Computer viruses are most commonly passed through interaction over the internet, whether they are attached to (or are disguised as) downloaded files or emails sent from friends with already compromised systems. Viruses can be passed from computer to computer without the owners knowing they are passing them along.
There are 3 basic types of viruses: Trojan Horses, Worms and Email Viruses.
Trojan Horses – A Trojan – named after the Greek army’s tactic of hiding their soldiers in a giant wooden horse that was sent as a gift to the city of Troy (In Homer’s epic Illiad) – disguises itself as a document or file of interest, e.g. a sound-bite or song for a music lover, a new patch for an MMO or game for gamers or a picture/video. These viruses do not multiply but rather make your computer’s protection weaker and thus makes your system more susceptible to viruses and other kinds of malicious software.
Worms – The Worm-style of virus is a program that, once inside your system, multiplies and scans for flaws or loop-holes in your security systems and protection. The Worm-style virus attempts to spread itself through a large network by taking advantage of the loop-holes and flaws that it finds or sending itself through the intranet of the network to other computers.
Email Viruses – Email viruses use (as suggested by the name) emails to send itself to other computers and spread itself, they often forward themselves from infected computers.
Prevention and protection from these types of viruses are simple; usually an up-to-date anti-virus software and security program is all that is needed. Recommended companies that supply anti-virus software and other protection/security programs are AVG, Symantec, Avast! And Sophos.
Anti-Virus software is a useful tool against viruses, which is a given. Having been specifically designed to combat the viruses, any good A-V software will regularly scan, at routine intervals that you can set, your computer, stored files and hard drives for viruses. Most decent A-V software will give you several options, allowing you to enact a scan at your discretion, the depth of the scan and connects you, through the software and internet, to a database which stores data on the viruses found on a fellow A-V user’s computer. Another feature most A-V software gives is the automatic scan of any files you download through your web browser, or the option to scan any file you already have downloaded on to your system. Downloading from the internet is risky, you can never be sure of where the file is coming from. Viruses, as stated above, can be, and often are, disguised as files of interest for certain people to fall foul of.
As well as receiving viruses through an email system, which are usually disguised as a file attached to an email from an unknown sender or random contact, there are other problems associated with email systems. These problems are things such as: files not attaching to emails, mail from misrepresented or unknown users and inappropriate content in junk-mail.
You May Also Find These Documents Helpful
-
|Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…
- 829 Words
- 4 Pages
Satisfactory Essays -
And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…
- 345 Words
- 2 Pages
Satisfactory Essays -
2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…
- 595 Words
- 3 Pages
Good Essays -
Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…
- 437 Words
- 2 Pages
Satisfactory Essays -
Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…
- 633 Words
- 3 Pages
Satisfactory Essays -
Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…
- 358 Words
- 2 Pages
Satisfactory Essays -
Computer program that can copy itself and infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses.…
- 932 Words
- 4 Pages
Better Essays -
* This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file.…
- 669 Words
- 2 Pages
Good Essays -
The obnoxious virus is exceptionally unsafe and perilous and can change interior settings of the Windows System.…
- 396 Words
- 2 Pages
Satisfactory Essays -
A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…
- 711 Words
- 3 Pages
Satisfactory Essays -
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.…
- 787 Words
- 3 Pages
Good Essays -
Next we will discuss malware what it is and how it affects us. Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. Cybercriminals sometimes try to trick you into downloading rogue (fake) security software that claims to protect you against malware. This rogue security software might ask you to pay for a fake product, install malware on your computer, or steal your personal information. To protect yourself from Malware it is important to do some of the following: make sure automatic updating is turned on to get all the latest security updates. Keep your firewall turned on. Don't open spam email messages or click links on suspicious…
- 463 Words
- 2 Pages
Good Essays -
1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…
- 1430 Words
- 4 Pages
Better Essays -
4.1.2.2. Transmitting worms, Trojan horses, trap door code, or…
- 2122 Words
- 9 Pages
Powerful Essays -
A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…
- 659 Words
- 3 Pages
Satisfactory Essays