Wednesday 16 January 2013

Types Of Computer Viruses

1. Worm

The  main  purpose  of this piece of malware is to duplicate malicious code by any means necessary which often results in  a  worm  spreading itself over a local network or via email Some types of worm are only intended to spread  themselves without making alterations to the computers they pass through or to make minimal nuisanc e such as network slowdown. However they can also be used to give criminals access to private data   or  the ability to control an infected  workstation.

2. Trojan Horse

this virus works as a thief it transfers data from one to other computer sharply

3. Rootket  virus

A Rootkit virus intends to take complete control of the computer operating system by setting itself up as the sole admin account for the compute Moreover, when a Rootkit virus is installed it is very difficult  to  remove  as it masquerades as important system files, allowing hackers to install further malicious software  undetected.

4. Polymorphic virus

Like a worm virus the Polymorphic virus attempts to duplicate itself However unlike a worm each copy  virus makes of it self is slightly modified from each other copy Polymorphic viruses are benefi
cial to hackers as they are extremely hard for antivirus software to identify and remove.

5. Time / Logic Bombs

this is like a time bomb it is adjusted with time at the given time it destroy all the data

6. Macro virus

A Macro virus infects another piece of software that is programmed with macro language which includes the . because they are easy to trick users into installing: simply opening a word attachment from an email is  enough to infect the computer

7.  Adware / Spyware

Adware and spyware   while less malicious than the above viruses  are still a  nuisance for the users to deal with. Adware bombards users with adverts for products and services  while spyware collects a user browsing habits and personal information before broadcasting it back to its creator. Any information obtained via these methods can be sold by the hacker to third parties.and keep it updated.


No comments:

Post a Comment