Malicious Software

In computer world, there is also a software which is created to do something bad and to perform criminal intension. This kind of software is called malicious software or malware. Malicious software can be divided into some categories:
a. Virus
b. Worm
c. Trojan Horse
d. Logic bomb
e. Time bomb
f. Malicious code, etc

But the most important categories are virus, worm, and Trojan horse. All of them can be identified by their replication.

a. VIRUS

Virus is a software that can replicate by injecting or infecting its own code into other file. By its way to infect other file, virus can be divided into three categories:
a. Overwriting
b. Appending
c. Prepending

Virus can be created using programming language since virus is actually a program. Anybody can write a program and run it. But the important point in programming a virus is a code for replicating a virus.

Other way in creating a virus is using a tool. This is the simplest and easiest way in creating a virus. This kind of tool is called virus generator or virus creator, or virus kit, or virus constructor, etc. You can search this tool using Google with those keywords. Using virus generator, anybody without any programming skill can create a virus, even if he is a new comer in computer world!

Below is a virus generator called Walrus Macro Virus Generator. As you can see in the picture, the way to create a virus using virus generator is just selecting some options and then hit the button Generate. A new virus is ready for you, just as instant as creating instant noodles

b. WORM

Worm is also a kind of malicious software. It is different from virus which is worm can not inject of infect other files. A worm is a software which replicates by creating its own copy. And without infecting other file.

Worm actually spreads through a network or the Internet using email. Below is a sample of worm called I Love You Worm I Love You spreads through the Internet as an email attachment. Pay attention at the attachment LOVE- LETTER-FOR-YOU.TXT.Vbs.

Usually worm will do something tricky to cheat email receiver. The first is using double file extension. At the left sample, worm I Love You uses two extension, those are TXT.VBS.

The second trick is using social engineering. At the above sample, the worm uses a name “I LOVE YOU” which might interested to every email receiver. Who doesn’t need love? So, the effect of these tricks are any body–the email receiver- will click that attachment which is actually a worm code.
Next Post Previous Post
No Comment
Add Comment
comment url