What is Malware?
Malware - is short for “malicious software.” It is a term that includes a variety of forms of hostile, intrusive, or annoying software or program code. It is designed to infiltrate or damage a computer system without the owner’s informed consent.
Some of the malware includes:
Viruses - Malicious little programs or scripts that can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly or to crash completely. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. They can self-modify or change over time as they copy themselves. Viruses only spread across multiple computers if an uninfected computer is connected to a network, or if the computer gets connected to infected media such as a USB drive or a CD.
Worms - A self-replicating computer program. It uses a network to send copies of itself to other computers on the network, and it may do so without any user intervention. Unlike a virus, it does notneed to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Trojan Horse - This type of malware comes hidden inside another program. They are often placed inside music, games, pictures, or anything else that someone might download onto their PC.Once you download the Trojan, it opens a back door that allows hackers unauthorized access to your machine. The criminals can save their files on your computer, watch your screen, take information, and completely control the computer.
Rootkits - A rootkit is a program designed to hide files, processes, or Windows Registry entries. Rootkits are not malware; they are the programs that help hide the malware. The rootkit usually comes bundled with malicious software including Trojans, viruses, worms, keyloggers, sniffers, botnets, etc.
Many rootkits can hide large numbers of files, enabling a hacker to invisibly store his files on your computer. Once the rootkit is installed, hackers can take control of your computer and use it for many illegal activities. They can send huge amounts of data to a website causing it to close down, send out spam, and store pirated movies, music, and software on your system. They can obtain your credit card information, and perform many other illegal activities, all of which hide the hacker's identity and make it seem as though the victim's computer is the source of the crime.
However, rootkits can be used legally by law enforcement, parents, and employers who want to monitor and check up on criminals, children, and employees. Spector Pro and eBlaster are two such programs. Though legal if used as suggested, these programs operate invisibly, like rootkits, and do not show up as an icon, do not appear in the Windows system tray, and do not appear in the Windows task list.
Adware - Any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.
Spyware - A type of software that is installed on your computer to watch and record your activity. Some types of spyware record your keystrokes and information that you type into websites or other programs and then use that information for targeted advertising or identity theft. It slows down your Internet connection because while you are surfing, it is busy sending information about your surfing habits to ad companies, who then target you with popup ads that fit your preferences. Spyware is so prevalent that nearly 90% of Internet connected PCs are infected with not just one, but many, of these programs. Simply surfing the Internet, reading email, downloading music or other files can infect your PC without you knowing it. While the purpose of some malware is to cause problems and malfunctions on your PC, the criminals behind many infections want your computer operating in top form so you don’t know something is wrong. That way, they can log your keystrokes and steal any passwords or credit-card numbers you enter at Web sites, so they can link your infected computer with others to send out Spam. Your computer, unbeknownst to you, becomes one of a “botnet” army.
Antivirus System 2011 - is a rogue anti-spyware program that displays fake scan results and alerts in order to trick you into thinking your computer is infected. This program is installed through Trojans that download and install the program on to your computer without your permission. When installed, the rogue will also create numerous files in your Windows Temp folder that will then be detected as malware when AntiVirus System 2011 attempts to scan your computer. If you attempt to remove any of the programs it states are infections, it will state that you need to purchase the program first before it will allow you to do so. The reality is that these files are harmless, or do not even exist, and are only being shown to scare you into purchasing the program.
Pallaium Pro -Palladium Pro is a fake rogue anti-spyware program from the Fake Microsoft Security Essentials family of infections. When this infection is installed on your computer it will display a fake Microsoft Security Essentials alert that states that it has detected an Unknown Win32/Trojan on your computer. It will then prompt you to scan your computer, which will start a fake scan of your computer that ultimately states that a file is infected with Trojan.Horse.Win32.PAV.64.a. The text of these alerts is:
Microsoft Security Essentials Alert Potential Threat Details Microsoft Security Essentials detected potential threats that might compromise your private or damage your computer. Your access to these items may be suspended until you take an action. Click 'show details' to learn more.
Microsoft Security Essentials Alert Solution found Microsoft Security Center has detected the submitted suspicious file as "Trojan.Horse.Win32.PAV.64.a". Threat level - very high. Required action - Antivirus software is required to find and delete all traces of the virus. Click "Ok" to allow operation system to install the trial version of Palladium to solve the problem. System reboot is required to complete the installation.
It will then prompt you to install Palladium Pro in order to remove the virus. When you press the OK button, to allow it to install, the infection will reboot your computer to finish the installation.
DO NOT CLICK ON IT, Instead press on your keyboard ALT+F4 if its not too late.