Types Of Computer Infections

Computer infections can be broken up into 4 main categories which are explained in detail below:

Viruses

Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers!

Worms

A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it's host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.

Trojan Horses

A Trojan horse is a computer programs that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do.

E-mail Viruses

Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim's e-mail address book. Several of these virus's have raced through the internet. Examples of email virus's are the Melissa Virus, and the ILOVEYOU virus.

Feel free to reprint this article as long as you keep the following caption and author biography in tact with all hyperlinks.

Ryan Fyfe is the owner and operator of Software Area. Which is a great web directory and information center on Anti Virus Software and other computer software related issues.

In The News:


pen paper and inkwell


cat break through


Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More