远程管理特洛伊木马(RAT)病毒
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
远程管理特洛伊木马(RA T)病毒
远程管理特洛伊木马(rat)病毒
rats
the world of malicious software is often pided into two types: viral and nonviral. viruses are little bits of code that are buried in other codes. when the “host” codes are executed, the viruses replicate themselves and may attempt to do something destructive. in this, they behave much like biological viruses.
worms are a kind of computer parasite considered to be part of the viral camp because they replicate and spread from computer to computer.
a s with viruses, a worm”s malicious act is often the very act of replication; they can overwhelm computer infrastructures by generating massive numbers of e-mails or requests for connections that servers can”t handle.
worms differ from viruses, thou gh, in that they aren”t just bits of code that exist in other files. they could be whole files--an entire excel spreadsheet, for example. they replicate without the need for another program to be run.
remote administration types are an example of another kind of nonviral malicious software, the trojan horse, or more simply trojan. the purpose of these programs isn”t replication, but to penetrate and control. that masquerade as one thing when in fact they are something else, usually something destructive.
there are a number of kinds of trojans, including spybots, which report on the web sites a computer user visits, and keybots or keyloggers, which record and report the user