Talk:Malware

From Wikipedia, the free encyclopedia
Jump to: navigation, search
          This article is of interest to the following WikiProjects:
WikiProject Computer Security / Computing  (Rated Start-class, Top-importance)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Top  This article has been rated as Top-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (marked as High-importance).
 
WikiProject Computing (Rated Start-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
 
WikiProject Computer science (Rated Start-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Computer science, a collaborative effort to improve the coverage of Computer science related articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
 
WikiProject Software / Computing  (Rated Start-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Software, a collaborative effort to improve the coverage of software on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (marked as High-importance).
 
WikiProject Internet (Rated Start-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
 

Something[edit]

Well, at the bottom of the article it shows a HTML element. What if a hijacker was looking for a quicker way to hijack and they looked there?

98.28.183.68 (talk) 02:40, 20 June 2012 (UTC)

Concretisation[edit]

This article presents the usual terms, "Trojan horses", "viruses", "worms"! Certainly useful! But would it be possible to make it more concrete/technical! Or if this is out-of-scope for an encyclopaedic article, a reference to such a more technical/detailed article of high quality.

How and when is the execution of the "malware" started? By a modified boot-sector starting "malware" instead of the operating system. By the modification of the list of "services/daemons" the operating system starts. For Windows, possibly an entry in "Autoexec"?

At least for one special example! One gets the impression that in this field it is more about the authors copying each other than to come with hard facts! In other words, the rumours are flourishing! To the benefit of firms providing security software! Searching with Google one finds a lot of adverts for such software but not much useful information!

Stamcose (talk) 14:29, 9 January 2013 (UTC) Logically, it should be two stages

-The malicious code is written to the victim's disc

-Some configuration files are modified in such a way that the operting system automatically transfers the control to the malicious software after power-up

Explain for at least one example!

Stamcose (talk) 10:38, 10 January 2013 (UTC)

grayware/PUPs[edit]

Imho it should be noted, that most anti-malware programs do not only consider software possibly unwanted by the user as PUPs, but also software unwanted by content owners (e.g. filesharing-prograes, Keygens and software like AnyDVD or CloneCD). --MrBurns (talk) 01:16, 19 January 2013 (UTC)

GA failed[edit]

This article is not ready for GA as a number of sections are entirely unreferenced. A GA reviewer might also consider the article to be lacking in illustrations which should be provided "if possible" — surely true here. It is also advisable for a nominator new to an article to consult with editors who have been working on the article, if not to participate in editing and improving it until it is clear that it is ready to submit. The text appears reasonably stable and not excessively point-of-view so once citations have been supplied and checked the article should be well worth re-submitting for GA review. Chiswick Chap (talk) 13:35, 22 March 2013 (UTC)