Estudio Sobre Virus Informáticos

Páginas: 56 (13899 palabras) Publicado: 11 de noviembre de 2012
Norman Book on Computer Viruses

Unread email

Compact disk

Log statistics

Configure

Quarantine

Diskette

Read email

Peace of Mind Norman is one of the world’s leading companies within the field of data security. With products for virus control, spam control, email control, download control, personal firewall, encryption, data recovery, certified data erasure and computerforensics, the company plays an important role in the data industry.
www.norman.com

Norman ASA is not liable for any other form of loss or damage arising from use of the documentation or from errors or deficiencies therein, including but not limited to loss of earnings.

In particular, and without the limitations imposed by the licensing agreement with regard to any special use or purpose,Norman ASA will in no event be liable for loss of profits or other commercial damage including but not limited to incidental or consequential damages.

The information in this document as well as the functionality of the software is subject to change without notice. No part of this documentation may be reproduced or transmitted in any form or by any means, electronic or mechanical, includingphotocopying, recording or information storage and retrieval systems, for any purpose other than the purchaser's personal use, without the explicit written permission of Norman ASA. Contributors to The Norman Book on Viruses: Snorre Fagerland, Sylvia Moon, Kenneth Walls, Carl Bretteville Edited by Yngve Ness The Norman logo is a registered trademark of Norman ASA.

Names of products mentioned inthis documentation are either trademarks or registered trademarks of their respective owners. They are mentioned for identification purposes only.

Norman documentation is Copyright © 1990-2003 Norman ASA. All rights reserved.

Last revised February 2003.

Copyright © 1990-2003 Norman

Contents ! v

Contents
Contents........................................................................................................v Introduction .................................................................................................7 What is a virus? ...........................................................................................8 What is a program ................................................................................ 8 What is residency................................................................................. 9 Malware classes overview.................................................................... 9 Virus ..................................................................................................... 9 Worm.................................................................................................. 10 Trojans, backdoors,security risks ...................................................... 10 Denial-of-service tools, nukers, mail bombers .................................. 10 Hacking tools, virus creation kits....................................................... 11 Bugs, logic bombs, time bombs ......................................................... 12 Hoax................................................................................................... 12 Virus/worm types overview ....................................................................12 Boot virus ........................................................................................... 14 Multipartite virus................................................................................ 14 Binary file virus......................................................................................14 Script file viruses ....................................................................................17 Macro virus .............................................................................................19 How it works ...................................................................................... 19 Why it’s such a...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Ensayo Sobre Los Virus Informaticos
  • Ensayo sobre virus informatico
  • Preguntas Mas Frecuentes Sobre Virus Informaticos
  • Todo sobre virus informaticos
  • Taller Sobre Virus Informaticos
  • Ensayo sobre virus informaticos
  • Virus y anti-virus informáticos
  • Que es un virus informático

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS