Computer Viruses Worms And Trojans Explained

Computer Viruses Worms And Trojans Explained

Computer Viruses,​ Worms And Trojans Explained
Fighting viruses and getting rid of​ them is​ big business right now .​
The first step is​ knowing just what the​ enemy is.
THE ENEMY - Hackers and Crackers
Computer geeks say that there is​ a​ difference between hackers and crackers .​
Crackers do damage to​ systems they break into while hackers just want to​ see how everything works .​
We'll use the​ more common term of​ hacker .​
Originally the​ term hacker was someone who made furniture with the​ use of​ an​ axe.
A virus is​ malware for your computer .​
This is​ a​ term that covers all kinds of​ software that is​ malicious .​
The most common types of​ malware are Trojans,​ worms,​ and viruses.
Viruses are often hidden inside of​ other programs,​ for example installation programs that arrive to​ you through email attachments .​
When you run this host program the​ virus is​ executed .​
When the​ virus is​ in​ your computer memory it​ will be able to​ do a​ lot of​ damage such as​ infecting other computer programs.
Once the​ infection phase of​ the​ virus is​ complete the​ next stage begins: the​ destructive phase .​
Viruses will wait for a​ certain trigger,​ such as​ a​ date or​ the​ number of​ times that the​ virus has been copied,​ before the​ payload is​ delivered .​
The payload can be as​ simple as​ messages all the​ way to​ the​ deletion of​ files to​ the​ destruction of​ your operating system.
When viruses were first created they were often distributed on​ a​ floppy disk .​
As the​ Internet has grown,​ email and file downloads are the​ best way for viruses to​ be passed .​
Email can have attachments that can contain any type of​ computer file .​
Executable files can be loaded with viruses and therefore you shouldn't run them unless you're sure that they are virus free.
Worms are much like viruses because they are self-copying .​
They can reproduce across multiple networks without human aid,​ such as​ through the​ sending of​ emails .​
Worms,​ however,​ don't need an​ executable program in​ order to​ be passed along.
A worm can affect a​ computer network more than it​ can infect computers that are on​ that network .​
Because they self-copy they can overload the​ resources on​ a​ network .​
This can cause slow downs in​ the​ speed of​ data transfers by using a​ large amount of​ bandwidth...more bandwidth than is​ needed for normal network traffic .​
Any network that routes traffic on​ the​ Internet is​ simply known as​ software and hardware that is​ specialized .​
Both software and hardware can be bothered by malware.
A worm can be created to​ carry payloads by using an​ installation program through the​ backdoor .​
a​ backdoor is​ an​ access point into the​ computer that is​ hidden .​
The worm uses the​ backdoor and ignores the​ usual procedure for login .​
Backdoors are often used by spammers so that they can send junk email.
A Trojan horse is​ another kind of​ malware .​
a​ Trojan horse is​ a​ computer program that acts as​ though it​ will do one thing when it​ will actually do something different .​
This term comes from the​ story of​ Troy,​ a​ city which was deceived by the​ Greeks to​ get into the​ inner city undetected .​
a​ Trojan horse can't replicate itself the​ way viruses and worms can.
A Trojan horse can be hidden in​ software that is​ otherwise useful .​
When a​ Trojan horse starts it​ can do such things as​ corrupt files,​ install backdoors,​ erase data,​ and keep track of​ keystrokes .​
This information will enable hackers to​ steal your personal information such as​ passwords and credit card numbers.
In this series we​ will talk about what you can do to​ fight malware .​
Until then it's important to​ just be passive and not expect that your computer problems will be taken care of​ by someone else .​
Combating viruses needs the​ involvement of​ users,​ webmasters,​ and software vendors.

Related Articles:

Related Topics:

Computer News - Computer Guide - Computer Tips - Computer Advice - Computer Videos - Computer Support - Computer Questions - Computer Answers - Computer eBooks - Computer Help

Powered by Blogger.