출처 : 외국 백신 Antivir
사용자의 동의 없이 침투하도록 설계된 소프트웨어이다. 악의,훼방,성가시며 합법적이지 않은 소프트웨어이다.
아래의 것들을 거의 총칭.
Adware
Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. Those advertising spots usually can't be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Backdoors
A backdoor can gain access to a computer by going around the computer access security mechanisms.
A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help, but are mainly used to install further computer viruses or worms on the relevant system.
백도어를 써서 컴퓨터의 접근 보안 구조를 우회하여 컴퓨터의 접근권한을 얻을 수 있다. 보통은 거의 무한의 접근권한을 얻게 만든다. 따라서 사용자의 데이터를 쉽게 염탐할 수 있지만, 그것보다 여기에 관련된 시스템에 바이러스나 웜을 설치하기위해 이용된다.
Boot viruses
The boot or master boot sector of hard drives is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more…
부트 섹터를 감염시킨다. 시스템 실행에 중요한 정보를 덮어씌운다. 결과 예 : 컴퓨터 로딩이 더이상 안된다. ;;
Bot-Net
A Bot-Net is collection of softwarre bots, which run autonomously. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial-of-service attacks, etc., partly without the affected PC user's knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.
... 봇넷은 보통 웜이나 트로이목마를 실행하고 있는 감염된 장치들의 집합이다. (공통의 명령과 제어를 받는다).
DOS공격에 사용될 수 있다.... 이 봇넷의 잠재력은,수천대의 컴퓨터 규모를 만들 수 있어 이 네트워크의 대역폭 총합이
자주쓰이는 인터넷 접근을 폭발(주: 비슷한 말로 과열, 폭발적인 쇄도등이 가능할듯)시킬 수 있다.
Dialer
A dialer is a computer programm that establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates when dialing up to the Internet without their knowledge.
EICAR test file
The EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file which is 68 characters long and its file extension is “.COM” all virus scanners should recognize as virus.
Exploit
An exploit (vulnerability) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Grayware
Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically.
Hoaxes
The users have obtained virus alerts from the Internet for a few years and alerts against viruses in other networks that are supposed to spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the "danger".
Honeypot
A honeypot is a service (program or server), which is installed in a network.
It has the function to monitor a network and to protocol attacks. This service is unknown to the legitime user - because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.
Keystroke logging
Keystroke logging is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Like this, confidential and personal data, such as passwords or PINs, can be spied and sent to other computers via the Internet.
Macro viruses
Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application.
Polymorph viruses
Polymorph viruses are the real masters of disguise. They change their own programming codes - and are therefore very hard to detect.
Program viruses
A computer virus is a program that is capable to attach itself to other programs after being executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits his virulent code. The program execution of the host itself is not changed as a rule.
컴퓨터 바이러스는 실행되면 다른 프로그램에 붙어서 감염을 일으킨다. 바이러스는 자기 자신을 증식시킨다. 웜과 다르게 바이러스는 숙주가 될 어떤 프로그램이 필요해서, 거기에 자신의 악성코드를 넣는다. 보통은 숙주 프로그램 자체의 실행은 바뀌지 않는다.
Scareware
The term scareware refers to software which has been designed with the intent to cause anxiety or panic. The victim could be tricked and feels threatened and usually accepts an offer to pay and have the inexistent threat removed. In some cases the victim is seduced to cause the attack himself by making him think this intervention will successfully remove the threat.
Script viruses and worms
Such viruses are extremely easy to program and they can spread - if the required technology is on hand - within a few hours via email round the globe.
Script viruses and worms use a script language such as Javascript, VBScript etc. to infiltrate in other new scripts or to spread by activation of operating system functions. This frequently happens via email or through the exchange of files (documents).
A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.
(웜이란 자기 자신을 증식 시키지만 호스트를 감염시키지 않는 프로그램이다(주:바이러스와 달리 독자적으로 실행되기 때문에 감염이라는 표현을 쓰지 않은 것 같다). 이것은 한정된 보안 정책을 가진 시스템에게 어떤 치명적인 프로그램을 침투시킬 가능성이 된다.위키피디아: 웜은 바이러스와 달리 스스로를 다른 컴퓨터로의 전달,자기복제가 될 수 있으며 이런 활동 자체로도 네트워크의 대역폭을 잠식,파일 전송기능을 착취하는 것이 된다.보통 여러가지 악의적인 동작을 하도록 만들어진다. 예를 들어 백도어 설치)
Security Privacy Risk (SPR)
The term "SPR/" ("Security or Privacy Risk") refers to a program which can damage the security of your system, trigger program activities you do not want or harm your private environment.
