Introduction
7
nel from one computer to another, using networks, e-mail and other
channels. This ability allows worms to proliferate extremely quickly.
Worms propagate by penetrating a computer, determining the IP ad-
dresses of other nearby computers, and send copies of themselves to
these computers. Apart from network addresses, worms often use data
contained in the address books of e-mail client applications installed on
the infected machine. Sometimes worms create work files on disks, but
they also can function without utilizing any resources of the infected
computer other than RAM.
Viruses
– programs that
infect
other programs by adding their code to the
infected program's code, to gain control when the infected files are run.
This simple definition helps determine that the major action of a virus is
infecting
computer programs. Viruses spread somewhat slower than
worms.
Trojan horses or Trojans
– perform unauthorized actions on infected
computers. For instance, depending on the particular conditions, they can
erase information on hard drives, "freeze" the system, or steal confidential
information. In the strict sense, Trojan Horses are not viruses since they
do not infect programs or data; they are unable to sneak independently in-
to computers and are often distributed disguised as some "useful" soft-
ware. However, Trojans may inflict far greater damages than a regular vi-
rus attack.
Recently,
worms and Trojans
have become the most widespread type of
malware in the Unix-based systems.
Henceforth in the text of this Guide the term "virus" will be used to refer
to viruses, Trojan Horses and worms. A particular type of malware will
be mentioned only when it is required.
1.2.
Purpose and major functionality
of Kaspersky Anti-Virus
Kaspersky Anti-virus
®
for Linux Workstation
(hereinafter referred to as
Kaspersky Anti-Virus
, or
the application
)
protects workstations running Linux
operating systems.
Kaspersky Anti-Virus for Linux allows the user to:
Ensure real-time protection of the file system against malicious code:
in-
tercept and analyze attempts to access files, and disinfect or delete in-
fected objects.