<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Girardp&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Girardp&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Girardp"/>
		<updated>2026-04-07T07:31:06Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T03:14:16Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads &amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium &amp;lt;sup&amp;gt;[4][7]&amp;lt;/sup&amp;gt;, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are misled into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections. &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Open_source Open source software], less &amp;quot;popular&amp;quot; software is less prone to attack since it is presumably used less, plus open source allows anyone to correct any flaws that allow malware to spread &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Common_sense Common sense], to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*4. Malware on [http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*6. Information on [http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch]&lt;br /&gt;
*7. McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
--[[User:Girardp|Girardp]] 23:14, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T03:12:51Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads &amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium &amp;lt;sup&amp;gt;[4][7]&amp;lt;/sup&amp;gt;, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are misled into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections. &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Open_source Open source software], less &amp;quot;popular&amp;quot; software is less prone to attack since it is presumably used less, plus open source allows anyone to correct any flaws that allow malware to spread &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Common_sense Common sense], to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*4. Malware on [http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*6. Information on [http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch]&lt;br /&gt;
*7. McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:56:47Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads &amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium &amp;lt;sup&amp;gt;[4][7]&amp;lt;/sup&amp;gt;, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are misled into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections. &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Common_sense Common sense], to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*4. Malware on [http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*6. Information on [http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch]&lt;br /&gt;
*7. McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:55:07Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads &amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium &amp;lt;sup&amp;gt;[4][7]&amp;lt;/sup&amp;gt;, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are misled into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections. &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* Common sense, to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*4. Malware on [http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*6. Information on [http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch]&lt;br /&gt;
*7. McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:49:39Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are misled into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections. &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* Common sense, to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*4. Malware on [http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*6. Information on [http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:45:06Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt; typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium &amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections. &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* Common sense, to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*4. Malware on [http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*6. Information on [http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:32:10Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* Common sense, to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Botnets Botnets]&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:21:01Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user. Some examples:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt; Some examples: &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. To prevent the spread of malware we must use: &lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Sandbox Sandboxing techniques], to make browsing the internet safer&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Antivirus Antivirus software], to detect and remove already infected computers or computers prone to attack&lt;br /&gt;
* Common sense, to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware is incredibly difficult, not only in detection but the distribution of fixes too. As the use of computers evolve with time so will malware, thus prevention will become even more important than it is now. New techniques will emerge to help with the fight, but ultimately malware will always be prevalent unless the way computers are used changes drastically. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* worms&lt;br /&gt;
* viruses&lt;br /&gt;
* trojan horses&lt;br /&gt;
* adware&lt;br /&gt;
* spyware&lt;br /&gt;
* botnets&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T02:02:41Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Adware Adware]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Spyware Spyware]&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
When dealing with anything involving computers, users should always exercise their common sense. Sometimes this may not be enough, and other software to detect malware is necessary. There are a few ways to prevent the spread of malware. &lt;br /&gt;
* Sandboxing, to make browsing the internet safer&lt;br /&gt;
* Antivirus, to detect and remove already infected computers&lt;br /&gt;
* Common sense, to not fall for obvious tricks&lt;br /&gt;
&lt;br /&gt;
Combating the ever-growing list of malware &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia.org]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* worms&lt;br /&gt;
* viruses&lt;br /&gt;
* trojan horses&lt;br /&gt;
* adware&lt;br /&gt;
* spyware&lt;br /&gt;
* botnets&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T01:34:19Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by, software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* worms&lt;br /&gt;
* viruses&lt;br /&gt;
* trojan horses&lt;br /&gt;
* adware&lt;br /&gt;
* spyware&lt;br /&gt;
* botnets&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T01:31:21Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system without the consent of the user. The software could disguise itself as other software, or use the operating system to hide its program. Once hidden the software can execute any commands, or allow access to the computer system, completely invisible to the user.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* worms&lt;br /&gt;
* viruses&lt;br /&gt;
