Copy of `F-Secure - Malware Code glossary`

The wordlist doesn't exist anymore, or, the website doesn't exist anymore. On this page you can find a copy of the original information. The information may have been taken offline because it is outdated.


F-Secure - Malware Code glossary
Category: Technical and IT > Malware
Date & country: 23/11/2007, UK
Words: 25


ActiveX
ActiveX is a set of technologies from Microsoft that enables interactive content for the World Wide Web. As ActiveX security settings in Internet Explorer can allow web pages to secretly install ActiveX controls automatically, they can be a significant security threat. ActiveX controls can access files on your hard drive.

Browser Helper Object (BHO)
A program that runs automatically every time a browser is launched. It is meant to extend the functionality of the browser, but it can also track how you use the Internet.

Data miner
A data miner is a program that can collect information on how you browse and use websites. The collected information can include data gathered from forms you fill in and submit. Usually data miners work without your knowledge.

Dialer
A dialer is a program which tries to connect to an expensive pay-per-minute phone number using the modem. Most dialers work without your awareness or permission.

Hoax
A chain letter that usually spreads a false virus warning.

Hosts file
The Hosts file is a lot like an address book. When you type an address into your web browser, the address is translated into a numeric IP address. If the address can be found from the Hosts file, your computer will use it. If not, your computer will connect to the DNS service of your Internet Service Provider. Some malware can edit your Hosts file to hijack and redirect a web connection to a completely different site in the Internet.

Joke
A program with annoying or funny functionality, but it`s not destructive.

Malware
A common name for all kinds of unwanted software such as viruses, worms, trojans and jokes.

Misc
Programs which do not fit the other categories. There is no sign of their installation until after the installation is completed and the program is present in the system. This category includes items looked for in the Hosts file as a part of a redirected Hosts file hijack.

Monitoring tool
A monitoring tool can monitor and record all computer activities, including each keystroke you type on the keyboard.

Multipartite virus
A virus composed of several parts. Every part of a multipartite virus needs to be cleaned away, to give assurance of non-infection.

On-access scanner
Real-time scanner, a background process that provides a constant guard against viruses.

On-demand scanner
A virus scanner which is started manually.

Polymorphic virus
A virus which changes itself (mutates) as it passes through host files, making disinfection a serious challenge.

Real-time scanner
A scanner that operates in the background, allowing a user to continue working at normal speed, with no significant slowing.

Replication mechanism
A mandatory part of every virus and worm. If it doesn`t have a replication mechanism, it`s by definition not a virus or worm.

Spyware of type Malware
A program which performs such actions as creating unsolicited pop-ups, hijacks home/search pages or redirects browsing results.

Stealth virus
A virus that hides itself by intercepting disk access requests. When an anti-virus program tries to read files or boot sectors to find the virus, the stealth virus feeds the anti-virus program a clean image of file or boot sector.

Time bomb
Destructive action triggered at some specific date or time.

Tracking cookies
Tracking cookies track your web browsing habits. They can collect information about pages and advertisements you have seen or any other activity during browsing. Different websites can share tracking cookies, and each website with the same tracking cookie can read the information and write new information into it.

Trojan Horse
A program with hidden destructive functionality.

Virus
A computer program that replicates by attaching itself to another object.

Vulnerability
Vulnerabilities open security holes that can allow other applications to connect to the system without your authorization or knowledge.

Worm
A worm is a program that can replicate itself by sending copies in e-mail messages or over a network.

Worm
A computer program that replicates independently by sending itself to other systems.