Difference between Virus, Trojan Virus, Worm, Adware, Spyware, Rootkit, Dialers, Key loggers, etc


http://www.trojanvirus.org/

Trojan horse / Trojan Virus


Trojan Virus is a type of malware disguised useful software. The point is that the user performs a Trojan, which gives it full control of your computer the possibility to use for their own purposes. Most of the time, and we will install more malware into your systemsuch as rear doors or key logger

Adware

Derived from adware "ads." Next to the actual function of the program, the user will see the ads.Adware itself is not dangerous, but it is a ton of ads displayed a nuisance and therefore are detected by the anti-malware solutions are good

Virus

the computer virus spreading by itself by smuggling Inc. in app program. The name is his analogy with archetype diversity. Not only does a computer virus spreads many timesand make host software is usable, but also extends malicious actions

Worm

Worms are malware programs that aim to publish as soon as possible once you hit your computer. Unlike viruses, it is not the other programs that are used to spread the worm, but the storage devices such as USB sticks, and means of communication, such as e-mail or weaknesses in your operating system. Spread slows down the performance of computers and networks, or malicious actions will be implemented immediatel

Dialers

Registered users are relics of a time or ISDN modems were still used to go online. It is expensive for the numbers dialed premium rates, thus causing your phone bill to reach astronomical amounts, which means a huge financial damage to you, and the victim of the poor, who do not even know they were there. Registered users have any effect on ADSL or cable connections, which is why they are mostly extinct at the present time

Key loggers

Key loggers recording any keyboard input even without noticing, which enables the hacker to get their hands on passwords or other very important data such as online banking services

Spyware

Spyware is software that spying on you, any user collect data different from your computer without your even noticing

Rootkit

A rootkit consists mostly of several parts that will grant unauthorized access to your PC. Plus will be hidden processes and parts of the program. They can be installedFor example, by exploitation or Trojan Horse Virus

Rogues / Scareware

Also known as the "rogue anti-spyware" or "rogue antivirus", scammers pretend to be security software. Often, warnings are used to make the fake security software you buy that profit from hacker

Backdoor / Bot

Backdoor is usually a piece of software implemented by the authors themselves to gain access to your PC or any kind of protected function of a computer program. And are often installed rear once it has been implemented, Trojans, so all of the attacking and your PC direct access to your PC. PC will be infected, also called "bot", become part of a bot network.
Difference between Virus, Trojan Virus, Worm, Adware, Spyware, Rootkit, Dialers, Key loggers, etc Difference between Virus, Trojan Virus, Worm, Adware, Spyware, Rootkit, Dialers, Key loggers, etc Reviewed by mohamed khaled on 9:20 PM Rating: 5

No comments:

Powered by Blogger.