* trojan horses&lt;br /&gt;
* adware&lt;br /&gt;
* spyware&lt;br /&gt;
* botnets&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;br /&gt;
&lt;br /&gt;
--[[User:Girardp|Girardp]] 21:31, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T01:25:30Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever, other than self satisfaction.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. The software could disguise itself other software, or use the operating system to hide its program.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* worms&lt;br /&gt;
* viruses&lt;br /&gt;
* trojan horses&lt;br /&gt;
* adware&lt;br /&gt;
* spyware&lt;br /&gt;
* botnets&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T01:17:47Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. Users may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software serves some useful purpose. Similarly, somewhat legitimate software could require users to install malware before they are allowed to install the desired software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injections.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T01:09:54Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others. User may inadvertently install the software, not realizing that they are installing, or are mislead into thinking the software servers some useful purpose. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T01:07:23Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Spam, generated by browsing habits &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
* Ad revenue, generated by malware forcing users to view ads&lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks DDoS attacks] &lt;br /&gt;
* Data corruption   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. The user may inadvertently install the software, not realizing that they are in fact installing software. &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T00:48:40Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created now equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting portable computers, such as smart phones, because of the amount of sensitive information contained within them. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*3. Types of malware [http://www.pandasecurity.com/homeusers/security-info/types-malware/ Panda Security]&lt;br /&gt;
*5. Lecture by Mark Ryan of the University of Birmingham, 2009 [http://www.cs.bham.ac.uk/~gzw/teaching/NS09/Lectures/NS09-Malware-Slides.pdf pdf]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*McAfee paper on malware [http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf pdf]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T00:34:32Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created now equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal operation of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*[http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf McAfee document on malware]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T00:33:50Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created now equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*2. Malware on [http://en.wikipedia.org/wiki/Malware Wikipedia]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*[http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf McAfee document on malware]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-13T00:32:04Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET] &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;, and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in its distribution. After the internet became prevalent, malware could spread easily to a large number of computers. New kinds of malware emerged taking full advantage of the internet. With access to a vast amount of computers money making malware, such as adware, became successful, only adding more motivation for malware authors to create new and different malware. As of late, security companies are suggesting the number of legitimate software created now equals, or is surpassed by software created for malicious purposes. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Rootkits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*1. History of viruses [http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*[http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf McAfee document on malware]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-12T23:50:07Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. As computers became more common throughout the 1970s, 1980s, and 1990s malware saw an equal amount of growth. Malware spread through early networks, such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], and it continued to the days of the early internet. It was not limited only by networks, diskettes and other shared media helped in the distribution. Malware created up to this point was generally created to cause damage, or to be annoying, but the internet provided a new access point to a large number of computers. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com History of malware]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
*[http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci1075399,00.html CoolWebSearch Information]&lt;br /&gt;
==See also==&lt;br /&gt;
*[http://www.mcafee.com/us/local_content/white_papers/partners/ds_wp_telconote.pdf McAfee document on malware]&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-12T23:05:07Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
[http://en.wikipedia.org/wiki/CoolWebSearch CoolWebSearch] deceives the user, pretending to be useful software. After it is installed, CoolWebSearch takes over services usually served by other applications. It can also be used to show ads, either through pop ups or ad injection.&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-12T22:05:00Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document would execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-12T22:03:48Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus] falls under this category. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-12T21:58:08Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The most famous example of this type would have to be the [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus]. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system, without the consent or notice to the user. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits rootkit], designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-12T21:23:14Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Malware is rarely one type or another, typically it is composed from a combination of several distinct types. The following outlines some of the basic types of malware:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The most famous example of this type would have to be the [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus]. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
The [http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony BMG CD copy protection scandal] revolves around a root kit, designed by Sony, to interfere with the normal playback of CDs using Microsoft Windows. The software installed itself whenever a user put one of these CDs into their computer. This problem was then compounded once malware authors took advantage, and used this vulnerability for their own purposes. &lt;br /&gt;
&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
*[http://www.tietoturvaopas.fi/en/index/uhatjaniidentorjunta/haittaohjelmat.html Safe on the internet]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/2005_Sony_BMG_CD_copy_protection_scandal Sony DRM wikipedia]&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T21:15:11Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types of the following:  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The most famous example of this type would have to be the [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus]. The software propagated itself using a vulnerability in Microsoft Word documents, where macros within the word document could execute commands. With this vulnerability the virus was able to mass email itself once the file was opened on an unsuspecting users computer.&lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T21:04:02Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types.  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system. The following examples are typical types of infectious malware:&lt;br /&gt;
  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
&lt;br /&gt;
The most famous example of this type would have to be the [http://en.wikipedia.org/wiki/Melissa_(computer_worm) melissa virus]. &lt;br /&gt;
&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T20:45:16Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written, but it usually involves one illicit purpose or another. The following are some generic purposes where most malware falls under. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types.  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system. &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Trojan_horse_(computing) Trojan horses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Rootkits Root kits]&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
* Linux lol&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T20:21:30Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally, software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types.  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system. &lt;br /&gt;
* Trojan horses&lt;br /&gt;
* Root kits&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
* Linux lol&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T20:20:46Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types.  &lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Infectious malware gets its name from its method of propagation. Similar to biological viruses, infectious malware spreads itself by self-replicating on some medium, whether it be a computer network or computer system.  &lt;br /&gt;
* [http://en.wikipedia.org/wiki/Computer_virus Viruses]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms Worms]&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself within a computer system. &lt;br /&gt;
* Trojan horses&lt;br /&gt;
* Root kits&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
* Linux lol&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T20:03:56Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types with examples==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types.&lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
Arguably the most common type, infectious malware is known for its self-replicating properties. &lt;br /&gt;
* Viruses&lt;br /&gt;
* Worms&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
Hidden malware's key feature is its ability to hide itself in a computer system. &lt;br /&gt;
* Trojan horses&lt;br /&gt;
* Root kits&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
The most bothersome, deceptive malware preys on users who may not be as tech-savvy as others.  &lt;br /&gt;
* Adware&lt;br /&gt;
* Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
* Linux lol&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T19:45:31Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information to the benefit of the malware user. &lt;br /&gt;
&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
The most common use of all, malware can be used to cause damage to a computer system in one way or another.   &lt;br /&gt;
&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Sometimes malware authors create software that has no intended purpose what so ever.&lt;br /&gt;
&lt;br /&gt;
==Types==&lt;br /&gt;
Typically malware is composed from a combination of several distinct types.&lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
* Viruses, Worms&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
* Trojan horses&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
* Adware, Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
* Linux lol&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T19:26:36Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent expansion of mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Malware can be used to generate illicit revenues, usually by hijacking ad revenues or using previously mentioned sensitive information. &lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
Blurb about typical viruses&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Blurb about some malware purpose is just to see how well it works, having no purpose at all&lt;br /&gt;
* Viruses&lt;br /&gt;
&lt;br /&gt;
==Types==&lt;br /&gt;
Typically malware is a combination of several distinct types.&lt;br /&gt;
&lt;br /&gt;
=====Infectious=====&lt;br /&gt;
* Viruses, Worms&lt;br /&gt;
=====Hidden=====&lt;br /&gt;
* Trojan horses&lt;br /&gt;
=====Deceptive=====&lt;br /&gt;
* Adware, Spyware&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T19:11:02Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual intended purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose can vary, but typically it is used to gather information, generate profit, cause harm or data loss, or it could have no real purpose at all. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
There are numerous reasons why malware is written. &lt;br /&gt;
&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Malware can be used to gather sensitive information. With the recent explosion with mobile computing, malware authors are targeting mobile computers, such as smart phones, because of the amount of sensitive information contained within them.&lt;br /&gt;
&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Blurb about generating profit&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
Blurb about typical viruses&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Blurb about some malware purpose is just to see how well it works, having no purpose at all&lt;br /&gt;
* Viruses&lt;br /&gt;
&lt;br /&gt;
==Types==&lt;br /&gt;
=====Viruses, Worms=====&lt;br /&gt;
=====Trojan Horses=====&lt;br /&gt;
=====Adware, Spyware=====&lt;br /&gt;
&lt;br /&gt;
==Prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T18:49:41Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose varies, but ultimately comes down to three categories; malware is created to generate profit, to cause harm, to gain popularity, or a combination. &lt;br /&gt;
[[Image:malware.jpg|frame|Partial source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Malware purposes==&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Blurb about stealing information&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Blurb about generating profit&lt;br /&gt;
=====Cause harm or data loss=====&lt;br /&gt;
=====No real purpose=====&lt;br /&gt;
