Internet dissemination of malicious software, the role of
Internet has become the daily operation of various types of commercial enterprises is an important part. Web site is the company's existing and potential customers and key stakeholders as a major entry point for employees through the Web site for most of the business, and Email Communication with internal and external speed and efficiency has a profound influence, That is, small and medium business enterprises Email and Web access 90% for business-critical applications, Internet tools have greatly changed the business world, and produced a remarkable efficiency and productivity. However, these advantages are also malicious Software The authors use, beginning when the threat generated only a few months thousands of computers infected, and by the way just a few minutes on the Internet hundreds of thousands of infected computers.
Computer threats Since 1986, since the boot sector virus is found, the computer threats have become part of everyday computer applications. Boot sector virus will write its own floppy disk, and run through the user's computer to spread. By 1995, the boot sector virus, macro virus was replaced. Macro viruses are written by the scripting language, specifically for Microsoft WORD and EXCEL File . However, the boot sector virus and macro virus is slower, inefficient, dependent users through the floppy disk from one Computer Spread to another computer. So the desktop-based anti-virus software is sufficient to eliminate this type of threat.
Melissa virus hit in 1999 when a large degree of change, the first email-based threats, Melissa virus did not require artificial means spread from one computer to another computer. Instead, it uses Network Communication specific speed and efficiency, mode of transmission more quickly and more easily. Threat to the future of this type will be built based on the concept. From Email viruses, to worms, Web-based threats, Internet will become the new media.
Addition to good communication-effectiveness, Internet malware authors will publish and share their source code written to other authors of malicious code, simply on the basis of the existing code to make a few changes A new version of the threat will be activated through the network. Even if a program is developed for beginners, beginner or a script, can quickly and easily develop and publish new large-scale threats. Similarly, botnets and spam list owners start selling their malicious code, and made available to those of them created a distributed network.
Based on this new-found speed and efficiency, desktop antivirus software is not enough to protect computer security, as it can not keep pace with the speed and quantity of new and emerging threat.
Effective way to spread As noted above, Internet provides a threat of creating and disseminating computer-rich environment, the Internet, all computers can communicate with other computers connected. Malware authors quickly realized that they can use the network traffic capacity to spread threats, without the need for a computer infected with a time, and now the authors of these malicious software can simultaneously utilize a large number of their works.
Internet as a threat of spread of the birth provides a mechanism to threats of a lot of technical means, including Email, spam, worms and botnets Drive Of Download To spread the threat.
Virus
The threat of the first Internet-based communication through Email, such as Loveletter virus is through Email attachment open the attachment, the virus infection to the user's machine, then copy a copy of the victim's name as a hair the person to send to the victims Communication Email address recorded in the client's every Email address. In this way, the other recipients are sure they know the sender of the message, Loveletter virus in single day of time, resulting in up to five hundred million to seven hundred million U.S. dollars in losses. On the body of the message indicate that the message is a love letter to him, so that the recipient opens the attachment. This technology is considered a basic social engineering earlier version, simply, social engineering is a malicious software used on infected their system users through deceiving way, social engineering full advantage of the security software can not be defensive factors?? user's psychological characteristics.
I am an expert from Mp3 Player Manufacturers, usually analyzes all kind of industries situation, such as red travertine , discount travertine tile.