Well,
today I'm here to have a post about computer viruses and threats which can
affect the computer systems harmfully. Don't be worry about it I'll make it
clear to how to remove and prevent your computer operating system from these
malwares.
Before
going further, firstly I define the "Viruses" and "Malwares" so the viruses are the
small but insidious piece of programming-code that attacks computer and network
systems through 'contaminated' (infected) data files, introduced into a system
via disks or internet. As a digital equivalent of biological microorganisms,
it attaches itself to the target computer's operating system or other programs, and automatically replicates itself to spread to other computers or networks. Invented in 1960s as a prank, viruses come in thousands of types and versions with new ones being invented every day, each requiring a different cure for the viruses and malwares. Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising
it attaches itself to the target computer's operating system or other programs, and automatically replicates itself to spread to other computers or networks. Invented in 1960s as a prank, viruses come in thousands of types and versions with new ones being invented every day, each requiring a different cure for the viruses and malwares. Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising
There
are many types of viruses and malware mentioned under.
Trojan Horses:
The Trojan virus gets its name from an incident that occurs in
Homer's Iliad. Similar to how the Greeks in Homer's poem sent an army of men,
hidden in a wooden horse, to the Trojans to get into the wall of the city. A
Trojan horse appears to be nothing more than an interesting computer program or
file, such as "saxophone.wav file" on the computer of user who's
interested in collecting sound samples. The Trojan virus once on your computer,
doesn't reproduce, but instead makes your computer susceptible to malicious
intruders by allowing them to access and read your files.
Worms:
A worm is technically not a virus, but a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system. Worms utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email. Worms can also install backdoors on computers.
Worms
are often confused with computer viruses; the difference lies in how they
spread. Computer worms self-replicate and spread across networks, exploiting
vulnerabilities, automatically; that is, they don’t need a cybercriminal’s
guidance, nor do they need to latch onto another computer program. As such,
computer worms pose a significant threat due to the sheer potential of damage
they might cause.A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided.
Spyware:
Spyware is any technology that aids in gathering information
about a person or organization without their knowledge. On the Internet (where
it is sometimes called a Spybot or tracking software), spyware is programming
that is put in someone's computer to secretly gather information about the user
and relay it to advertisers or other interested parties. Spyware can get in a
computer as a software virus or as the result of installing a new program.
Once installed, the spyware monitors user activity on the
Internet and transmits that information in the background to someone else.
Spyware can also gather information about e-mail addresses and even passwords
and credit card numbers. Spyware is similar to a Trojan horse in that users
unwittingly install the product when they install something else. A common way
to become a victim of spyware is to download certain peer-to-peer file swapping
products that are available today.
Logic Bomb:
Logic
bombs are small programs or sections of a program triggered by some event such
as a certain date or time, a certain percentage of disk space filled, the
removal of a file, and so on. For example, a programmer could establish a logic
bomb to delete critical sections of code if she is terminated from the company.
Logic bombs are most commonly installed by insiders with access to the system.
Trap Door/ Back door:
A trap door is a secret entry point into a
program that allows someone that is aware of the trap door to gain access without
going through the usual security access procedures. Trap doors have been used
legitimately for many years by programmers to debug and test programs. Trap
doors become threats when they are used by unscrupulous programmers to gain
unauthorized access. It is difficult to implement operating system controls for
trap doors. Security measures must focus on the program development and
software update activities.
Because it is most commonly appearing new
browser versions to suppress the starvation due to workload on browser.
After All now I will tell you how to prevent your computer operating system from these kind of malicious. feel easy and click the links below and download the Anti-Virus software, Anti-spyware definitions and anti-malware software.
For removing and preventing from the spywares click the link below to download the anti-spyware software.
For preventing and removing from the malwares and viruses and trapdoor and other kinds of threats from your computer please click the links below.
No comments:
Post a Comment