-]\NDQJLHOVNLGODHOHNWURQLNyZLLQIRUPDW\NyZ. Unit 39 Malware Malware, a portmanteau word from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner s informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. Many computer users are unfamiliar with the term, and often use computer virus for all types of malware, including true viruses. Software is considered malware based on the intent of the creator rather than any particular features. Malware includes computer viruses, worms, Trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. Many early infectious programs, including the first Internet worm and a number of MS-DOS viruses, were written as experiments or pranks generally intended to be harmless or merely annoying rather than to cause serious damage to computers. In some cases the perpetrator did not realise how much harm their creations could do. Young programmers learning about viruses and the techniques used to write them only to prove that they could create a virus or to see how far it could spread. As late as 1999, widespread viruses such as the Melissa virus appear to have been written chiefly as pranks. However, since the rise of widespread broadband Internet access, malicious software has come to be designed for a profit motive, either more or less legal (forced advertising) or criminal. The majority of widespread viruses and worms have been designed to take control of users computers for black-market exploitation. Another strictly for-profit category of malware has emerged in spyware programs designed to monitor users web browsing or display unsolicited advertisements. Spyware programs do not spread like viruses; they are generally installed by exploiting security holes in operating systems or are packaged with user-installed software, such as peer-to-peer applications. Installing a spyware program takes just a few seconds. It is not uncommon for spyware and advertising programs to install so many processes that the infected computer becomes unusable, defeating the intentions of attackers. portmanteau word VáRZRSo- ZVWDáH]SRáF]HQLDLnQ\FKVáyZ malicious ]árolz\ consent zgoda, przyzwolenie hostile wrogi intrusive QLHSR*GDQ\ unfamiliar nieobeznany intent intencja, zamiar Trojan horse NR WURMDVNL crime SU]HVWSVWZR prank SVLNXVJáXSL*DUW merely tylko, jedynie perpetrator sprawca chiefly JáyZQLH broadband szerokopasmowy forced advertising nachalna reklama strictly Z\áF]QLH unsolicited nie zamówiony exploit Z\NRU]\VW\ZDü defeat SRUD*NDQLHSRZRG]HQLH 240
([SORLWV 'LDOHUV 62/85/,QMHFWLRQV :RUPV 0$/:$5( 7URMDQV 9LUXVHV %DFNGRRUV 6S\ZDUH 5RRWNLWV %RRWVHFWRU YLUXVHV 3DUDVLWLF YLUXVHV 0DFURYLUXVHV $GZDUH &ULPHZDUH.H\ORJJHUV +LMDFNHU%+2 Malware diagram Infectious malware: viruses and worms The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behaviour. The term computer virus is used for a program which has infected some executable software and which causes that software, when run, to spread the virus to other executable software. Viruses may also contain a payload which performs other actions, often malicious. A worm, on the other hand, is a program which actively transmits itself over a network to infect other computers. A virus requires user intervention to spread, whereas a worm spreads automatically. Trojan Horses A Trojan horse is any program that invites the user to run it, but conceals a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting all the user s files, or more commonly it may install further harmful software into the user s operating system to serve the creator s longer-term goals. Rootkits Once a malicious program is installed on a system, it is often useful to the creator if it stays concealed. The same is true when a human attacker breaks into a computer directly. Techniques known as rootkits allow this spread UR]SU]HVWU]HQLDü executable software programy Z\NRQ\ZDOQHX*\WNRZH payload tu: instrukcje, kody conceal XNU\ZDü take effect XDNW\ZQLüVL delete XVXQü concealed ukryty human attacker kraker 241
