Explained Virus, Malware, Spyware Etc.

Virus

A Computer Virus Is A Program Capable Of Continually Replicating With Little Or No User Intervention. Typically A Piece Of Code Causes Damage To Your Computer Either By Deleting Or Corrupted Files. A Virus Can Also Interface With Computer Operations By Multiplying Itself To Fill Up Disk Space Or Randomly Access Memory (RAM) Space, Secretly Infecting Your Computer. Often Viruses Are Disguised AS Games, Images, E-Mail, Attachments, Website URLs, Shared Files Or Link Or Files In Instant Messages.

 

Spyware

Spyware Is Malicious Computer Program That Does Exactly What Its Name Implies i.e., Spies On You. After Downloading Itself Onto Your Computer Either Through An E-Mail You Opened, Website You Visited Or A Program You Downloaded, Spyware Scans Your Hard Drive For Personal Information And Your Information And Your Internet Browsing Habits. Some Spyware Programs Contain Key Loggers That Will Record Personal Data You Entered Into Websites, Such As Your Login Usernames And Passwords, E-Mail Address, Browsing History, Online Buying Habits, Your Computer’s Hardware And Software Configurations, Your Name, Age And Sex, As Well As Sensitive Banking And Credit Information. Some Spyware Can Interface With Your Computer’s System Settings, Which Can Result In A Slower Internet Connection.

 

Adware

Adware Is Any Software That, Once Installed On Your Computer, Tracks Your Internet Browsing Habits And Sends You Popups Containing Advertisements Related To The Sites And Topics You’ve Visited, While This Type Of Software May Sound Innocent, And Even Helpful, It Consumes And Slow Down Your Computer’s Processor And Internet Connection Speed. Additionally, Some Adware Has Key Loggers And Spyware Built Into The Program, Leading To Greater Damage To Your Computer And Possible Invasion Of Your Private Data.

 

Malware

Malware Is A Short For Malicious Software. Malware Is Board Term That Encompasses Computer Viruses, Worms. Trojan Horses, Spyware, Adware And Others. Malware Is Designed To Interface With Normal Computer Operation, Usually Giving Hackers A Chance To Gain Access To Your Computer And Collect Sensitive Personal Information.

 

Worm

Worm Is A Type Of Virus That Spreads Through Your Computer By Creating Duplicates Of Itself On Other Drives, System And Networks. One Features That Makes Worms So Dangerous Is That They Can Send Copies Of Themselves To Other Computer Across A Network Via E-Mail, An Infected Webpage, And Instant Message.

 

Trojan Horse (Trojan)

A Trojan Horse Is A Program That Either Pretends To Have, Or Is Described A Having, A Set Of Useful Or Desirable Features But Actually Contains Damaging Code. Generally, You Receive Trojan Through E-Mails, Infected Webpages, Instant Message Or Downloading Services Like Games, Movies And Apps. True Trojan Horses Are Not Technically Viruses, Since They Do Not Replicate; However Many Viruses And Worms Use Trojan Horse Tactics To Initially Infiltrate A System. Although Trojans Are Not Technically Viruses, They Can Be Just As Destructive.

 

 

 

Best Practices To Protect Against Viruses, Spyware, Adware, Malware, Worms And Trojan Horses.

Unbeknownst To You, Malicious Program Can Infiltrate Your Computer When You Open An E-Mail Attachment, Visit Certain Websites, Download A Game, Etc. To Protect Yourself From Such Attacks, It Is Best To Educate Yourself And Avoid These Programs All Together. Check Out Our Checklist Below To Learn The best Practices For Protecting Your Computer Against Intruders.

Ø Don’t Download Files From Unknown Sources, Including From Your E-Mail Or The Web.

Ø Scan All New Files With Virus-Scanning Software Before Opening.

Ø Don’t Download An Attachment (E.g., Pictures, Games, Files Electronic Greetings) Unless It’s Form Someone You Know.

Ø Start By Running Anti-Spyware Software On A Regular Basis To Catch Any Programs Tat May Infected Your Computer. After The Software Removes The Spyware It Finds, Restart Your Computer And Scan It Again To Makes Sure All Spyware Was Deleted. Some Spyware Programs Can Be Difficult To Remove, So Might Take More Than One Try.

Ø Be Careful  When Downloading Free Or Peer To Peer Files, Especially Music Files And Media Sharing Programs. Read The Licensing Agreements To Understand Exactly What You’re Downloading. Many Popular Applications Include Spyware Components, And Some Applications Won’t Work Without Those Components.

Ø Protect Your Computer With A Firewall, Especially If You Use A Broadband Internet Connection.

Ø Use A Trusted Internet Provider.

Ø Use Antivirus Software To Catch Viruses, Worms And Trojan Horse Before They Can Do Any Damage.

Ø Don’t Download Any Programs From Websites You Don’t Trust.

Ø Adjust Your Browser’s Security Settings To Provide At Least A Medium Level Of Security. A Lower Setting Makes It Easier For Malware To Access Your Computer.

Ø ActiveX Controls Are Prone To Spyware And Other Malware So Don’t Approve The Installation Of Any ActiveX Controls You Haven’t Requested.


Comments

Popular posts from this blog

Features and Advantages of Windows server 2016 part 1