As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs have been developed to specifically combat them.
Anti-malware programs can combat malware in two ways:
They can provide real time protection against the installation of malware software on a computer. This type of spyware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware software and blocks any threats it comes across.
Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of malware protection is normally much easier to use and more popular. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.
Real-time protection from malware works identically to real-time antivirus protection: the software scans disk files at download time, and blocks the activity of components known to represent malware. In some cases, it may also intercept attempts to install start-up items or to modify browser settings. Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to ""sandbox"" browsers (essentially babysit the user and their browser) can also be effective in helping to restrict any damage done.
This book is your ultimate resource for Anti-Malware. Here you will find the most up-to-date information, analysis, background and everything you need to know.
In easy to read chapters, with extensive references and links to get you to know all there is to know about Anti-Malware right away, covering: Malware, Network Crack Program Hacker (NCPH) Group, PUM.bad.proxy, Adware, Backdoor (computing), Bacteria (malware), Blended threat, Browser hijacker, Browser hijacking, CARO, CDP Spoofing, China Internet Network Information Center, Claria Corporation, Code injection, Computer worm, CPLINK, Crimeware, Dialer, DLL injection, DollarRevenue, Download.ject, Dropper, Evercookie, Extended Copy Protection, File binder, Flip button, Form grabbing, Hover ad, List of Compact Discs sold with XCP, List of pop-up blocking software, LizaMoon, Logic bomb, Malvertising, Malware Bell, Micro Bill Systems, Mobile code, MonaRonaDona, Moralityware, Movieland, MPack (software), NavaShield, NBName, Operation: Bot Roast, Personal Internet Security 2011, Pharming, Polymorphic code, Polymorphic engine, Polymorphic packer, Pop-up ad, Power virus, Ransomware (malware), Riskware, Rock Phish, Rootkit, Scareware, Securelist.com, Slowloris, Software forensics, Spy-phishing, Spyware, Stacheldraht, Stealware, Targeted threat, Timeline of computer viruses and worms, Tribe Flood Network, Trinoo, Virus Creation Laboratory, Virus hoax, Wabbit, Webattacker, Whitelist, Your PC Protector, Zero-day virus, Zip bomb.
This book explains in-depth the real drivers and workings of Anti-Malware. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Anti-Malware with the objectivity of experienced professionals.