|This is the talk page for discussing improvements to the Malware article.|
|This article is of interest to the following WikiProjects:|
Malware was nominated as a good article in the category but did not meet the good article criteria at the time. There are suggestions below for improving the article. Once these are addressed, the article can be renominated. Editors may also seek a reassessment of the decision if they believe there was a mistake.
Reviewed version: March 22, 2013
|This article has been mentioned or used by a media organization. The reference is in:
|Malware received a peer review by Wikipedia editors, which is now archived. It may contain ideas you can use to improve this article.|
|This talk page is automatically archived by MiszaBot I. Any threads with no replies in 3 months may be automatically moved. Sections without timestamps are not archived.|
Well, at the bottom of the article it shows a HTML element. What if a hijacker was looking for a quicker way to hijack and they looked there?
This article presents the usual terms, "Trojan horses", "viruses", "worms"! Certainly useful! But would it be possible to make it more concrete/technical! Or if this is out-of-scope for an encyclopaedic article, a reference to such a more technical/detailed article of high quality.
How and when is the execution of the "malware" started? By a modified boot-sector starting "malware" instead of the operating system. By the modification of the list of "services/daemons" the operating system starts. For Windows, possibly an entry in "Autoexec"?
At least for one special example! One gets the impression that in this field it is more about the authors copying each other than to come with hard facts! In other words, the rumours are flourishing! To the benefit of firms providing security software! Searching with Google one finds a lot of adverts for such software but not much useful information!
-The malicious code is written to the victim's disc
-Some configuration files are modified in such a way that the operting system automatically transfers the control to the malicious software after power-up
Explain for at least one example!
- This Malware article and the Computer virus article have been reorganized and rewritten so as to be more useful. LittleBen (talk) 13:22, 12 January 2013 (UTC)
Imho it should be noted, that most anti-malware programs do not only consider software possibly unwanted by the user as PUPs, but also software unwanted by content owners (e.g. filesharing-prograes, Keygens and software like AnyDVD or CloneCD). --MrBurns (talk) 01:16, 19 January 2013 (UTC)
This article is not ready for GA as a number of sections are entirely unreferenced. A GA reviewer might also consider the article to be lacking in illustrations which should be provided "if possible" — surely true here. It is also advisable for a nominator new to an article to consult with editors who have been working on the article, if not to participate in editing and improving it until it is clear that it is ready to submit. The text appears reasonably stable and not excessively point-of-view so once citations have been supplied and checked the article should be well worth re-submitting for GA review. Chiswick Chap (talk) 13:35, 22 March 2013 (UTC)