Computers understand electronic signals values 0 or 1. Languages allow the programmer to specify what a program must do without having to write long strings of zeros and ones, but using words instructions that are more easily understood by people. A system of rules and specifications that enables and governs the communication between to computers or IT devices data transfer. A proxy sever acts as a middle-man between an internal network, such as an Intranet, and the connection to the Internet.
In this way, one connection can be shared by various users to connect to an Internet server. The area next to the Windows Start button or menu, which contains shortcut icons to certain items and programs: e-mail, Internet, antivirus , etc. This access could pose a threat if it is not done correctly or for legitimate purposes.
Among other things, the action by which a virus propagates or makes copies of itself, with the aim of furthering the spread of the virus. A system governing privilege levels in a microprocessor, controlling the operations that can be performed and its protection. There are various levels: Ring0 administrator , Ring1 and Ring2 administrator with less privileges , Ring3 user. This is a type of memory which under normal circumstances cannot be written on, and therefore its content is permanent.
A program designed to hide objects such as processes, files or Windows registry entries often including its own. This type of software is not malicious in itself, but is used by hackers to cover their tracks in previously compromised systems. There are types of malware that use rootkits to hide their presence on the system. Invariable sequence of instructions, that make up part of a program and can be used repeatedly.
Any illegal plot or fraud in which a person or group of persons are tricked into giving money, under false promises of economic gain trips, vacations, lottery prizes, etc. This action can sometimes be considered an attack or threat. These files, which have the extension SCR, could be Windows screensavers or files written in Script language. This is a program that displays pictures or animations on the screen.
Set of additional files applied to a software program or application to resolve certain problems, vulnerabilities or flaws. This covers anything that can have negative consequences for the user of the computer. For example, a program for creating viruses or Trojans. IT system computer that offers certain services and resources communication, applications, files, etc. Evaluation versions of a software product that allow users to try out a product for a period of time before buying it. Shareware versions are normally free or significantly cheaper than complete versions.
This is like the virus passport number. A sequence of characters numbers, letters, etc. Files, programs, applications and operating systems that enable users to operate computers or other IT systems. These are the elements that make the hardware work. Unsolicited e-mail, normally containing advertising. These messages, usually mass-mailings, can be highly annoying and waste both time and resources.
A program that allows the mass-mailing of unsolicited, commercial e-mail messages. It can also be used to mass-mail threats like worms and Trojans. This attack uses phishing techniques but is aimed at a specific target.
The creator of this type of attack will never use spam to obtain a massive avalanche of personal user data. The fact that it is targeted and not massive implies careful preparation in order to make it more credible and the use of more sophisticated social engineering techniques..
Programs that collect information about users' browsing activity, preferences and interests. The data collected is sent to the creator of the application or third-parties, and can be stored in a way that it can be recovered at another time. Spyware can be installed with the user consent and awareness, but sometimes it is not. The same happens with the knowledge or lack of knowledge regarding data collected and the way it is used.
A standard programming language aimed at enabling the administration and communication of databases. It is widely used in the Internet e. A sample of malware has statistics whenever its infection percentage is among the 50 most active threats. A section that appears at the bottom of the screen in some Windows programs with information about the status of the program or the files that are in use at the time.
A technique used by viruses to infect computers unnoticed by users or antivirus applications. Each of the sub-groups into which a type is divided.
In this case, a group of viruses or threats within the same category or type, with certain characteristics in common. These are the actions or effects that a virus could have when it infects a computer including trigger conditions. Applications which normally run independently when a system is started up and which close, also independently, on shutting down the system.
Attacks aimed specifically at a person, company or group and which are normally perpetrated silently and imperceptibly. These are not massive attacks as their aim is not to reach as many computers as possible. The danger lies precisely in the customized nature of the attack, which is designed especially to trick potential victims.
A list of all programs and processes currently active normally in the Windows operating system. The real name of a virus , which also defines its class or family. This is a file that defines a set of initial characteristics that a document should have before starting to work with it. All programs that monitor the actions of users on the Internet pages visited, banners clicked on, etc.
Strictly speaking, a Trojan is not a virus , although it is often thought of as such. Really they are programs that, enter computers appearing to be harmless programs, install themselves and carry out actions that affect user confidentiality.
A technique used by some viruses to foil antivirus protection. Antiviruses are constantly becoming more powerful and adapting to the new technologies used by viruses and virus writers. If they are not to become obsolete, they must be able to detect the new viruses that are constantly appearing. To do this, they have what is called a Virus Signature File. This is a file compression tool Ultimate Packer for eXecutables which also allows programs compressed with this tool to be run without having to be decompressed.
An antivirus technique that allows file information to be stored, and posible infections detected when a change is noted in the file. A variant is a modified version of an original virus, which may vary from the original in terms of means of infection and the effects that it has.
Viruses are programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable. A malicious program intended to create new viruses without having any programming skills, as it has an interface that allows to choose the characteristics of the created malware: type, payload, target files, encryption, polymorphism, etc. This is a partition of a hard disk, or a reference to a complete hard disk.
This term is used in many networks where there are shared disks. Flaws or security holes in a program or IT system, and often used by viruses as a means of infection. A network of interconnected computers over a large geographical area, connected via telephone, radio or satellite. This is the main area of Windows that appears when you start up the computer.
From here you can access all tools, utilities and programs installed on the computer, via shortcut icons, options in the Windows Start menu, the Windows taskbar, etc. It is very useful for getting an organized view of all directories. This is a file that stores all configuration and installation information of programs installed, including information about the Windows operating system.
Area in the Windows taskbar usually in the bottom right corner of the screen , which contains the system clock, icons for changing system settings, viewing the status of the antivirus protection, etc.
This is a bar that appears at the bottom of the screen in Windows. The bar contains the Start button, the clock, icons of all programs resident in memory at that moment and shortcuts that give direct access to certain programs. A service for determining names associated with computers in a network and allowing access to them.
A computer contains a database with IP addresses e. One of the computers connected to a local network that uses the services and resources in the network. A workstation does not normally provide services to other machines in the network in the same way a server does. This is similar to a virus , but it differs in that all it does is make copies of itself or part of itself.
These rights or permissions allow a user or a program to write to a disk or other type of information storage unit. This is a technique used to allow files on a disk or other storage device to be read but to prevent users from writing on them. The system that enables you to batch process files and allows access to Windows functions via programming languages such as Visual Basic Script and Java Script script languages.
Those viruses that are not in circulation and that only exist in places like laboratories, where they are used for researching the techniques and effects of viruses. Panda Security Info Glossary Technical definitions related to viruses and antivirus, essential to know them better and protect against attack. Administrator rights:. Banker Trojan:.
Country of origin:. Damage level:. Deleted items:. Detection updated on:. Direct action:. Distribution level:. DNS Domain name system :. First Appeared on Hacking tool:. Heuristic scan:. Identity Theft:. In circulation:. Interruption vector:. Means of transmission:. Mutex Mutual Exclusion Object :. Viruses are submicroscopic, which means that you cannot see them in the microscope. What's interesting about viruses is that they have two or three components.
Starting from the inside, you will have a nucleic acid, which can be either RNA or DNA, and in both cases the nucleic acid can be either single-stranded or double-stranded. Then surrounding the nucleic acid will be a protein coat that's in the form of capsid, or little small units that are assembled in a certain way.
That is what all viruses have. Now, some viruses will also have an envelope which they obtain as they emerge from the cell.
Contact Us. A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk. See malicious code. A virus cannot run by itself; it requires that its host program be run to make the virus active.
Comments about specific definitions should be sent to the authors of the linked Source publication.
0コメント