{"id":191,"date":"2023-01-18T01:00:00","date_gmt":"2023-01-17T22:00:00","guid":{"rendered":"https:\/\/www.biltek.net.tr\/?p=191"},"modified":"2023-10-27T16:22:40","modified_gmt":"2023-10-27T13:22:40","slug":"bilgisayar-virusu-nedir-en-yaygin-bilgisayar-virusleri-nelerdir","status":"publish","type":"post","link":"https:\/\/www.biltek.net.tr\/blog\/bilgisayar-virusu-nedir-en-yaygin-bilgisayar-virusleri-nelerdir","title":{"rendered":"Bilgisayar Vir\u00fcs\u00fc Nedir?"},"content":{"rendered":"\r\n<p><strong>Bilgisayar vir\u00fcsleri k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r ve tehdit edici unsurlar\u0131 vard\u0131r.<\/strong> Etkileri a\u00e7\u0131s\u0131ndan vir\u00fcslerin \u00e7e\u015fitleri vard\u0131r.<\/p>\r\n<h2><strong>En Yayg\u0131n Bilgisayar Vir\u00fcsleri Nelerdir?<\/strong><\/h2>\r\n\r\n\r\n\r\n<p><strong>Onay Almadan Y\u00fcklenme<\/strong><br \/>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, kullan\u0131c\u0131 onay\u0131 almadan bilgisayar, tablet ve ak\u0131ll\u0131 telefonlara bula\u015fabilmektedir. Ba\u015fl\u0131 ba\u015f\u0131na bir pazar haline gelen k\u00f6t\u00fc ama\u00e7l\u0131 vir\u00fcsler ki\u015fisel bilgilerin ele ge\u00e7irilmesi gibi ciddi sorunlara neden olabilmektedir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Malicious Software<\/strong><br \/>Bilgisayar vir\u00fcsleri \u00e7e\u015fitleri aras\u0131nda yer alan Malicious Software, bilgi \u00e7almak, sisteme zarar vermek gibi ama\u00e7lara y\u00f6nelik olu\u015fturulan yaz\u0131l\u0131mlar\u0131n ismidir. Yaz\u0131ld\u0131\u011f\u0131 dil bak\u0131m\u0131ndan basit kodlar halinde olabilece\u011fi gibi software- scumware olarak da g\u00f6r\u00fclebilir. \u0130\u00e7erisinde bir\u00e7ok dosya \u00e7e\u015fidi g\u00f6r\u00fclebilir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Exploit -S\u00f6m\u00fcrme<\/strong><br \/>Program a\u00e7\u0131klar\u0131n\u0131 bulan k\u00f6t\u00fcye kullanan bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, \u015fifreleri ele ge\u00e7irebilir. Ayr\u0131ca i\u015fletim sistemlerine zarar vererek ola\u011fan \u00e7al\u0131\u015fma d\u00fczenini olumsuz y\u00f6nde etkiler. Bu durumu d\u0131\u015far\u0131dan kod g\u00f6nderme ile yapar. Sistemi normal \u015fekilde \u00e7al\u0131\u015ft\u0131\u011f\u0131na ikna etti\u011fi i\u00e7in giri\u015fte izin almas\u0131na gerek kalmaz.<\/p>\r\n\r\n\r\n\r\n<p><strong>Keylogger Tu\u015f-Kay\u0131t<\/strong><br \/>Bir di\u011fer bilgisayar vir\u00fcs\u00fc \u00e7e\u015fidi de Keylogger\u2019d\u0131r. Kendini hi\u00e7 belli etmeden \u00e7al\u0131\u015fan bu k\u00f6t\u00fc yaz\u0131l\u0131mda programlanan veriler hackera g\u00f6nderilmektedir. Keylogger, klavye hareketlerini kaydeder ve ki\u015fisel bilgilerinizi \u00e7ald\u0131\u011f\u0131 i\u00e7in ciddi anlamda zarara neden olabilir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Rootkit- K\u00f6k Kullan\u0131c\u0131 Tak\u0131m\u0131<\/strong><br \/>Benzerlerinden farkl\u0131 olarak Rootkit, i\u015fletim sisteminden gizlenen programlar\u0131 i\u015faret eder. Hangi sistemde bulunuyorsa burada varl\u0131\u011f\u0131n\u0131 gizleyecektir. Kullan\u0131m amac\u0131 bak\u0131m\u0131ndan ge\u00e7mi\u015fte bilgileri saklamak i\u00e7in varl\u0131\u011f\u0131n\u0131 s\u00fcrd\u00fcrse de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131lan \u00e7e\u015fitleri de vard\u0131r. K\u00f6t\u00fc yaz\u0131l\u0131mda, bir kaynaktan gelen program kabul edilerek \u00e7al\u0131\u015ft\u0131r\u0131l\u0131r. Bu durum sonras\u0131 rootkit kurulumu tamamlanm\u0131\u015f olur. Yani \u00fcst d\u00fczey yetki ile kullan\u0131m vard\u0131r.