Spyware
Spyware are so called spy programs that intercept or take partial control of a computer's operation without the user's informed consent. Spyware is designed to expolit infected computers for commerical gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements. AntiVir is able to detect this kind of software with the category "ADSPY" or "adware-spyware".
스파이웨어는 사용자의 동의 없이 컴퓨터의 동작의 일부를 제어하거나 가로채는 프로그램이다.이것은 상업적 이득을 위해 감염된 컴퓨터를 착취한다. 이 목적을 위한 전형적인 전략으로 요구되지 않는 팝업 광고를 전달하는 것이 있다.( 다음문장은 AntiVir 광고 ;)
Trojan horses (short Trojans)
Trojans are pretty common nowadays. We are talking about programs that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses cannot multiply themselves, which differenciates them from viruses and worms. Most of them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that 'drops' viruses, i.e. embeds viruses on the computer system.
트로이 목마는 요즌 매우 흔하다. 특정 기능을 가지는 것으로 보이지만(겉으로는 무해한 것처럼 혹은 오히려 유용한 것처럼) 실행하면 자신의 본색을 드러내 다른 기능(보통 파괴적인)을 수행하는 것을 말한다. 트로이 목마는 자시 자신을 증식 시킬 수 없다. (이것이 웜과 바이러스와의 차이다) 트로이 목마는 보통 사용자로 하여금 트로이 목마를 실행시키도록 유도하는 이름을 갖는다. 실행되면 활성화되어 예를 들어 하드 드라이브를 포맷할 수도 있다. 드롭퍼는 트로이목마의 한 형태로,바이러스를 떨군다. 즉 바이러스를 컴퓨터에 침투 시킨다.
Zombie
A Zombie-PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. The affected PC, for example, can start Denial-of-Service- (DoS) attacks at command or send spam and phishing emails.
Virus Science
Malware사용자의 동의 없이 침투하도록 설계된 소프트웨어이다. 악의,훼방,성가시며 합법적이지 않은 소프트웨어이다.
아래의 것들을 거의 총칭.
Adware
Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. Those advertising spots usually can't be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Backdoors
A backdoor can gain access to a computer by going around the computer access security mechanisms.
A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help, but are mainly used to install further computer viruses or worms on the relevant system.
백도어를 써서 컴퓨터의 접근 보안 구조를 우회하여 컴퓨터의 접근권한을 얻을 수 있다. 보통은 거의 무한의 접근권한을 얻게 만든다. 따라서 사용자의 데이터를 쉽게 염탐할 수 있지만, 그것보다 여기에 관련된 시스템에 바이러스나 웜을 설치하기위해 이용된다.
Boot viruses
The boot or master boot sector of hard drives is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more…
부트 섹터를 감염시킨다. 시스템 실행에 중요한 정보를 덮어씌운다. 결과 예 : 컴퓨터 로딩이 더이상 안된다. ;;
Bot-Net
A Bot-Net is collection of softwarre bots, which run autonomously. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Boot-Nets server various purposes, including Denial-of-service attacks, etc., partly without the affected PC user's knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.
... 봇넷은 보통 웜이나 트로이목마를 실행하고 있는 감염된 장치들의 집합이다. (공통의 명령과 제어를 받는다).
DOS공격에 사용될 수 있다.... 이 봇넷의 잠재력은,수천대의 컴퓨터 규모를 만들 수 있어 이 네트워크의 대역폭 총합이
자주쓰이는 인터넷 접근을 폭발(주: 비슷한 말로 과열, 폭발적인 쇄도등이 가능할듯)시킬 수 있다.
Dialer
A dialer is a computer programm that establishes a connection to the Internet or to another computer network through the telephone line or the digital ISDN network. Fraudsters use dialers to charge users high rates when dialing up to the Internet without their knowledge.
EICAR test file
The EICAR test file is a test pattern that was developed at the European Institute for Computer Antivirus Research for the purpose to test the functions of anti-virus programs. It is a text file which is 68 characters long and its file extension is “.COM” all virus scanners should recognize as virus.
Exploit
An exploit (vulnerability) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Grayware
Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically.
Hoaxes
The users have obtained virus alerts from the Internet for a few years and alerts against viruses in other networks that are supposed to spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the "danger".
Honeypot
A honeypot is a service (program or server), which is installed in a network.
It has the function to monitor a network and to protocol attacks. This service is unknown to the legitime user - because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is protocolled and an alert sets off.