concealment, by modifying the host operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep their files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator (root) access. Today, the term is used more generally for concealment routines in a malicious program. Backdoors A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised in some way, one or more backdoors may be installed, in order to allow the attacker access in the future. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors crackers may use Trojan horses, worms, or other methods. concealment ukrywanie, maskowanie, utajnianie root NRU]H(UyGáR concealment routine procedura ukrywania backdoor tylne drzwi authentication identyfikacja cracker NUDNHUZáDP\ZDF] casual przypadkowy, dorywczy Zwroty to infiltrate without the owner s informed consent LQILOWURZDüEH]]JRG\LZLHG]\X*\WNRZQLND to base on the intent of the creator ED]RZDüQDLQWHQFMLWZyUF\ the strictly for-profit category of malware NDWHJRULD PDOZDUH SU]H]QDF]RQD Z\áF]QLH GR RVLJQLFLD]\VNX packaged with user-installed software XNU\W\ZSURJUDPLHLQVWDORZDQ\PSU]H]X*\WNRZQLND to defeat the intentions of attackers QLZHF]\ü]DPLDU\DWDNXMF\FK to be installed on an operating system E\ü zainstalowanym w systemie operacyjnym to hide from the user XNU\üSU]HGX*\WNRZQLNLHP 2EMDQLHQLD P2P (od peer-to-peer równy z równym) model komunikacji w sieci komputerowej, który JZDUDQWXMHRE\GZXVWURQRPUyZQRU]GQHSUDZDZSU]HFLZLHVWZLHGRPRGHOXNOLHQWVHUZHU :VLHFLDFK33ND*G\NRPSXWHUPR*HMHGQRF]HQLHSHáQLü]DUyZQRIXQNFMNOLHQWDMDNLVHrwera. Payload WRWDF]üSU]HV\áDQHJRSU]H]VLHüPDWHULDáXNWyUD]DZLHUDGDQHLLQIRUPDFMHRNUe- ODMFH(UyGáRLPLHMVFHSU]H]QDF]HQLHSU]HV\áDQHJRPDWHULDáX2NUHOHQLHWRSRZVWDáR]SRá- F]HQLDGZyFKVáyZpay (SáDFLü) i load (ádgxqhn,qq\plvárz\payload to kod i dane (tutaj VWDQRZLFHáDGXQHN]DNWyU\WU]HED]DSáDFLü 242
GRAMATYKA 1. Gerund Rootkits can prevent a malicious process from being visible in the system s list of processes. 5RRWNLW\PRJ]DSRELHFZ\ZLHWODQLXV]NRGOLZHJRSURFHVXQDOLFLHSURFHVyZV\VWemu. *HUXQGWZRU]\VLRGEH]RNROLF]QLNDSU]H]GRGDQLHNRFyZNL-ing (be being, have having, talk talking itd.). *HUXQGPR*QDXWZRU]\üRGZV]\VWNLFKF]DVRZQLNyZ]Z\MWNLHPPRGDl- Q\FK0DRQZLFWVDPIRUPFRLPLHVáyZF]DVXWHUD(QLHMV]HJRDOHQLHVSHáQLDWHMVDPHM IXQNFMLQDWRPLDVWZ\UD*DF]\QQRüZSRVWDFLRVRERZHMSRGREQHMGREH]RNROLF]QLND:]Ga- QLX PR*H E\ü SRGPLRWHP RU]HF]HQLHP OXE RNROLF]QLNLHP Gerund nie ma odpowiednika w M]\NXSROVNLP±QDMEOL*V]H]QDF]HQLHPVU]HF]RZQLNRGVáRZQ\LOXEFDáH]GDQLHSRdU]GQH Formy gerundx*\zdp\: SRF]DVRZQLNDFK]GRSHáQLHQLHPSU]\LPNRZ\P np.: to insist on, to object to, to blame somebody for, to succeed in, to prevent somebody from: He is blaming me for infecting his PC. On obwinia mnie za zainfekowanie jego komputera. po przyimkach (on, in, above, for, with, before, like, oflwgqlh]doh*qlhrgnrqvwuxnfmlz MDNLHMZ\VWSXM: I m tired of her talking so much. =PF]RQ\MHVWHPW\P*HRQDWDNGX*RPyZL. Before sending an email, check the e-mail address. 3U]HGZ\VáDQLHPHPDLODVSUDZG(Ddres. SRSU]\VáyZNDFKLQLHNWyU\FKW\ONRSU]\PLRWQLNDFK, np.: busy i worth: Always coming too late can be irritating. &LJáHVSy(QLDQLHVLPR*HE\üLU\WXMFH. He is always busy surfing on the Internet. 2Q]DZV]HMHVW]DMW\surfowaniem w internecie. 3UREOHPDW\F]QHVáyZND/$67±7$.