Friday, August 2, 2013

Types of Rootkit Virus

Rootkit is a malware that is designed to protect / hide malware, spyware and bots and prevent them will be detected by normal methods of detection. Once it has installed deadly potential to transform your important references in the garbage to the host computer.

It is designed to achieve the following objectives:
- For an unauthorized computer owner to come in and steal his / her powers for criminal activity to the theft of money via online banking to steal important documents, access, etc.
- To hide malicious software such as viruses, keyloggers, owners damaging the computer.
- For the computer as a zombie computer use to perform immoral activities such as sending spam to attack other computers via the Startup group, etc.

Rootkit virus types:
1- Virus persistent rootkit: This rootkit virus triggers whenever the computer startup / restart. He hides in files and invalid registry files reproduce offer valid Windows registry. It can not be easily detected and whenever the computer downloaded / restart without using an external factor. It remains in the registry of your computer, even when the computer is restarted.
2- Memory Rootkit Virus base: This type of rootkit virus is in the memory of your computer. They occupy an unallocated RAM of your computer and keep your computer is shut down by the owner.
3- User Mode Rootkits: In this case, the rootkit virus digs deep into the operating system and stores the location of the system drive and can not be detected by the antivirus program. He escaped the virus detection by integrating with the anti-virus program. If the anti-virus program will start to scan the system, hamper Rootkit and they mimic the action of anti-virus program and therefore shows no malware in a row.
4- kernel mode rootkits: Rootkits Kernel are dangerous compared to other rootkits. This type of rootkit modifies kernel data structures by adding or replacing the existing code. This is one of the deadliest rootkits that can not be detected by antivirus programs as they operate on the same level of security operating systems.
5- Firmware Rootkits: Firmware rootkits affect the device by an appropriate access device code and cease functioning. You can listen rootkit Mebromi the video card of the computer is compromised. This rootkit is installed when you restart your computer.
6- Kit boot: bootkit is a rootkit is designed for MBR (Master Boot Record) will infect your computer. It primarily affects the boot and POST (Power On Self Test) of the computer.
7- Hypervisor Rootkits: This type of rootkit is designed to influence the configuration of the virtual machine. Hypervisor is a layer between the physical layer and the virtual layer, it is not even loaded when the computer reboots and becomes active if the operating system will be prompted to restart the virtual machine. Its mission is to use hardware virtualization and thus enjoy a true triggered by intercepting operating hardware operating system.

How to prevent rootkits:
1- One of the best ways to make your computer is to prevent rootkits, create a system restore point at regular intervals.
2- In most cases, rootkit between computer through spam mail, it is always advisable to avoid spam.
3- It is always recommended that any external device before because it may contain harmful malware scan.
4- You need to regularly update the program from the computer anti-virus software on the actual site of the manufacturer. Aside from the real site of the manufacturer do not use any antivirus security, these traps are created by poor people, promises to fulfill their evil intentions.
5- Use the tools essential security Microsoft security can be found on the Microsoft support site.

No comments:

Post a Comment

Tag

Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger