This document provides an overview of various types of host-based attacks, including backdoors, viruses, worms, trojans, rootkits, and spyware. It discusses the characteristics and infection methods of each type of malicious code or software. The document emphasizes that host-based attacks are becoming more sophisticated over time, leading to an arms race between attackers and security developers, with attackers usually staying one step ahead due to their professional training and links to organized crime.