* This virus may contain several types of infections, which makes it almost impossible to totally remove the virus. * Macro * A number or set of commands, which is saved in a macro file. This can be useful for completing tasks which require the same repetitive action with different inputs. * Trojan horse * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file. * Email worms * This virus can duplicate itself to no end. It will send itself ro everyone in your address book appearing as an email sent from your email address. * Instant messaging worms * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer. * IRC worms * An IRC worm is rare to find today. The way this works is by infecting a computer which has an active IRC server running, then it sends a small (normally an INI file) file to other computers which are
* This virus may contain several types of infections, which makes it almost impossible to totally remove the virus. * Macro * A number or set of commands, which is saved in a macro file. This can be useful for completing tasks which require the same repetitive action with different inputs. * Trojan horse * This is a program which appears to be useful, what you cannot see is that the program opens your computer to users on the internet to be used maliciously. Most of the time Trojan viruses are used to turn your computer into a bot to maliciously attack more computers on the internet or in your network by spreading the same file. * Email worms * This virus can duplicate itself to no end. It will send itself ro everyone in your address book appearing as an email sent from your email address. * Instant messaging worms * This worm spreads itself by sending an instant message to people in your contact list. When they receive the connection the worm establishes a connection to the remote computer to move itself on the clean remote computer. * IRC worms * An IRC worm is rare to find today. The way this works is by infecting a computer which has an active IRC server running, then it sends a small (normally an INI file) file to other computers which are