Estudio Sobre Virus Informáticos
Unread email
Compact disk
Log statistics
Configure
Quarantine
Diskette
Read email
Peace of Mind Norman is one of the world’s leading companies within the field of data security. With products for virus control, spam control, email control, download control, personal firewall, encryption, data recovery, certified data erasure and computerforensics, the company plays an important role in the data industry.
www.norman.com
Norman ASA is not liable for any other form of loss or damage arising from use of the documentation or from errors or deficiencies therein, including but not limited to loss of earnings.
In particular, and without the limitations imposed by the licensing agreement with regard to any special use or purpose,Norman ASA will in no event be liable for loss of profits or other commercial damage including but not limited to incidental or consequential damages.
The information in this document as well as the functionality of the software is subject to change without notice. No part of this documentation may be reproduced or transmitted in any form or by any means, electronic or mechanical, includingphotocopying, recording or information storage and retrieval systems, for any purpose other than the purchaser's personal use, without the explicit written permission of Norman ASA. Contributors to The Norman Book on Viruses: Snorre Fagerland, Sylvia Moon, Kenneth Walls, Carl Bretteville Edited by Yngve Ness The Norman logo is a registered trademark of Norman ASA.
Names of products mentioned inthis documentation are either trademarks or registered trademarks of their respective owners. They are mentioned for identification purposes only.
Norman documentation is Copyright © 1990-2003 Norman ASA. All rights reserved.
Last revised February 2003.
Copyright © 1990-2003 Norman
Contents ! v
Contents
Contents........................................................................................................v Introduction .................................................................................................7 What is a virus? ...........................................................................................8 What is a program ................................................................................ 8 What is residency................................................................................. 9 Malware classes overview.................................................................... 9 Virus ..................................................................................................... 9 Worm.................................................................................................. 10 Trojans, backdoors,security risks ...................................................... 10 Denial-of-service tools, nukers, mail bombers .................................. 10 Hacking tools, virus creation kits....................................................... 11 Bugs, logic bombs, time bombs ......................................................... 12 Hoax................................................................................................... 12 Virus/worm types overview ....................................................................12 Boot virus ........................................................................................... 14 Multipartite virus................................................................................ 14 Binary file virus......................................................................................14 Script file viruses ....................................................................................17 Macro virus .............................................................................................19 How it works ...................................................................................... 19 Why it’s such a...
Regístrate para leer el documento completo.