Blurb about some malware purpose is just to see how well it works, having no purpose at all&lt;br /&gt;
* Viruses&lt;br /&gt;
&lt;br /&gt;
==Malware prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T18:32:48Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose varies, but ultimately comes down to three categories; malware is created to generate profit, to cause harm, to gain popularity, or a combination. &lt;br /&gt;
[[Image:malware.jpg|frame|Some source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public, malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. Early malware was typically less of a threat, created by programmers who were trying to prank other users, rather than the typical malware created for todays society. &lt;br /&gt;
&lt;br /&gt;
==Malware purposes==&lt;br /&gt;
=====Obtaining sensitive information=====&lt;br /&gt;
Blurb about stealing information&lt;br /&gt;
=====Obtaining financial returns=====&lt;br /&gt;
Blurb about generating profit&lt;br /&gt;
=====No purpose=====&lt;br /&gt;
Blurb about some malware purpose is just to see how well it works, having no purpose at all&lt;br /&gt;
&lt;br /&gt;
==Malware prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T18:04:12Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose varies, but ultimately comes down to three categories; malware is created to generate profit, to cause harm, to gain popularity, or a combination. &lt;br /&gt;
[[Image:malware.jpg|frame|Some source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. &lt;br /&gt;
&lt;br /&gt;
==Malware purposes==&lt;br /&gt;
===Obtaining sensitive information===&lt;br /&gt;
===Obtaining financial returns===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Malware prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T18:03:04Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. Its purpose varies, but ultimately comes down to three categories; malware is created to generate profit, to cause harm, to gain popularity, or a combination. &lt;br /&gt;
[[Image:malware.jpg|frame|Some source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. &lt;br /&gt;
&lt;br /&gt;
==Malware purposes==&lt;br /&gt;
===Information seeking===&lt;br /&gt;
===For profit===&lt;br /&gt;
===&lt;br /&gt;
&lt;br /&gt;
==Malware prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T17:01:39Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Image:malware.jpg|frame|Some source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. &lt;br /&gt;
&lt;br /&gt;
==Malware types and examples==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
&lt;br /&gt;
==Malware prevention==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T16:53:59Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to ''covertly operate'' and ''deceive users'' to hide its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Image:malware.jpg|frame|Some of the source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. &lt;br /&gt;
&lt;br /&gt;
==Malware types and examples==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T16:50:05Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Image:malware.jpg|frame|Some of the source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware history==&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. &lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T16:32:13Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. At this time, viruses started to appear on networks such as [http://www.cas.mcmaster.ca/wiki/index.php/ARPANET ARPANET], gaining popularity into the 1980's with the explosion of person computers. &lt;br /&gt;
 &lt;br /&gt;
[[Image:malware.jpg|frame|Some of the source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T16:27:02Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. &lt;br /&gt;
[[Image:malware.jpg|frame|Some of the source code from a malware example.]]&lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T16:20:40Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. &lt;br /&gt;
[[Image:malware.jpg|frame|Simple Malware Example]]&lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T16:15:03Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
Before computers were accessible to the general public malware was not an overwhelming threat. Starting sometime in the 1970's computers became somewhat more common, and as a direct result, so did malicious software. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
===Type 3===&lt;br /&gt;
===Type 4===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
[[Image:malware.jpg]]&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
*[http://www.viruslist.com/en/viruses/encyclopedia?chapter=153280684 http://www.viruslist.com]&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Malware Malware on Wikipedia]&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T15:54:46Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and [http://www.cas.mcmaster.ca/wiki/index.php/Botnets botnets]. &lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
===Type 3===&lt;br /&gt;
===Type 4===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
[[Image:malware.jpg]]&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T15:50:10Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, [http://www.cas.mcmaster.ca/wiki/index.php/Computer_worms worms], spyware, and botnets. &lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
===Type 3===&lt;br /&gt;
===Type 4===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
[[Image:malware.jpg]]&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-11T15:47:25Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)''' encompasses a broad range of software typically designed to covertly operate and deceive users to its actual purpose. It can be used as a catch-all phrase for software that has been programmed for malicious purposes intentionally; software such as viruses, worms, spyware, and botnets. &lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
===Type 3===&lt;br /&gt;
===Type 4===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
[[Image:malware.jpg]]&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Malware.jpg</id>
		<title>File:Malware.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Malware.jpg"/>
				<updated>2009-04-11T15:13:03Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;Simple example of malware.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Simple example of malware.&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-09T20:53:02Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)'''&lt;br /&gt;
&lt;br /&gt;
==Malware types==&lt;br /&gt;
===Type 1===&lt;br /&gt;
===Type 2===&lt;br /&gt;
===Type 3===&lt;br /&gt;
===Type 4===&lt;br /&gt;
&lt;br /&gt;
==Malware examples==&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
==See also==&lt;br /&gt;
==External links==&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Malware</id>
		<title>Malware</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Malware"/>
				<updated>2009-04-09T20:38:56Z</updated>
		
		<summary type="html">&lt;p&gt;Girardp:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Malicious software (malware)'''&lt;br /&gt;
&lt;br /&gt;
=Malware types=&lt;br /&gt;
==Type 1==&lt;br /&gt;
==Type 2==&lt;br /&gt;
==Type 3==&lt;br /&gt;
==Type 4==&lt;br /&gt;
&lt;br /&gt;
=Malware examples=&lt;br /&gt;
==Example 1==&lt;br /&gt;
&lt;br /&gt;
=References=&lt;br /&gt;
=See also=&lt;br /&gt;
=External links=&lt;/div&gt;</summary>
		<author><name>Girardp</name></author>	</entry>

	</feed>