Please enter the following information to continue so that you will be able to return later to print your certificate.

Please enter a password

Please re-enter your password

Malware

Malware is a general term for unwanted software. It comes from the term Malicious Software and includes Spyware, Viruses, Trojans, Worms. There are many programs available to help protect your computer from Maware but one of the most important things to protect your computer is you! You should not open attachments from people you do not know or attachments that you do not recogonize.

IIn the 1980's and 1990's we thought of Malware only in terms of Viruses and Trojans. Many were created by hackers just to prove that they could get into your computer some were destructive others just proved that they were there. Today the reason for malware is MONEY. Much of what is considered Malware is actually commercial software used to track your habits so that companies can sell you stuff. Other Malware is out there to steal your identity. There are also still the viruses out there just to prove that someone can get it your system.

Sites for more information:

Virus

Viruses are small programs that attach themselves to other programs. They can attach to whatever program they are written for and then every time that program runs the virus is executed. The ones that we hear about most often now are email viruses.  Viruses need you to click on something to launch them.  They can be in the form of an executable file such as an exe file or a zip file or the can be inside of an attachment such as a Word document.

One of the most well known was the Melissa virus. It ran through systems in March of 1999. The Melissa virus was a piece of Visual Basic Programming (VBA) inside of a Word Document. VBA is a feature inside of the Office Suite of applications that allows for automation. Melissa was sent through email with a Word attachment. The reason that it spread so quickly was that it usually came from someone you knew so people were likely to open it.  The email subject was Important Message from <name> and in the body said “Here is the document that you asked for ... don't show anyone else ;-)” Once the attachment was opened, it launched the two phases of a virus. First it replicates. The Melissa virus sent itself to the first 50 people in your address book. Second, it attacks. The Melissa virus added “"Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game's over. I'm outta here."” into your document if the minute and hour matched the day and month. With this virus the biggest impact was really the overloading of servers. The servers could npot handle all of the simultaneous emails.

Sites for more information:

Worm

A worm is specific types of malware that can self propagate. You do not need to do anything for your computer to become infected. Just being on a network that has the worm will spread it to your computer. One of the most well known worms and fastest spreading was the Slammer which was released in 2003. This worm ran on a flaw in the Microsoft Operating System. Microsoft released a security patch for it but not before many computers had already been infected. This worm caused problems for network outages for airlines, ATM’s, schools and business around the world.

Sites for more information:

Trojan Horse

A Trojan is a piece of software that is hidden inside another program. Trojans can be hidden in any type of executable file. The host program often is a game or a useful looking utility that you download from the Internet. The Trojan is unleashed when the application is run. Often you will notice that your computer is running very slow.  Trojans can contain worms, viruses, spyware or intruders. A Trojan is considered the most dangerous form of malware because it opens your computer up to so many different possibilities. The two most common types of Trojans are Intruders and Spyware.

Intruder

Intruders open your computer to hackers. They have two parts, a client and a server. The server infects your computer and then acts as a server for the hacker to access your computer. The client part gives the hacker full access to your computer. Some of the common ones floating around now are the iCard and DHL Trojans. The icard is sent through email and looks like someone has sent you an electronic card; if you open it you will unleash the virus. The DHL or UPS Trojans are also sent through email and will say that you have a package waiting to be picked up.

Spyware

Spyware is often hidden inside “free” programs. Spyware may collect information about you and your computer usage or your web browsing or spending habits. Spyware often slows down your computer. It may change some of your computer setting and/or redirect you to different web pages. Spyware is usually used for commercial gain from companies trying to market their product. It may als0 take your personal information including your credit card numbers.

Take Quiz


Hint: Answer is one of the following: worm, trojan, malware or virus

Valid XHTML 1.0 Transitional