2011年8月19日星期五

What is Win32, Why is it Important, and What are the Dangers of Infection-4




What is Win32, Why is it Important, and What are the Dangers of Infection?


Win32 is the kernel interface Windows uses to communicate with the programs that run on it.  It is momentous because without it, the programs can't communicate with Windows.  And accordingly they can't run on it!

This means that for a program to work on Windows, it have to be proficient to communicate with the Win32 system.  This also means that under no circumstances should you erase it!  You wouldn't be the first human who resolved to take virus infection into their own hands, deleting infected files and folders, only to detect they had seriously muddled up their computer!

Many malicious coders and cyber-criminals take avail of this system's emotional ecology.  They have deranged rootkits, Trojan horses, and backdoors that attach themselves to the Win32 files.

Rootkits are procedures that give celebrity else the power to escape your computer!  They can change your passwords and way whichever message you have.  This can be primarily risky if you let your browser retention your email alternatively banking login message.

Rootkits also permit cyber-criminals to use your computer as an operating point for nefarious activities.  This method that, should someone illegally access the Pentagon (case in point), the forensic trail will guide right behind to your computer!


Many folk have listened of Trojans merely don't know exactly what they do.  This is for numerous techs and programmers not properly annotate it to the rest of us.  A Trojan is any program that appears benign on the surface, yet whose true feature is to let malicious software onto your computer.

Fake antivirus programs favor Antivirus XP 2008 are constantly Trojan horses that cater a download gateway into your computer for spyware, viruses, and other malicious software.

A backdoor is similar to a Trojan in that it contacts undesirable websites and downloads malicious programs ("malware") onto your computer.  The difference here is that a backdoor doesn't pretend as something it's no.  It doesn't disguise as anything, because it slips in undetectably at first!

Take for example the MTX piece of malware.  It is a virus that gets into your system, and then "gives birth" apt a worm (attaches itself apt email) and a backdoor.  The worm is an offer to spread the malware to additional systems (however occasionally it is imperfect aboard that front), and can also affect the email your receive.

The backdoor, on the other hand, opens your computer system to all kinds of threats.  You never know what might come through a backdoor, but you can wager it won't be something that helps you out!

(Some kinds of malicious software that come in through a Trojan or backdoor are called "rascal antispyware".  These fake security programs ambition simulate they can find infections your other security software can't.  Then, they will try to convince you to buy their worthless "upgraded" versions.)

All in always, if you watch that anything on your Win32 system is infected, don't try and repair it yourself!  Get some reliable anti-virus software--preferably something with a guarantee!

 




没有评论:

发表评论