Backdoor

How to prevent Backdoors? For malicious hackers person must to understanding about security awareness in malware activity because the policy of association in computer security will take the legislation for offenders. Authorities must to control and enforce the policies to minimizing of malware. Each company must ensure that workers do not have a criminal record [...]

Adware

How to prevent? There is no better way to prevent your devices from Adware or any malware other than to install an antivirus software or anti adware tool. These preventive software will be able to recognize the pattern of Adware or spyware and delete it from the device for good. However, users must make sure [...]

Trojan Horse

"Motherhood is the strangest thing, it can be like being one's own Trojan horse!" - Rebecca West Background Trojan Horse Trojan horse is a term for a program looks typical but actually has a malicious purpose. The term comes from Greek mythology about Trojan War. A large wooden horse given to the city of Troy [...]

Rootkits

“Rootkits is Not Virus , rootkits is just a technology“ Background of RootKit Rootkits are not a new technology. Modern rootkit are the same methods used in viruses in the 1980s . The viruses during this era used floppy disks and BBS’s (bulletin board systems) to spread infected programs. Early 1990s a hacker would penetrate [...]

References

Trojan Charles P.Pfleeger & Shari Lawrence Pfleeger. (2012). Analyzing Computer Security : A Threat/Vulnerability/Countermeasure Approach. Prentice Hall. Pearson. Michael A. Davis, Sean M.Bodmer, Aron. (2010). Hacking Exposed: Malware and Rootkits. United State. Mc Graw Hill. Micheal T. Goodrich & Roberto Tamassia. (2011). Introduction to Computer Security.  Pearson https://usa.kaspersky.com/internet-security-center/threats/trojans https://sites.psu.edu/trojanblog/   Virus Chuck Easttom (2006), Computer [...]

Virus

"After all, just one virus on a computer is one to many." -   Glenn Turner What is Virus? Virus is one of type from in a list of Malware. Virus is a program or code that enter into the computer and run without knowing by the owner of the computer. A virus can replicate [...]

Adware

Background of Adware Adware or advertising-supported software is usually related to advertising where this software will automatically display advertisements on the computer. It will pop-up on the display screen when user are online or sometimes even when they are not browsing the internet. This software often built into free software which user may download it online and [...]

Spyware

Background of Spyware * 16 October 1995, the word “spyware” was used for the first time in public. It come-out on Usenet, in an article for the purpose of Microsoft's business model. Spyware at first was used for espionage purposes. * The founder of Zone Labs, Gregor Freund, used the term of “spyware” in a [...]

Backdoor

"To know your enemy, You must become your enemy" -Sun Tzu Background of Backdoors BACKDOORS are not always bad. They can be very useful in finding security flaws.  Because auditors sometimes request backdoors in production programs so that they can insert fictitious but identifiable transactions into system, and trace the flow of these transactions through [...]