Security Information and Review

Collection of security information and review

Overview, Explainations and Solutions of Malicious Code

Author : Admin

In this discussion, we will provides an overview of malicious code and explain the basic principles of how malicious code works. Malicious code is simply one of an attacker tools to penetrate or disrupt systems. So, when a malicious code attack occurs, administrators will be focus on restoring operations as quickly as possible so that the loss of productivity and or other types of impact can be minimize.


If we understanding how malicious code works can help to develop defensive strategies, select the best security product such as antivirus program or firewall and train employees on how to identify potential threats. We will explain the various types of malicious code that have caused computer users problems in the past.


The most popular of malicious code is e-mail virus, that it’s infection on a computer without user’s consent. It use mass mailers program to sent with random recipients and generally replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program. It’s be combined with socially engineered e-mail message that can be used to prompt computer users to open and thus execute a virus.






Others the most popular of malicious code is Trojans and other backdoors. With this malicious code, creator’s malicious code can execute an unauthorized command or set of commands on a computer infected by the code. Trojan is a basic type of malicious code designed primarily to give the creators of malicious code to access system, such as change file settings, steal password or files and monitor user activities.


Other type of malicious code is worms. It’s a program that originates on a single computer and searches for other computers connected through a local area network or internet connection then it’s will replicates itself onto others computer. It’s will continuous to attempt to replicate itself indefinitely or until a self timing mechanism halts the process.


Spyware is one of malicious code that it’s used to gathers information about a person or organization without their knowledge or consent. Generally, spyware can be installed on a computer through several covert means, including as part of a software virus or new program. The terms spyware used to describe the same or similar types of malicious code, such as stealware, adware, malware and others.


The best solution to prevent side effect of the malicious code, we must install anti virus program and periodically update. At some time ago, anti spyware not include in the anti virus program. Now, majority of producers anti virus program have included anti spyware in their program. Increasingly, most administrator security have turned to new techniques to combat the rise in malware variants. Some use heuristics, or rules of thumb, to spot programs that are similar rather than identical to the ones they have seen before.




Mohamad Widodo

Mohamad Widodo

Share and Enjoy: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • Netvouz
  • DZone
  • ThisNext
  • MisterWong
  • Wists
  • Technorati
  • YahooMyWeb
  • Slashdot
  • StumbleUpon
Categories: Virus Security
If you like this posts, please leave messages / comments.