( Installing a spyware program takes just few seconds. Zainstalowanie programu spyware zajmuje tylko kilka sekund. Disruption on the Internet connection lasted nearly the whole day. =DNáyFHQLDZSRáF]HQLX]LQWHUQHWHPWUZDá\SUDZLHFDá\G]LH. Czasowniki to last (WUZDü VWDUF]Dü) i to take (WUZDü]DMPRZDüF]DVEUDüZ]LüPRJVáX *\ügrrnuhodnia czasu trwania, przy czym to lastx*\zdvlgrrnuhohqldf]dvxwuzdqldmdnlh JR]MDZLVNDF]\Z\GDU]HQLDQDWRPLDVWto takegrrnuhohqldf]dvxsrwu]heqhjrqdz\nrnanie MDNLHMF]\QQRFLOXESUDF\ The weather forecasts said that the bad weather would last three days maximum it lasted the whole week. 3URJQR]DSRJRG\PyZLáD*H]áDSRJRGDEG]LHSU]H]WU]\GQL±DOHE\áDSU]H]WyG]LH Formatting of the hard disc and reinstalling all programs will take at least 3 hours. Formatowanie dysku i ponowna instalacja wszystkich programów zajmie co najmniej 3 godziny. To last PR*H E\ü X*\ZDQH Z SRáF]HQLX ] U]HF]RZQLNDPL: rain, storm, hurricane, love, marriage, relationship, concert, theatre play, radio programme, Internet connection itp.: Our relationships lasted over a decade. 1DV]D]QDMRPRüWUZDáDSRQDGGHNDG. 243
I don t think I ll last long in this job. 1LHVG]DE\PZ\WUZDáGáXJRZWHMSUDF\. To take PR*HE\üX*\ZDQH]RNUHOHQLDPLW\SX: journey to work (dojazd do pracy), job, repair, troubleshooting, program installation, error correction, removal of malware, data transfer itp.: How long does it take? -DNGáXJRWRSRWUZD",OHF]DVXWR]DELHU]H? It won t take long. 7RQLHSRWUZDGáXJR. My journey to work takes an hour. = It takes me an hour to get to work. Something can take a long time/ 5 minutes/ ages Ponadto last]qdf]\wh*rvwdwqlrvwdwqlrqdnrfx: This page was last modified on 14 November 2009. 7DVWURQDLQWHUQHWRZD]RVWDáD]PRG\ILNRZDQDRVWDWQLUD]OLVWRSDGD. I m on my last legs. -HVWHPQDÄRVWDWQLFK QRJDFKF]\OL]H]PF]HQLDOHGZRWU]\PDPVLQD nogach). Keep your laptop clean it keeps its value and lasts longer. &]\üvzymodswrs±qlheg]lhwudfláqdzduwrflleg]lhgáx*hmg]ldádá %H]RNROLF]QLNF]DVXSU]HV]áHJR Viruses such as the Melissa virus appear to have been written chiefly as pranks. Wirusy, takie jak wirus 0HOLVVDZ\GDZDá\VLE\üSLVDQHJáywnie jako psikusy. : SRZ\*V]\P ]GDQLX Z\VWSLá EH]RNROLF]QLN F]DVX SU]HV]áHJR perfect infinitive) w stronie ELHUQHM7RMHV]F]HMHGQDNRQVWUXNFMDJUDPDW\F]QDNWyUDQLHLVWQLHMHZM]\NXSROVNLPPerfect LQILQLWLYHWZRU]\VL]EH]RNROLF]QLNDF]DVRZQLNDhave i LPLHVáRZXELHUQHJRF]DVXSU]HV]áHJR (past participle) danego czasownika: to have + past participle a w stronie biernej: to have been + past participle :\UD*DRQEH]RVRERZRF]\QQRüNWyUDRGE\áDVLOXEPLDáDVLRGE\üSU]HGF]\QQRFLZVND ]DQSU]H]RVRERZIRUPF]DVRZQLNDJáyZQHJRZF]DVLHWHUD(QLHMV]\POXESU]HV]á\P Perfect infinitive, jak to have liked, to have seen, to have written itd. (*HVLOXELáRZi- G]LDáRQDSLVDáRZ\VWSXMHQDMF]FLHMSRF]DVRZQLNDFK to seem (Z\GDZDüVL), to happen (]GDU]\üVL), to appear (]MDZLüVLRND]\ZDüRUD]SRLPLHVáRZDFKELHUQ\FKsaid, supposed, known, believed, np.: He is said to have designed the best virus protection system. 0yZLVLRQLP*HVWZRU]\áQDMOHSV]\V\VWHPRFKURQ\DQW\ZLUXVRZHM Perfect LQILQLWLYHZSRáF]HQLX]F]DVRZQLNDPLPRGDOQ\PLVWRVXMHVLZ]GDQLDFKZ\UD*DMcymi obozl]hn*\f]hqlhsu]\sxv]f]hqlhqs I ought to have installed an anti-malware software. 3RZLQLHQHPE\á]DLQVWDORZDüSURJUDPDQW\PDOZareDOHQLH]DLQVWDORZDáHP My computer couldn t have spread that virus. 0yMNRPSXWHUFK\EDQLHPyJáUR]HVáDüWHJRZirusa. You can t have said that. 1LHPRJáHWHJRSRZLHG]LHü. ( ]SHZQRFLWHJRQLHSRZLHG]LDáH) 244
