Kaspersky Lab Internet Security 2009 Limited Edition Información técnica Pagina 23

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 95
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 22
Threats to computer security 23
TYPE
NAME
DESCRIPTION
Trojan-
Droppers
Trojan program-
droppers
These programs save programs
containing other Trojan programs on the
computer's disk and then install them.
Intruders can use Trojans-Droppers:
install a malware programs without the
user's knowledge: trojans-droppers do
not display any messages or do display
false messages, for example, notifying
about an error in the archive or about
using the wrong version of the
operating system;
protect another known malware
program from being detected: not any
anti-virus program can detect a
malware program located inside a
trojan-dropper.
Trojans-
Notifiers
Trojans-notifiers
They notify the intruder that the infected
computer is connected; and then - transfer
information about such computer to the
intruder, including: IP address, number of
an open port or the e-mail address. They
communicate to the intruder by e-mail, via
FTP, by accessing the intruder's web
page or using other methods.
Trojans-notifiers are often used in sets
comprised of various Trojan programs.
They notify the intruder that other Trojan
programs are successfully installed on the
user's computer.
Trojans-
Proxies
Trojans-Proxies
They allow the intruder to access web
pages anonymously using the user's
computer and are often used to send
spam.
Vista de pagina 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 94 95

Comentarios a estos manuales

Sin comentarios