All services rendered by myself through this Google Site are subject to this disclaimer.
Malware is short for Malicious Software. Malware is computer software that can be used for many different functions such as compromising computer functions, stealing data, bypassing security or causing harm to the computer. Each infection typically has a name such as some well known infections: Zeus, Kelihos or Zero Access. Below are the most common types of Malware:
• Bots – Bots are single computers infected within a botnet. These computers are being remotely controlled by a program to perform different tasks. They can be written to cause DDoS attacks, spamming or distributing other malware.
• Root kits – Root kits are designed for remote access or controlling the infected computer without detection. Detection and removal is extremely difficult due to its programming. Root kits usually require manual removal or removal tools.
• Trojans – Trojans try to disguise themselves as a normal file, then trick the user to installing different malware. Once the pc is infected the Trojan is able to modify and steal data, among other things.
• Worms – Worms spread by using exploits in operating systems. Often worms can cause harm to their host by consuming bandwidth or overloading servers. They can also use coding to cause different malicious activities.
Please be aware of the following types of malware that may affect your network or your devices.
Adware
Programs that secretly gather personal information through the Internet and relay it back to another computer, generally for advertising purposes. This is often accomplished by tracking information related to Internet browser usage or habits.
Dialers
Programs that use a system, without your permission or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges.
Hack Tools
Tools used by a hacker to gain unauthorized access to your computer. One example of a hack tool is a keystroke logger -- a program that tracks and records individual keystrokes and can send this information back to the hacker.
Hoaxes
Usually an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus. Hoaxes are detectable as having no file attachment, no reference to a third party who can validate the claim, and by the general tone of the message.
Joke Programs
Programs that change or interrupt the normal behavior of your computer, creating a general distraction or nuisance. Harmless programs that cause various benign activities to display on your computer (for example, an unexpected screen saver).
Remote Access
Programs that allow another computer to gain information or to attack or alter your computer, usually over the Internet. Remote access programs detected in virus scans may be recognizable commercial software, which are brought to the user's attention during the scan.
Spyware
Stand-alone programs that can secretly monitor system activity. These may detect passwords or other confidential information and transmit them to another computer.
Trojans
A "Trojan Horse" – a program that neither replicates nor copies itself, but causes damage or compromises the security of the computer.
Viruses
A program or code that replicates; that is, infects another program, boot sector, partition sector, or document that supports macros, by inserting itself or attaching itself to that medium. Most viruses only replicate, though, many do a large amount of damage as well.
Worms
A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort.
BOTs and BOTNETs
A botnet is a collection of software agents, or robots, that run autonomously and automatically. The term is most commonly associated with IRC bots and more recently malicious software, but it can also refer to a network of computers using distributed computing software.
Open Proxies
An open proxy is a proxy server that is accessible by any Internet user. Generally, a proxy server allows users within a network group to store and forward Internet services such as DNS or web pages to reduce and control the bandwidth used by the group. With an open proxy, however, any user on the Internet is able to use this forwarding service.
If your device is already infected with malware and you don't know what to do, please click the button below for a process on what you can do if you've been infected.