Thursday, October 19, 2017

Let’s get to know about Logic Bomb and Time bomb

In a computer program, a logic bomb, also called slag code, is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a a program user to respond to a program command. To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software It is in effect a delayed-action computer virus or Trojan horse. A logic bomb, when "exploded," may be designed to display or print a spurious message, delete or corrupt data, or have other undesirable effects

Some logic bombs can be detected and eliminated before they execute through a periodic scan of all computer files, including compressed files, with an up-to-date anti-virus program. For best results, the auto-protect and e-mail screening functions of the anti-virus program should be activated by the computer user whenever the machine is online. In a network, each computer should be individually protected, in addition to whatever protection is provided by the network administrator. Unfortunately, even this precaution does not guarantee 100-percent system immunity.

Time Bomb



When a logic bomb is programmed to execute when a specific date is reached, it is referred to as a time bomb. Time bombs are usually programmed to set off when important dates are reached, such as Christmas or Valentine’s Day. Disgruntled employees have created time bombs to execute within their organizations’ networks and destroy as much data as possible in the event that they are terminated. The malicious code will remain dormant as long as the programmer exists in the organization’s payroll system.

How to Prevent them
  • Do not download pirated software 
  • Install the latest operating system patches
  • Be careful with installing shareware/freeware applications
  • Be cautious when opening email attachments 
  • Do not click on suspicious web links
  • Always update your antivirus software 

No comments:

Post a Comment

Test Images

Below images  are being used for the   Hashtag Generator and Content Authenticator research .