Types Of Computer Infections

Computer infections can be broken up into 4 main categories which are explained in detail below:

Viruses

Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers!

Worms

A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it's host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.

Trojan Horses

A Trojan horse is a computer programs that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do.

E-mail Viruses

Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim's e-mail address book. Several of these virus's have raced through the internet. Examples of email virus's are the Melissa Virus, and the ILOVEYOU virus.

Feel free to reprint this article as long as you keep the following caption and author biography in tact with all hyperlinks.

Ryan Fyfe is the owner and operator of Software Area. Which is a great web directory and information center on Anti Virus Software and other computer software related issues.

In The News:


pen paper and inkwell


cat break through


How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More