Saturday, July 16, 2011

Easy Computer Virus Identification

By Kalib Crone




Identification

A computer virus is technically the incorrect term to be used. A virus is a specific type of malware, but it is often used as the word to describe all types of malicious computer software. Malware can be in many different shapes and sizes and they all have different terms, such as spyware, Trojan horses, adware, worms, viruses, and more. Lets go through each one of these terms to clear up the meaning.

Malware- Malware is a shortened term for "malicious software", which is recognized as software that collects personal information, denies certain actions, gains access to private information, and can even give false computer failure information so that the user does not suspect that it is malware, but instead a burnt out hard drive, or a system failure. Malware is the main term used for any type of software or program that is in any way malicious, or in the case of adware, annoying, to your computer.

Spyware- Spyware is mainly known as software used to spy on a users computer. Spyware is usually accidentally installed on ones computer, but can also be purposely installed in businesses and schools to secretly monitor all computers. Although "spying" is the main use for spyware, it can do a whole list of other things including taking information, redirecting internet browser activity, changing computer settings resulting in lack of network connection, changed homepages, and even disconnection of ones network.

Trojan Horse- A Trojan horse is a program that seems harmless and is expected to do a desirable function for the user, while instead or along with the function it secretly steals information or harms the system. Once a Trojan is inside of the users computer, the hacker in which created the virus can basically control a users computer remotely and steal or look into personal files. The reason it is named this is obvious do to the Greek myth of the Trojan horse that at first looked promising, but once it entered the city, the Greek soldiers exited from the belly of the horse and the city was theirs.

Adware- Adware is usually downloaded accidentally while downloading another product but with the adware attached. Adware can be in the form of pop-ups or it can be placed into the user interface, such as if you ever see random words in an article that is underlined, but links to an ad that has nothing to do with the actual word, it is possible that that is adware on your personal computer, but in this instance it is more likely that it is not attached with your computer and just an ad function on the website. Adware by itself is annoying, but not harmful, but it can be attached with spyware or other malicious software that can make it dangerous.

Worms- Worms are self replicating computer programs that can use the users network to send copies of itself to other computers. Worms are usually only intended to spread on a computer and usually do not alter or destroy information, although this is not always true. A "payload" worm is written with extra coding which not only replicates itself and disrupts network bandwidth like a normal worm, but can also delete some information or send information through the internet, although a very common use for these "payload" worms is for creating a virtual backdoor so that the computer can be easily controlled by the worm creator. Some creators have been caught trying to sell different users IP numbers and some have tried to blackmail big companies by threatening to basically completely disable access to information on the companies computers.

Viruses- Although both worms and viruses replicate themselves, a worm does not technically have to destroy or steal information. A virus is a type of malware that needs to attach itself to an existing program to enter a computer. Once the virus is successfully inside the computer, it infects the computer, usually resulting in corruption and modification of files. A true virus can also send itself to other computers using a users network. The term "virus" is often used as a term to include all types of malware but in reality it is actually its own type of malware altogether.

No comments:

Post a Comment