Computer virus
The program to which it is attached
Or already a file
It can spread from computer to computer
It is like a human virus
It can spread and disrupt your computer system.
Make Windows more error prone
Destroy user data
Hardware and software
Delete important files
And so on.
But most viruses
These are executable files
For example .. chrome.exe, system.bat,
flashy.com and so on
They
Even if it is on the computer
If you do not open / run it yourself
Nothing can harm your computer
So keep in mind that human activity is not involved
Computer viruses are not contagious
There are various ways to spread the virus.
Forward E-mail attached files;
memory sticks (flash / thumb drives);
From Full Sharing
Inserting a virus infected file
Virus infected file without knowing each other
shared and so on.
Malware
Malware is two English words
Integrated with Malicious Software
Like a virus that computer scientists easily call
programs.
This malware can be used without the permission of the computer owner.
Unknowingly logged into a single computer / server / computer network
It can damage your computer system. They are often written to be annoying.
Malware includes Computer Viruses, Worms, Trojan Horses, Most Rootkits, Spyware, Dishonest Adware,
Crimeware and Other Malicious and Unwanted Software.
Worm
A worm is written to look like a virus
Also known as a sub-class, it is not a human-like virus
It spreads to other computers in its computer network without any human intervention
The biggest danger is that it can pretend to be a system file and copy itself over 100 million.
Increases the used space of the hard disk. Increases the system memory usage of the computer.
Increases network bandwidth. Frequent Not Responding of running programs.
The most common worm is the Blaster worm, which is already present in the computer system
Crackers are designed to remotely control a computer.
Trojan Horse
A Trojan horse is also called a Trojan. It is usually included in some useful software.
For example, hackers and crackers are installing and playing a game, but on the other hand
This game is called Trojan horse.
Actually, the game is an official game, but it seems to be a virus infected game.
A Trojan horse can do the following:
♦ Remote Access
♦ Data Destruction
♦ Downloader/dropper
♦ Server Trojan (Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
♦ Disable security software
♦ Denial-of-serviceattack(Dos)
Spyware
He is a thief. He will never damage your computer.
However, a variety of user information about the user on the computer, Important data
Spyware can usually be accessed through web browsers.
It will then redirect you to the browser home page, displaying various error messages.
(For example, your computer already has a lot of problems. Click the button below to fix it.)
You click a link, but other porn sites will open automatically if you do not open it.
Some people think http cookies are spyware, but they are not
However, this cookie may contain data that can be tracked by spyware
Most Spyware Remover deletes cookies…
If you want to prevent spyware, you should avoid links that pop up pop-ups.
Adware
Adware is an advertising-supported software or software package.
It automatically pops up on the screen and forces you to download it.
Some adware are spyware.
Crimeware
Crimeware
Spyware, Adware,
Included in the hMalware category.
Its purpose is often to write about financial crimes.
It provides user passwords, links
You can save information
It can be opened by someone running it and stealing user data.
For example, the modern key logger.
keystroke logging software
Crimeware
About ComputerVirus Above
To educate readers
It was written on purpose.
Credit to the original author
If you do not like it, please share.
#itpmobile