Thursday 14 January 2016

Types of Computer viruses and malwares.

Well, today I'm here to have a post about computer viruses and threats which can affect the computer systems harmfully. Don't be worry about it I'll make it clear to how to remove and prevent your computer operating system from these malwares.

Before going further, firstly I define the "Viruses" and "Malwares" so the viruses are the small but insidious piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet. As a digital equivalent of biological microorganisms,
it attaches itself to the target computer's operating system or other programs, and automatically replicates itself to spread to other computers or networks. Invented in 1960s as a prank, viruses come in thousands of types and versions with new ones being invented every day, each requiring a different cure for the viruses and malwares. Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising

There are many types of viruses and malware mentioned under.

Trojan Horses:

The Trojan virus gets its name from an incident that occurs in Homer's Iliad. Similar to how the Greeks in Homer's poem sent an army of men, hidden in a wooden horse, to the Trojans to get into the wall of the city. A Trojan horse appears to be nothing more than an interesting computer program or file, such as "saxophone.wav file" on the computer of user who's interested in collecting sound samples. The Trojan virus once on your computer, doesn't reproduce, but instead makes your computer susceptible to malicious intruders by allowing them to access and read your files.

Worms:

A worm is technically not a virus, but a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system.  Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. Worms can also install backdoors on computers.

Worms are often confused with computer viruses; the difference lies in how they spread. Computer worms self-replicate and spread across networks, exploiting vulnerabilities, automatically; that is, they don’t need a cybercriminal’s guidance, nor do they need to latch onto another computer program. As such, computer worms pose a significant threat due to the sheer potential of damage they might cause.A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided.

Spyware:

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a Spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.

Logic Bomb:

Logic bombs are small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, the removal of a file, and so on. For example, a programmer could establish a logic bomb to delete critical sections of code if she is terminated from the company. Logic bombs are most commonly installed by insiders with access to the system.

Trap Door/ Back door:


A trap door is a secret entry point into a program that allows someone that is aware of the trap door to gain access without going through the usual security access procedures. Trap doors have been used legitimately for many years by programmers to debug and test programs. Trap doors become threats when they are used by unscrupulous programmers to gain unauthorized access. It is difficult to implement operating system controls for trap doors. Security measures must focus on the program development and software update activities.

 Because it is most commonly appearing new browser versions to suppress the starvation due to workload on browser.
After All now I will tell you how to prevent your computer operating system from these kind of malicious. feel easy and click the links below and download the Anti-Virus software, Anti-spyware definitions and anti-malware software.
For removing and preventing from the spywares click the link below to download the anti-spyware software.
For preventing and removing from the malwares and viruses and trapdoor and other kinds of threats from your computer please click the links below.














No comments:

Post a Comment