Internet, browsing, web design and computer technical learning to add knowledge about technology and increase side income

Worm, Trojan and Trojan Horse

|
Safety software, to a very large network in priority. Because many viruses that often interfere with the computer.
For the safety of the software that may attack the Trojans and worms are. In addition it is no such thing as a Trojan Horse.
Trojan horses are not viruses in real terms, since the program does not have the ability to replicate itself to other programs.
However, the program is no less dangerous than any other virus program. Trojan horse programs are generally packaged in an attractive form. Trojan Horse Behind the charm, there are other hidden functions to inflict damage.
Characteristics of computer users who get these files are going to run it because of the charm of the Trojan Horse. As a result of fatal, because then the user has run a destructive routine that can wreak havoc on a computer system.
Trojan first appeared in 1986 in the form of a shareware program called PC-Write. Therefore, the user should ensure shareware or freeware free trojan to put a firewall or antivirus in the computer system. Another source of disaster similar to the virus, but can not be categorized as virus, worm.
A worm is a program that can duplicate itself without infecting other programs. This worm spreads through regular exchange of data between the hard disk, diskette, or e-mail.
Spread via e-mail usually a small attachment. Users who are interested in running the program. Furthermore, without further ado, the program will perform the action. The worm will replicate itself by sending the file automatically via attachment to every address in the address book manager mail the victim. Generally not a destructive worm, however, resulted in aggravation in addition to the victim, the worm attacks can be very harmful to the mailserver. Worm outbreaks caused mailserver workload soared up can affect performance.
And not just for the mailserver, even our personal computers can also be castrated it. This happens because the worm can copy itself in the computer's memory very much. Can you imagine if the worm to duplicate itself at once, it will slow down your computer. Generally shaped worm executable file (EXE entry ends datau SCR), which is attached (attach) to the e-mail. However, there are several types of worms in the form of scripts written in Visual Basic (VBScript).
Worm attack of this type is primarily e-mail software Microsoft Outlook Express, but that does not necessarily mean that other applications are resistant to any kind of worm. Just like a trojan that can not be repaired (except by the authors themselves who know the source code).
You start asking questions how do I fix this? In the case of the attacks you need antivirus worm can delete directly from the computer.
So few virus problems that often interfere with our computer.
Hopefully we add insight and knowledge about the virus.

Related Posts