It is useful -- especially for novices -- to distinguish between various types of malware; this helps understand what they are, how they work, and how they spread. The definitions aren't perfect or universally accepted, but here's an approximation. A virus is a self-spreading piece of code hidden within some other code, and executed when the host code is run. A worm is a stand-alone programme which replicates itself using some type of vulnerability. A Trojan Horse is a programme which pretends to do something, while doing something else. Viruses and worms are self-replicating; Trojans aren't. Worms and Trojans are stand-alone programmes, viruses aren't. Spyware is any software which records some information about the user, without the user's knowledge or approval. A keystroke recorder is not spyware if installed by the user (e.g., to record his own actions to create a macro); the selfsame piece of software installed without the user's knowledge is spyware. Malware can be installed in stages. For instance, you run a Trojan Horse downloaded from Kazaa. The TH pretends to display a slide show; but, while it does that, it also installs in the startup items a worm. (If your account is admin, no password is necessary.) When you reboot, the worm runs, copies itself on any connected boot volumes, and installs spyware (a keystroke recorder), which later connects to a web site and uploads the recorded data. (This is just an illustration, not an actual series of events.) On Jun 14, 2005, at 19:05, Randy B.Singer wrote: > [...] There are three Trojans/Worms for OS X: Opener/Renepo, the > WordInstaller > Trojan, and MP3/Concept.[...] Of the three, Renepo is the most interesting and dangerous. It is (a) self-replicating, and (b) a script. If you regard the script as a stand-alone programme, then you describe Renepo as a worm, otherwise you describe it as a virus; it is not, in any case, a Trojan Horse. Renepo is also spyware (it looks for serial numbers, gather hashes, etc., and may even install a keystroke recorder). And it puts paid to any notion that "Mac OS X is safe because it is Unix". Word Installer (aka "Microsoft Word 2004 OSX Web Install") is a puerile Trojan Horse (it is a compiled script, but it is not self-replicating). MP3 Concept (which is only a proof-of-concept) is also a Trojan Horse, but cleverer than the other one. > There is spyware for the Macintosh, but it can't be installed via > e-mail > or a Web site. Installing it requires physical access to the > Macintosh, > and the user's passwords. User password is not necessary to install spyware if one has physical access -- a bootable device, e.g., CD or FW drive, can be used. In Tiger, it is theoretically possible to install spyware w/o physical access with a widget. It is even conceivable to do so without widgets, piggy-backing on sudo. But, it should be stressed that these are conceivable, rather than actual, threats. <0x0192>