Jan 20, 2016

Introduce Malicious Software

http://www.aluth.com/2016/01/introduce-malicious-software.html
ydkslr uDÿldx. iy jhsria j¾. yÿkd.ksuq’

Tkak wms ys;=jd Thd,g w¨;a fohla lsh,d fokak’fudlo iuyr wh fï ms<sn| jeä ie,ls,a,la olajkafka kE’ kuq;a oekf.k


bkak tl f.dvla jákjd¡ ta ksid wms ys;=jd Thd,g lsh,d fokak mß.Kl j,g ydkslr uDÿldx. j¾. lsysmhla ms<sn|j’ .Kl moaO;shla Ndú;d lsÍfïoS úúO ;¾ck n,mEï t,a, fjkjfka’ ydkslr uDÿldx.(Malicious Software/Malware)  tfia;a fkdue;skï ydkslr fla;(Malicious Codes) u.ska .Kl j,g fyda .Kl cd, j,g we;slrk ydksh iq¿mgq tlla fkdfõ’ fyd|hs wms oeka n,uq fudkjo fï ydkslr uDÿldx. lsh,d’
  • mß.Kl ffjri (Computer Virus)
.Kl jevigyka yd iïnkaO fjñka ;udf.a msgm;a .Klh ;=< m;=rejk .Kl ffjri, cd, u.ska o, USB *a,EIa Odjl yd u;l ;eá jeks ndysr wdphk Wmdx. fyda úoHq;a ;eme,a weuqKqï u.skao .Klh wdl%uKh lrhs’ o;a;, uDÿldx. iy oDvdx. j,g ydks muqKqj iEu ffjria j¾.hlau iïnkaO jkafka Executable Files fyj;a l%shdldÍ f,aLk iu.h’ mrs.Klh fj; ffjrihla we;=,q jQ úg th iEu úgu moaO;sh ;=< il%shj mj;S¡

  • mß.Kl j¾ïia (Computer Worms)
 fuho ffjri yd iudk f,iska l%shdlrhs’ kuq;a Worms j,g ;ksju l%shd;aul ùug yd me;sÍug yelshdjla we;s w;r úoHq;a ;eme,a weuqKqï, jHdc fjí wvú, laIKslj we;sjk mKsúv rduq jeks mrs.Kl uQ,sl bkacsfkare Wml%u fhdod.kq ,efí’

  • T;a;=lrejka (Spyware)
1.fg%dacka wYajhd (Trojan Horse)

fuh .%Slhska úiska fg%dahs rdcHh hg;a lr .ekSu i|yd fhdod.kq ,enQ ,Sfhka ;ekQ wYajhd ksoiqka lr .ksñka kï lrk ,o fg%dacka wYajhd hkq ;ju;a ydkslr uDÿldx.hls’ fuh jHdc njla fmkakqï fkdlrk w;r fuh mßYs,lhdg fkdoekqj;aju moaO;shg iïnkaO fjhs’ wkjYH f,i újD; jk mß.Kl ljq¿ iy fjkia jk jev;, we;slrñka o f,aLk uld ouñka iy o;a; fidrlï lrñka o mßYS,lhd wmyiqjg m;a lrk fg%dacka wfkl=;a uDÿldx. mß.Klhg we;=¿ùu i|yd myiqlï i,ihs’

úoHq;a ;eme,a weuqKqï újD; lsÍu yd wka;¾cd,h Tiafia nd.; lrkq ,nk f.dkq iu. mß.Klh wdl%uKh lrkq ,nhs’ fg%dacka wYajhd wfkl=;a mß.Kl ffjri yd j¾ïia fuka fndaùu isÿ fkdlrhs’

2. wkjYH oekaùï (Adware)
 
wkjYH oekaùï mrs.Kl ;Srh u; o¾Ykh lsrSu fuu ydkslr uDÿldx.fha iajNdjhhs’ fuh mrs.Kl ffjri fuka ydksodhl fkdjqj;a mrsYS,lhd udkisl jYfhka mSvdjg m;a lrhs’

  • fndÜia (Bots)
fuh wfkl=;a cd, iu. iïnkaO;d ;nd.kakd iajhxl%Shj l%shd;aul jk ydkslr uDÿldx.hls’ laIKsl mKsjqv yd wka;¾cd, ixjdo u.ska fm!oa.,sl f;dr;=re /ia lr .ekSu ioyd Bots fhdod.efka’

  • fld,a,lrejd (Hijacker/ Browser hijacker)
fj<|, jdKsch iy fj<| m%pdr lghq;= i|yd ks¾udKh lrk ,o fuh mßYS,lhd wka;¾cd,h yd iïnkaO jk wjia:dfõ oS Tyq fkdu. hjñka fjk;a fjí msgq fj; tu iïnkaO;dj fhduq lrkq ,nhs¡

  • *sIska (Phishing)
 *sIska m%ydr hkq mßYS,lhka rjgd Tjqkaf.a nexl= .sKqï fyda úoHq;a .sKqï wdosfhys f;dr;=re ,nd .eksuhs’ fï ioyd úoHq;a ,smsk fhdod.kakd w;r fuu ,sms m%isoaO iud.ulska fyda ñ;=frl=f.a kdufhka mrsYS,lhd fj; tjkq ,nhs’ fjk;a fjí wvúhlg hdug Link tllao tjkq ,nhs’ tu Link tl la,sla lsÍfuka fyda úia;r m;%sld msrùu u.ska ,nd.kakd f;dr;=re mßYS,lhkaf.a uqo,a iy jeo.;a f;dr;=re fidrlï lsÍu i|yd Ndú;d flf¾’

  • wdhdÑ; ;emE, (Spam)
wkjirfhka ,efnk úoHq;a ;eme,a wdhdÑ; ;emE, ke;skï iamEï f,i yeoskafõ’ fndfydaúg fïjd NdKav i|yd jQ fj<| oekaùï fyda fkdy÷kk wfhl= úiska tjk ,o úoHq;a ;emE,la úh yelsh’ fï ksid ;eme,a .sKqu msÍ f.dia mßYS,lhd wmyiq;djhg m;aúh yelsh’ tmuKla fkdfõ jxpdiy.;j úoHq;a ,smsk ,nd .ksñka uqo,a jxpd i|yd fm<Uùug tjkq ,nk úoHq;a ;eme,ao wdhdÑ; ;emE, fõ’ Tnf.a B-fï,a tfla spam f*da,avrhg meñfKkafka fndfyda úg fuu Bfï,a mKsúv fõ¡ tu ksid tajd újD;lr ne,SfïoS tys we;=,;a f;dr;=re, ,skala iy Attach file .ek wjOdkh fhduql, hq;=h¡



 
Top