Saturday, December 8, 2012

The Difference Between Malware, Virus, Rootkits, Spyware, Worm ...

One of the classic primary signs that a computer has been infected is that it suddenly becomes much less responsive than normal. This usually continues after rebooting the computer as the malicious software begins running again and using system resources. Applications that monitor system resources (such as the Windows Task Manager) of the computer may show a high percentage of the processor or processors already in use, even when a computer user is not running any applications. The majority of the system memory may also be in use and such a situation can also cause the computer to respond slowly. Using the Task Manager in Windows can show a computer user the running processes and can also be used to easily see what applications are using the most memory and processor resources.

At times, you may get weird random pop-ups trying to make you download something or sell something to you.

However, not every infection present these symptom. In fact, some do not exhibit any at all! The fact that your PC seems to function normally does not imply that all is well.

Malware

Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. It is basically an umbrella term covering computer viruses, worms, Trojan, spyware, rootkit etc. Some of them attack the computer programs and files while others attack users confidential data. Let us have a detailed look at their mode of operation.

Virus

Just as a biological virus replicates itself in a human cell, a computer virus replicates itself? in computer memory when initiated by the user. Not only do they replicate themselves but may also contain some malicious codes which can affect your files, your operating system or even your master boot records thereby making your computer start slow or not boot at all.

There are different types of viruses, some affect the system adversely and leave it completely unusable while some are just written to annoy the user. Disabling task manager or desktop wallpaper are a few of the most common ways that virus creators employ to irritate users.

As a virus always needs a human action to initiate itself, in a computer most of them attach themselves to an executable .exe file because it knows eventually the user will double click on it to run it and that is all it needs to infect the computer. Yes, unfortunately, most viruses are inadvertently initiated by the computer users themselves and hence it is important that when you install and run programs, you know beforehand that you got them from a trusted source.

Worm

Practically a worm is an evolved form of a virus. Like virus, worms too replicate and spread themselves but it happens on a bit larger scale. Also, unlike virus, a worm does not need a human action to replicate and spread and that is what makes it more dangerous.

A worm always seeks for network loopholes to replicate from computer to computer and thus most common way of intrusion are emails and IM attachments.? As the infection is network-based, a good firewall along with antivirus is necessary to control worm attack. Also, this means that blindly downloading email attachments or clicking the links friends share with you in a chat window is not recommended. Double-check before you do that.

Trojan Horse

TrojanTrojan horse or simply Trojan is a bit interesting. Trojan horse is a program that appears useful by pretending to do certain things in foreground, but in reality they are working silently in background with the only objective of harming your computer and/or stealing valuable information.

Let me explain this metaphorically.

Suppose you are the CEO of a company and there is an employee in your firm you think is a valuable asset because of some initial success he gave your company. In reality the employee is working for your competitor and destroying your company from within. Now these kinds of employees can be considered as Trojan horses if you consider the company as your computer.

Most common way to invite a Trojan horse to your computer is downloading malicious software like keys, cracks, free illegal music, wares etc from an unknown source. Thus the best way to stay away from Trojans is by making sure you install software from trusted sources.

Spyware

Spywares are also malicious computer programs that can be installed on computers but unlike any of the above they do not harm your computer in any way. Instead, they attack you!

Once installed on a system they run in background and keep on collecting user?s personal data. These data can include your credit card numbers, passwords, important files and many other personal stuff.

Spywares can track your keystrokes, scan and read your computer files, snoop IM chats and emails and God knows what else. Therefore again it?s always advisable to download and install software from trusted sources.

Rootkit

Rootkits are computer programs that are designed by attackers to gain root or administrative access to your computer. Once an attacker gains admin privilege, it becomes a cakewalk for him to exploit your system.

We have already discussed rootkit in detail previously and you can have a look at it for in-depth knowledge.

Conclusion

Overall, all these malware that were discussed have been there probably since the innovation of programming itself and with time, they have become more complex and harder to deal with. That does not mean you should worry too much. We have talked about tools like virus scanners and spyware removers before so make sure you keep your computer protected with them. If you are careful enough, most likely you will not have to worry about them.

Source: http://artwales.biz/the-difference-between-malware-virus-rootkits-spyware-worm-and-trojans/?utm_source=rss&utm_medium=rss&utm_campaign=the-difference-between-malware-virus-rootkits-spyware-worm-and-trojans

weather.com Colorado shootings dark knight rises Aurora shooting James Eagan Holmes jeremy lin Sage Stallone

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.