û:,&=(1,$ I. 8]XSHáQLMSRQL*V]H]GDQLDSRGDQ\PLZ\UD]DPLZRGSRZLHGQLHMIRUPLH 8ZDJDW\NR]SRGDQ\FKF]DVRZQLNyZPDE\üX*\W\FK block, chat, clean, dial, earn, email, install, learn, meet, lodge, play, speak 1.... a foreign language is extremely interesting. 2. Before...the number, check that you have inserted your phone card. 3. I don t like... games on the computer. 4.... money isn t the only reason for joining a students camp. 5.... your computer of spyware will be time-consuming. 6. Do you think that... with French people will teach you English? 7. He earned enough for his board and.... 8. Have I told you that... with people of all nations is Jim s hobby? 9.... all possible attacks is the only plausible action to take. 10.... a program with known security flaws can be very dangerous. II. Wstaw last lub take w odpowiedniej formie: 1. This article looks back at the evolution of the Internet over... 10 years. 2. Today s viruses may also... advantage of network services such as the World Wide Web and e-mail. 3. Care must be... not to transfer the virus to a new computer. 4. My marriage didn t... long. 5. It... me 2 years to get a divorce (and my former wife... all my money!) 6. How long does it... to go by bus from London to Warsaw? 7. It... too long! 8. Reprogram all routers! it... ages!!! 9. They said that the rain wouldn t... one day but it rained the whole week. 10. I need one hour to get to school the bus... 20 minutes, the tube... another 20 minutes and it... me 20 minutes to walk. 11. We thought the concert would... four hours it only... two hours. 12. I haven t got enough money to... me till next week.,,,3u]hwáxpdf]qdm]\nsrovnl 1. Malware is not the same as defective software, that is, software which has a legitimate purpose but contains harmful bugs. 2. For a malicious program to accomplish its goals, it must be able to do so without being shut down, or deleted by the user or administrator of the computer it s running on. 3. Before Internet access became widespread, viruses spread on personal computers by infecting programs or boot sectors of floppy disks. 4. Many DOS viruses and Windows worms were designed to destroy files on a hard disk, or to corrupt the file system by writing junk data. 5. Anti-spyware programs can be used solely for detection and removal of malware software that has already been installed onto your computer. 6. The first antivirus programs combated only computer viruses, and modern antivirus software can protect computers against a wide range of malware, including worms, rootkits, and Trojans. 245
,93U]HWáXPDF]QDM]\NDQJLHOVNL 1. :LNV]Rü V\VWHPyZ RSHUDF\MQ\FK ]DZLHUD EáG\ NWyUH PRJ E\ü Z\NRU]\VWDQH SU]H] oprogramowanie szkodliwe. 2. 3URJUDP\DQW\ZLUXVRZH]DSHZQLDMRFKURQZF]DVLHU]HF]\ZLVW\PSU]HG]DLQVWDORZDQLHP VLRSUogramowania szkodliwego w twoim komputerze. (]DSHZQLDü provide) 3. 2FKURQDZF]DVLHU]HF]\ZLVW\PSU]HGPDOZDUHG]LDáDLGHQW\F]QLHMDNRFKURQDSU]HFLZZLUusowa. 4. ']LUREDNLVQDMF]FLHMSLVDQHGOD:LQGRZV26FKRFLD*QLHZLHONDOLF]EDMHVWWDN*HWZorzona dla systemów Linux i Unix. (WZRU]\ü design) 5. 5REDNVNDQXMHVLHüDE\]QDOH(üQLHFKURQLRQHNRPSXWHU\ZáDPDüVLGRW\FKNRPSXWHUyZL skopiozdüvl 9:ND*G\P]GDQLXMHVWMHGHQEáG±SRSUDZWH]GDQLD 1. We study hard in high school in order to entrance a good university. 2. I have a problem to memorising names of malware categories. 3. I was given lots of advices about buying my first mobile phone. 4. I think I am really lucky that I could met you. 5. Almost all students in the college do not seem to study hard. 6. I found that the number of universities which accept foreign students have been increasing. 7. Never I have seen such an exciting film. 8. The software company was grounded in 1999. 9. The latest news are always on Internet services. 10. What means stealware please? English humour Over quota A ragged individual stranded for several months on a small desert island in the middle of the Pacific Ocean. One day he noticed a bottle lying in the sand with a piece of paper in it. Rushing to the bottle, he pulled out the cork and with shaking hands withdrew the message. Due to lack of maintenance, he read, we regretfully have found it necessary to cancel your e-mail account. over quota przekroczenie limitu ragged obdarty maintenance XWU]\PDQLHX*\WNRZDQLH 246