Technology Computer & Networking security

How Can I Stop Malware That Only Lives in RAM?

When most people use a computer, they only see the outside of it.
They have no idea about what goes on underneath the keyboard.
All they know is that once they type something on the keyboard, it will show up on the screen instantly.
But if you take the time to learn what goes on underneath the hood, then you may find that it can be a fascinating world.
You may wonder why there are so many different attacks when it comes to the computer but that is because there are so many different layers that can be attacked.
One of the sections that I consider the most fascinating is the memory area of the computer.
This area is otherwise known as RAM.
Most people say that the processor is the brains of the computer because it is where you process the data that is received but the memory of the computer can be described as the brain as well.
While it may not be the place that calculates the data, it is the place that stores it just like your brain does.
When you have Ram in the system, you know that everything on that Ram chip will be disposed of when the power is out of the computer.
When there is no electricity running through the computer then the memory will not hold any data.
That is the way that they are designed.
But these days, most people keep their computer on all the time while only turning off their monitors.
This is a perfect opportunity for someone to run a piece of malware from memory only.
And there is already malware out there that is able to attack a computer in this manner.
When you have an attack that you want to stay on the computer, you have to install it just like any other program.
This means you have to trick the person into installing it.
That can be a hit or miss proposition.
If you just want to attack someone's computer once, then you can make the attack small enough to be able to stay in memory only.
This way you do not have to worry about the person having to install the program.
This type of attack does have its drawbacks though.
The attack can only be a certain amount of size which limits the functionality of the attack.
Also, the attack cannot use any software libraries that may be available.
Software libraries are large so they would not fit with a program that is only trying to live in the Ram of the computer.
This also means that the attacker has to create the attack from scratch.
You will find that in a lot of programming languages, it is hard to compile a program without using at least some of the standard library available.
These types of attacks do happen but they are very rare.
If an attack like this does happen to you, all that you need to do is to turn off the computer and then it will not be there any longer.

Related posts "Technology : Computer & Networking security"

Virtual machine manager explored

Security

Give The Gift of Network Security

Security

What is the best approach for creating or editing a PDF file?

Security

Windows First Aid - How to Remedy Scvhost Application Errors by Using Registry Cleaners

Security

Choosing the Best Remote Spy Software

Security

Undelete Files on a Mac - Ask the Computer Expert

Security

Using Dual Factor Authentication Today

Security

The Problem of Outbound Spam

Security

How To Remove Vista Antivirus Pro 2010

Security

Leave a Comment