Talk:Malware: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
imported>Howard C. Berkowitz
(Added links, suggestions)
Line 11: Line 11:


I'll leave the Definition entry to you.[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 18:58, 6 February 2009 (UTC)
I'll leave the Definition entry to you.[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 18:58, 6 February 2009 (UTC)
:Added some links, but also removed specific examples that probably belong in more detailed articles.<blockquote> The term can also include be used to describe programs such winfixer, smitfraud, or MS Antivirus which attempt to defraud a user into sending money to a company which provides either no service or questionable services.</blockquote>
:While I don't know all of the specific programs, the general description sounds as if it might be mixing [[phishing]], [[spyware]] and [[trojan (computer)]]. This article, I think, is a top-level one that defines concepts and links to more specific subarticles.
:[[Virus (computers)]] exists but may look a little strange, due to some interim CZ software that causes the definition to be transcluded to the start of the article; this will be corrected.
:If I might, I'd like to suggest starting some of the subarticles, perhaps only in stub form. Of course, they can be extended in place, fully recognizing that some of the definitions are imprecise; [[miscreant]]s do not create malware in conformance with best practices in [[software engineering]]. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 14:38, 7 February 2009 (UTC)

Revision as of 08:39, 7 February 2009

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [d] [e]
Checklist and Archives
 Workgroup category Computers [Categories OK]
 Subgroup category:  Security
 Talk Archive none  English language variant American English

I'll revisit this as soon as I can Ched Davis 18:50, 6 February 2009 (UTC)

Glad to cooperate

I've been putting up some things more on the network side, still short, such as network reconnaissance, amplification attack, and port scanning. Obviously, the two blend in the DoS area. You may also want to look at information security.

Hope you don't mind, but I created the cluster so it would both show up in Live Articles, and I could start on Related Articles, the latter probably after I convince a (luckily small) cat that my fingers, on the keyboard, do not really need a warmer on top of them.

I'm interested in doing some work on surveillance for malware and exploits, again more on the network side.

I'll leave the Definition entry to you.Howard C. Berkowitz 18:58, 6 February 2009 (UTC)

Added some links, but also removed specific examples that probably belong in more detailed articles.

The term can also include be used to describe programs such winfixer, smitfraud, or MS Antivirus which attempt to defraud a user into sending money to a company which provides either no service or questionable services.

While I don't know all of the specific programs, the general description sounds as if it might be mixing phishing, spyware and trojan (computer). This article, I think, is a top-level one that defines concepts and links to more specific subarticles.
Virus (computers) exists but may look a little strange, due to some interim CZ software that causes the definition to be transcluded to the start of the article; this will be corrected.
If I might, I'd like to suggest starting some of the subarticles, perhaps only in stub form. Of course, they can be extended in place, fully recognizing that some of the definitions are imprecise; miscreants do not create malware in conformance with best practices in software engineering. Howard C. Berkowitz 14:38, 7 February 2009 (UTC)