Keystroke logging
Keystroke logging is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Like this, confidential and personal data, such as passwords or PINs, can be spied and sent to other computers via the Internet.
Macro viruses
Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application.
Polymorph viruses
Polymorph viruses are the real masters of disguise. They change their own programming codes - and are therefore very hard to detect.
Program viruses
A computer virus is a program that is capable to attach itself to other programs after being executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits his virulent code. The program execution of the host itself is not changed as a rule.
컴퓨터 바이러스는 실행되면 다른 프로그램에 붙어서 감염을 일으킨다. 바이러스는 자기 자신을 증식시킨다. 웜과 다르게 바이러스는 숙주가 될 어떤 프로그램이 필요해서, 거기에 자신의 악성코드를 넣는다. 보통은 숙주 프로그램 자체의 실행은 바뀌지 않는다.
Scareware
The term scareware refers to software which has been designed with the intent to cause anxiety or panic. The victim could be tricked and feels threatened and usually accepts an offer to pay and have the inexistent threat removed. In some cases the victim is seduced to cause the attack himself by making him think this intervention will successfully remove the threat.
Script viruses and worms
Such viruses are extremely easy to program and they can spread - if the required technology is on hand - within a few hours via email round the globe.
Script viruses and worms use a script language such as Javascript, VBScript etc. to infiltrate in other new scripts or to spread by activation of operating system functions. This frequently happens via email or through the exchange of files (documents).
A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.
(웜이란 자기 자신을 증식 시키지만 호스트를 감염시키지 않는 프로그램이다(주:바이러스와 달리 독자적으로 실행되기 때문에 감염이라는 표현을 쓰지 않은 것 같다). 이것은 한정된 보안 정책을 가진 시스템에게 어떤 치명적인 프로그램을 침투시킬 가능성이 된다.위키피디아: 웜은 바이러스와 달리 스스로를 다른 컴퓨터로의 전달,자기복제가 될 수 있으며 이런 활동 자체로도 네트워크의 대역폭을 잠식,파일 전송기능을 착취하는 것이 된다.보통 여러가지 악의적인 동작을 하도록 만들어진다. 예를 들어 백도어 설치)
Security Privacy Risk (SPR)
The term "SPR/" ("Security or Privacy Risk") refers to a program which can damage the security of your system, trigger program activities you do not want or harm your private environment.
Spyware
Spyware are so called spy programs that intercept or take partial control of a computer's operation without the user's informed consent. Spyware is designed to expolit infected computers for commerical gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements. AntiVir is able to detect this kind of software with the category "ADSPY" or "adware-spyware".
스파이웨어는 사용자의 동의 없이 컴퓨터의 동작의 일부를 제어하거나 가로채는 프로그램이다.이것은 상업적 이득을 위해 감염된 컴퓨터를 착취한다. 이 목적을 위한 전형적인 전략으로 요구되지 않는 팝업 광고를 전달하는 것이 있다.( 다음문장은 AntiVir 광고 ;)
Trojan horses (short Trojans)
Trojans are pretty common nowadays. We are talking about programs that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses cannot multiply themselves, which differenciates them from viruses and worms. Most of them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution they become active and can, for example, format the hard drive. A dropper is a special form of Trojan that 'drops' viruses, i.e. embeds viruses on the computer system.
트로이 목마는 요즌 매우 흔하다. 특정 기능을 가지는 것으로 보이지만(겉으로는 무해한 것처럼 혹은 오히려 유용한 것처럼) 실행하면 자신의 본색을 드러내 다른 기능(보통 파괴적인)을 수행하는 것을 말한다. 트로이 목마는 자시 자신을 증식 시킬 수 없다. (이것이 웜과 바이러스와의 차이다) 트로이 목마는 보통 사용자로 하여금 트로이 목마를 실행시키도록 유도하는 이름을 갖는다. 실행되면 활성화되어 예를 들어 하드 드라이브를 포맷할 수도 있다. 드롭퍼는 트로이목마의 한 형태로,바이러스를 떨군다. 즉 바이러스를 컴퓨터에 침투 시킨다.
Zombie
A Zombie-PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. The affected PC, for example, can start Denial-of-Service- (DoS) attacks at command or send spam and phishing emails.
'네트워크 및 분산시스템' 카테고리의 다른 글
Scalability (0) | 2010.05.16 |
---|---|
Distributed computing (분산 컴퓨팅) (0) | 2010.02.02 |
Node (0) | 2009.12.02 |
Smart Grid (From Wiki) (0) | 2009.10.30 |
SMTP command (0) | 2009.10.20 |