<\/p>\r\n\r\n\r\n\r\n<p><strong>Spam \u2013Y\u0131\u011f\u0131n Mesajlar<\/strong><br \/>\u0130leti\u015fim a\u011flar\u0131nda yayg\u0131n \u015fekilde g\u00f6r\u00fclen uygunsuz iletilerin genel ad\u0131 spam olarak tan\u0131mlanabilir. \u0130lanlar, reklamlar s\u0131kl\u0131kla spama d\u00fc\u015fmektedir. \u00d6zellikle maillerde yayg\u0131n g\u00f6r\u00fclmesinin nedeni, bu ileti\u015fim \u015feklinde kimlik denetimi, g\u00fcvenlik gibi durumlar\u0131n g\u00f6z \u00f6n\u00fcnde bulundurulmamas\u0131d\u0131r. Ancak baz\u0131 h\u0131zl\u0131 mesajla\u015fma sa\u011flayan servislerde de spamlara rastlanabilmektedir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Truva At\u0131 -Trojen Horses<\/strong><br \/>Arka planda gizli \u015fekilde \u00e7al\u0131\u015fan bir vir\u00fcs \u00e7e\u015fididir. Bilgisayar\u0131n\u0131za y\u00fcklendi\u011fi anda sistemi epey zorlayacakt\u0131r.<\/p>\r\n\r\n\r\n\r\n<p><strong>Worms- Solucan<\/strong><br \/>A\u011f ba\u011flant\u0131s\u0131 \u00fczerinden bula\u015fan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fcd\u00fcr. Bir dosyaya gizlenmeden bilgisayara bula\u015fabilir ve bu a\u00e7\u0131dan daha tehlikelidir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Taray\u0131c\u0131 Ele Ge\u00e7irme- Browser Hijacking<\/strong><br \/>\u0130nternetteki sitelerin ziyaret\u00e7i say\u0131lar\u0131n\u0131 art\u0131rmak i\u00e7in haz\u0131rlanm\u0131\u015f bir k\u00f6t\u00fc yaz\u0131l\u0131md\u0131r. Bu \u015fekilde reklamlardan fazla kazan\u00e7 ama\u00e7lan\u0131r. Bu casus program\u0131n yerle\u015fip yerle\u015fmedi\u011fini anlamak i\u00e7in arama sayfas\u0131n\u0131n istek d\u0131\u015f\u0131 de\u011fi\u015fmesi temel al\u0131nabilir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Tuzak Kapanlar\u0131 -Trap Doors<\/strong><br \/>Yaz\u0131l\u0131m i\u00e7erisine yerle\u015ftirilen bir vir\u00fcst\u00fcr. Bu vir\u00fcs\u00fcn yerle\u015ftirildi\u011fi bilgisayara uzaktan eri\u015fimle ula\u015f\u0131lmas\u0131 muhtemeldir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Ekran-Kay\u0131t Screenlogger<\/strong><br \/>Fare kullan\u0131l\u0131rken ekran \u00fczerinde bir yere t\u0131klad\u0131\u011f\u0131n\u0131zda ekran kayd\u0131 yapan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fcd\u00fcr. Kaydetti\u011fi alan ya bir k\u0131sm\u0131 ya da ekran\u0131n tamam\u0131d\u0131r. Bu kay\u0131tlar sabit bir yere g\u00f6nderilir.<\/p>\r\n\r\n\r\n\r\n<p><strong>Casus -Spyware<\/strong><br \/>Ziyaret edilen sitelerde tuzak pencerelere t\u0131klanmas\u0131yla bilgisayara kurulan yaz\u0131l\u0131mlard\u0131r. Bilgisayar\u0131n kendi vir\u00fcs koruma program\u0131n\u0131n olmas\u0131 bu a\u00e7\u0131dan \u00f6nemlidir.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Bilgisayar vir\u00fcsleri k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r ve tehdit edici unsurlar\u0131 vard\u0131r. Etkileri a\u00e7\u0131s\u0131ndan vir\u00fcslerin \u00e7e\u015fitleri vard\u0131r. En Yayg\u0131n Bilgisayar Vir\u00fcsleri Nelerdir? Onay Almadan Y\u00fcklenmeK\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, <a class=\"mh-excerpt-more\" href=\"https:\/\/www.biltek.net.tr\/blog\/bilgisayar-virusu-nedir-en-yaygin-bilgisayar-virusleri-nelerdir\" title=\"Bilgisayar Vir\u00fcs\u00fc Nedir?\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":1432,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-genel"],"_links":{"self":[{"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/posts\/191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":2,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/posts\/191\/revisions"}],"predecessor-version":[{"id":1433,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/posts\/191\/revisions\/1433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/media\/1432"}],"wp:attachment":[{"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/categories?post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.biltek.net.tr\/blog\/wp-json\/wp\/v2\/tags?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}