Software That Will Piss You Off

adsense 336x280

As computer technology evolves, a lot of security threats are being discovered at the same time. When we talk about computer threats, virus is the first thing that will run across our minds. Well, this is understandable for those with no or little computer language knowledge. Some people may actually classify other malware under the concept virus. For instance, virus is just another type of malware. A malware or malicious software is a program designed specifically to damage or disrupts a system. Aside from viruses; spywares, rootkits, keyloggers, worms, and Trojans are also classified as malwares.
Viruses and Worms work very much the same way and go hand in hand. A virus executes itself by inserting its malicious code in the execution path of another application. Then, it replicates by replacing existing files with copies of files containing the viral code. However, a computer virus must find an infected host files to propagate itself and further spread the infection. A worm, on the other hand, is a software program that is designed to copy itself from one computer to another automatically, without human interaction. That makes it different from a virus.
A worm can replicates itself in a really huge volume in a very short period of time. Worms reproduce not by infiltrating files but by infiltrating systems. They operate through networks and work as stand-alone programs. They are hard to track and are often disguised, and can spread easily and rapidly via email  example, a worm can send out copies of itself to every contact in your e-mail address book, and then it can send itself to all of the contacts in your contact's e-mail address books. Melissa and ILOVEYOU are some examples of worms. Way back in 2000, ILOVEYOU wreaked havoc causing an estimated of $5.5 billion damage in total.
Another type of malware is Trojan horses or commonly known as Trojan. This program disguised as something innocuous or useful to the user. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. This program is being used by hackers to steal important information, passwords, etc.; or to take control of your computer and use it to attack others. Although Trojan cannot reproduce itself, it can start off a virus or worm outbreak, by injecting it into users' local networks. Some examples of Trojans are RemoteAccess, Data Destruction, Downloader, Security software disabler, and Denial-of-service attack (DoS).
To summarize how these malwares work, - a virus infects files; a worm just spreads its own files, usually by sending itself by e-mail; and a Trojan horse just sits on one place, doing annoying stuff on the user's computer.
adsense 336x280

0 Response to "Software That Will Piss You Off"

Post a Comment