Identify viruses, Trojans, worms, and malware

Source: Internet
Author: User
Tags superantispyware

What are the differences between viruses, Trojans, worms, and other malware?
To recover an infected computer, tech-savvy Lifehacker readers are often the first to answer questions quickly, but what do you know about viruses, spyware, pseudo-security software, Trojans, and worms? The following guidelines will help you understand all types of malware.
The main point of today's course is to help you teach your friends and family more about different types of malware and reveal some popular myths about viruses. Who knows? Maybe you can also learn one or two things.
What is malware?
Malicious software is short for Malware. This term can be used to describe viruses, worms, spyware, and any software designed to damage your computer or steal your information.
Virus causes a catastrophe to your files
The term 'computer virus 'is usually used with the term 'malware', although the two terms have different meanings. Strictly speaking, a virus is a program that can replicate itself and infect a computer and spread from one file to another, then, the files are copied or shared from one computer to another. Image: Joffley
Most viruses are embedded with executable files, but some can also lock master boot records, automatically run scripts, Microsoft Office macro files, or even attach arbitrary files in some cases. Many of these viruses, such as CIH, are designed to completely paralyze your computer. Other Viruses only delete or destroy your files, viruses are designed to create chaos and destroy them.
To keep yourself away from viruses, make sure that your anti-virus applications update the latest virus definitions from time to avoid suspicious file copies sent by email or other means. To set a special example file name, if the file should be an MP3. the file name is suffixed with .mp3.exe, then it is a virus.
Spyware steals your information
Spyware may be any software installed on your computer, it collects your information without your knowledge and returns the information to the spyware initiators so that they can use your personal information in an evil way. It may include key records, so that they can understand your password, observe your search habits, change your browser's homepage and search pages, and add hateful browser toolbar, or steal your password and credit card number.
Since spyware is mainly intended to take advantage of your losses, it usually does not kill your computer. In fact, many people do not even realize that Spyware is running, generally, a dozen or more spyware programs are installed on computers with a spyware application. Once you are monitored by many spyware programs, your computer will become slower.
What many people don't realize about spyware is that not all anti-virus software can capture spyware. You should communicate with software vendors to ensure that the anti-virus software you are using can actually check spyware. If you are dealing with a computer that has been heavily infected, run the MalwareBytes and SuperAntiSpyware combination to thoroughly clean it up.
Pseudo security software controls your computer for ransom
Pseudo-security software is a relatively new form of attack. When users are confused about downloading seemingly anti-virus applications, it will tell you, your computer is infected with hundreds of viruses and can only be cleaned up after payment and purchase authorization. Of course, these pseudo-security software applications are nothing more than malware, which controls your computer to take it as a quality until you pay a ransom, and in most cases you Cannot uninstall them, or even use computers.
If you have a computer infected with pseudo-security software, you 'd better use Google to search for the virus name and find out how to remove it, in fact, the steps are usually the same-run a combination of MalwareBytes and SuperAntiSpyware. If you need a ComboFix.
To learn more about the pseudo-Security software, including how a computer is actually infected in the first step, see how I eradicate Internet Security 2010 (Internet Security 2010) and other pseudo-Antivirus malware.
Install a backdoor in the Trojan program
It seems that the trojan program is doing nothing, but it actually hides the malicious code in its diagram. In many cases, a Trojan creates a backdoor that allows your computer to directly or as a botnet (a computer network infected with Trojans or other malware) is remotely controlled. The main difference between viruses and Trojans is that they are not self-copied and can only be installed by uninformed users. Image: otzberg
Once your computer is infected with a Trojan, it will be used for any number of evil purposes, such as DoS attacks on a website and hidden attacks on the proxy server, even worse, mass spam is sent. Anti-Trojan works in the same way as anti-virus. Make sure that anti-virus applications are updated frequently and do not open suspicious attachments, after careful consideration, try to use the downloaded version of Photoshop, which is a favorite Trojan hidden by malware developers.
Worms are infected through the network
Computer Worms copy themselves to other computers over the network. Generally, a security vulnerability is exploited from one host to another, which is automatically spread without user intervention. Because they can spread the entire network so quickly and infect every computer, they are often the most well-known type of malware, although many users still mistakenly call them viruses. The image provides me and the sysop
The most famous worm is the ILOVEYOU worm, which is spread in the form of email attachments, causing losses of more than $5.5 billion to enterprises. The Code Red worm causes 359,000 websites. The SQL Slammer Worm slows down the entire Internet in a short period of time, and the blast wave worm forces your computer to restart repeatedly.
Because worms often take advantage of network vulnerabilities, it is necessary to prevent such malware by ensuring that your firewall is enabled and locked in part. Of course, you still need a real-time update of anti-virus software.

Html ">

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.