, or sending spam

DDos (Distributed Debnial of Service) is a form of an attack by multitude of compromised systems attacking a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users

Spyware is actually any technology that aids in gathering information about a person or organization without their knowledge. On the internet ( where it is sometimes called spybot or tracking software), spyware is programming that is put in someones’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as software virus or as the results of installing a new program.

Malware ( for “malicious software”) is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan Horses, and also spyware programming that gathers information about a computer user without permission.

Phishing is an e-mail froud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically the messages appear to come from well known and trustworthy websites. Web sites that are frequently spoofed by phishers include PayPal, Ebay, MSN, Yahoo, BestBuy and America Online. A phishing expedition, like the fishing expedition it’s named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.

Spoofing activity is to deceive for the purposes of gaining access to someone else’s resources (for example, to fake an Internet address so that one looks like a certain kind of Internet user)

E-mail Spoofing
is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.

IP Spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a web site, hijack browsers, or gain access to a network. Here’s how it works: The hijacker obtains the IP address of legitimate host and alters packet headers so that the legitimate host appears to be the source. When IP spoofing is used to hijack a browser, a visitor who types in the URL ( Uniform Resource Locator) of a legitimate site is taken to a fraudulent web page created by the hijacker.

Tidak ada komentar: