Computer infections can be broken up into 4 main categories which are explained in detail below:
Viruses
Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers!
Worms
A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it's host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.
Trojan Horses
A Trojan horse is a computer programs that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do.
E-mail Viruses
Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim's e-mail address book. Several of these virus's have raced through the internet. Examples of email virus's are the Melissa Virus, and the ILOVEYOU virus.
Feel free to reprint this article as long as you keep the following caption and author biography in tact with all hyperlinks.
Ryan Fyfe is the owner and operator of Software Area. Which is a great web directory and information center on Anti Virus Software and other computer software related issues.
![]() |
|
![]() |
|
![]() |
|
![]() |
First, let's do a little recap'. As I stated in... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Have been an Internet user for more than 9 years,... Read More
At this point, if you've got the whole "turning the... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Computer security for most can be described in 2 words,... Read More
You and I are a lot alike. We are both... Read More
A couple of years back, I paid my dues the... Read More
Business on the internet is getting down right shameless. This... Read More
Paypal is a great site and is used by many... Read More
This is not some new fangled techno-speak, it is a... Read More
During the release of a new software product specialized to... Read More
In recent days, I was one of the unfortunate persons... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Millions of people make purchases online, but many people are... Read More
You've seen it in the news - 40 million credit... Read More
If spyware were a person and he set himself up... Read More
Ebay is a great site and is used by many... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
First off I should explain what phishing is. Phishing is... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Ok, ok, I know you've seen them. All those pop... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Over £5 billion pounds was spent on online shopping in... Read More
When it comes to reporting Internet scams most of us... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Having a good Spyware eliminator on your computer is vital... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Have you ever got an email asking you to confirm... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Since its birth, the Internet has grown and expanded to... Read More
Do you really have to know how feeds work? Not... Read More
In the past I've never really paid much attention to... Read More
As soon as almost all computer users already got used... Read More
Working from home has its advantages, including no commute, a... Read More
What is computer security? Computer security is the process of... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Have you ever had to call Symantec or McAfee to... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
You are at your computer, checking out software on EBay.... Read More
So you want to know who your kids are chatting... Read More
You and I are a lot alike. We are both... Read More
When the Internet first came about, it was realized it... Read More
Internet scams and frauds are on the rise! The quantity... Read More
In today's times spyware is a very serious issue and... Read More
Pharming is one of the latest online scams and rapidly... Read More
Imagine my surprise when I received a phone call from... Read More
These six ways to prevent identity theft offer you valuable... Read More
With the advent of the World Wide Web, a whole... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
As you know, this time the virus under the name... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
During the release of a new software product specialized to... Read More
First I would like to stress I am condoning the... Read More
My first experience with a spyware BHO based infection was... Read More
Internet Security |