border: 1px solid #d2d2d2; padding: 0px 8px 0px 8px; color: #a19999; font-size: 12px; height: 25px; width: 165px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; margin:0px; } .submitbutton{ background:#F66303; border: 1px solid #F66303; text-shadow: 1px 1px 1px #333; box-shadow: 3px 3px 3px #666; font:bold 12px Arial, sans-serif; color: #fff; height: 25px; padding: 0 12px 0 12px; margin: 0 0 0 5px; border-radius: 5px; -moz-border-radius: 5px; -webkit-border-radius: 5px; cursor:pointer;}

Receive all updates via Facebook. Just Click the Like Button Below

You can also receive Free Email Updates:

Powered By Blogger Widgets

Related Posts Plugin for WordPress, Blogger...

Monday, May 30, 2011

The difference between a computer worm viruses and Trojans

The difference between a computer worm viruses and Trojans

What is a virus?
A computer virus attaches itself to a program or file that allows you to spread from one computer to another, leaving infections as it travels. Like a human virus, computer viruses can range in severity: some effects may cause only mildly annoying, while others can damage hardware, software or files.
Almost all viruses are attached to an executable file, which means that the virus may exist on your computer, but he really can not infect your computer unless you run or open the malicious program. It is important to note that a virus does not spread without human action (such as running an infected program) to keep it going.

People continue to spread a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in e-mail.

What is a worm?
A worm is similar to a virus by design and is considered a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any human action. A worm takes advantage of characteristics of the transport files or information about your system, which is what allows him to travel without help.
The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending a single worm, it can send hundreds or thousands of copies of itself, creating a huge devastating effect. An example would be a worm sends itself to everyone listed in your address book e-mail. Then, the worm replicates and sends itself to everyone listed in each book of the recipient, address and manifest continues on down the line.

Owing to the copy of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much talked about Blaster worm, the worm was designed to infiltrate your system and allow malicious users to control the computer remotely.
Key terms for understanding Computer Viruses
A program or piece of code that is loaded onto your computer without your knowledge and go against their wishes.

Trojan Horse
A destructive program that masquerades as a benign application. Unlike viruses, trojans do not replicate
A program or algorithm that replicates itself over a computer network and generally perform malicious actions

blended threat
Blended threats combine the characteristics of viruses, worms, Trojans and malicious code with server and Internet vulnerabilities.

antivirus program
A utility that searches a hard drive for viruses and removes any that are found.

Related articles Webopedia

The differences and characteristics of hardware and software firewalls

Understanding Rootkits

Antivirus and antispyware software: What's the difference?

Rogue Anti-Virus Software Explanation

What is a Trojan horse?
A Trojan Horse is full of trickery as much as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance seem to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan are usually tricked into opening them because they seem to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, your results may vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active icons) or can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on the computer that gives malicious users access to your system, possibly allowing confidential or personal information being compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files and replicate themselves.

What are blended threats?
Added into the mix, we also have what is called a blended threat. A blended threat is a sophisticated attack which brings together some of the worst aspects of viruses, worms, Trojans and malicious code on a single threat. Blended threats can use the vulnerabilities of the server and the Internet to start, then transmit and spread an attack.Characteristics of blended threats are causing damage to the infected system or network, which spreads through various methods, the attack can come from various points, also exploit vulnerabilities and threats.
To be considered a segment of the mixture, the attack that normally serve to transport multiple attacks on a charge. For example, would not only launch a DoS attack - would also, for example, install a backdoor and may even damage the local system in one shot.Additionally, blended threats are designed to use various modes of transport. Thus, when a worm can travel and spread through e-mail, a single blended threat could use multiple routes, including email, IRC, and file-sharing sharing networks.

. Finally, rather than a specific attack on certain exe files, a blended yarn could make various wrongdoings, such as modifying your exe files, HTML and registry keys at the same time - basically, it can cause damage in several areas of its network at once.

Blended threats are considered the worst risk to security since the beginning of virus, like most well blended threats require no human intervention to propagate.

Fight against viruses, worms and Trojan horses
The first step in protecting your computer from any malicious code that exists to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows operating system. Secondly, you must have antivirus software installed on your system and ensure you download updates frequently to ensure that the software has the latest fixes for new viruses, worms and Trojans. Also, you want to make sure your antivirus program has the ability to scan email and files that are downloaded from the internet, and you also need to run full disk scans periodically. This will help prevent malicious code from reaching your computer yourself. You must also install a firewall as well.

A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be hardware or software. Hardware firewalls provide a degree of strong protection against most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could ignore embedded worms in out going e-mails and see this as regular network traffic.

For individual home users, the most popular choice is a firewall software firewall. A good software firewall will protect your computer from outside attempts to control or gain access to your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The disadvantage of software firewalls is that they only protect the computer they are installed on, not a network.

It is important to remember that on your firewall itself will not rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

No comments:

Post a Comment


Twitter Delicious Facebook Digg Stumbleupon Favorites More