Search for Free 150,000+ Essays

Find more results for this search now!
CLICK the BUTTON to the RIGHT!

Need a Brand New Custom Essay Now?  click here

Virus Types, Malicious Code, Backdoor Attacks, and More

Virus and Hack Research Paper: Virus Types, Malicious Code, Backdoor Attacks, and More

ActiveX malicious code

ActiveX controls allow Web developers to create interactive, dynamic Web pages with broader functionality such as HouseCall, Trend Micro's free on-line scanner. An ActiveX control is a component object embedded in a Web page which runs automatically when the page is viewed. In many cases, the Web browser can be configured so that these ActiveX controls do not execute by changing the browser's security settings to "high." However, hackers, virus writers, and others who wish to cause mischief or worse may use ActiveX malicious code as a vehicle to attack the system. To remove malicious ActiveX controls, you just need to delete them.

Aliases

There is no commonly accepted industry standard for naming viruses and malicious mobile code. Each may be known by several different names or aliases. See for an explanation of Trend Micro virus-naming conventions.

Backdoor

A Backdoor is a program that opens secret access to systems, and is often used to bypass system security. A Backdoor program does not infect other host files, but nearly all Backdoor programs make registry modifications. For detailed removal instructions please view the virus description. See virus types for an explanation of Trend Micro virus-naming conventions.

Boot sector viruses

Boot sector viruses infect the boot sector or partition table of a disk. Computer systems are most likely to be attacked by boot sector viruses when you boot the system with an infected disk from the floppy drive - the boot attempt does not have to be successful for the virus to infect the hard drive. Also, there are a few viruses that can infect the boot sector from executable programs- these are known as multi-partite viruses and they are relatively rare. Once the system is infected, the boot sector virus will attempt to infect every disk that is accessed by that computer. In general, boot sector viruses can be successfully removed.

Computers infected since (date)

This table displays the number of infected computers, by region, since detection first became available for this virus. See World Virus Tracking Center for additional information.

Date of origin

Indicates when a virus was first discovered (if known).

Description

This is a brief summary of a virus listed in the Trend Virus Encyclopedia. For detailed technical information, click on the "Tech Details" tab.

Destructive viruses

In addition to self-replication, computer viruses...

Sign In Now to Read Entire Essay

Not a Member?   Create Your FREE Account »

Comments / Reviews

read full essay >>

Already a Member?   Login Now >

This essay and THOUSANDS of
other essays are FREE at eCheat.

Uploaded by:  

Date:  

Category:   Technology

Length:   3 pages (612 words)

Views:   6018

Report this Essay Save Essay
Professionally written essays on this topic:

Virus Types, Malicious Code, Backdoor Attacks, and More

View more professionally written essays on this topic »