You are here: hacking technology > the virus to be related > Content
Hot Articles
Recommend Articles
New Articles
The differences between the viruses, trojans and worms, explain?rte
  Add date: 08/13/2010   Publishing date: 08/13/2010   Hits: 1
Total 2 pages, Current page:1, Jump to page:
 
In the Gesch?ftswelt of anti-malware often fussy about the details of the broad?public is does not care. For us, these differences are important, though, as the classification of a piece of malware will help us define and understand their nature and helps those of us stuck with the detection or purification of infection.

Many people try their comprehension?ndnis to use these terms to defend bad decisions in their security practices. It k?nnte a good time to write too little to the differences between these types of malware to explain?, Ren and unblur the boundaries between them.

Viruses

Just as Kleenex brand has come to refer to all brands of pa?Tissue paper is to relate the term generically virus used in many different types of malware and malicious code. However, the basic definition of a virus is a parasite?can replicate re application itself.

Virus ben?CONFIRM a substrate, ie, a file, a user wants or needs to be hidden inside k?. Can This is how to move viruses;that found in the files that are willing to share with someone, such as documents or other files on a USB drive or network drive to be stored k?Embedded can. A virus can be transported but can copy itself to other files on the computer and hope that the transfer of infected files to other computers.
can remind users of the old school, the boot sector virus. This strain h?depends sneakernet old days: Moving files from one computer to another using floppy disks. This virus was common in DOS / Windows, Amiga, Apple and Mac computers.

Many Mac users take pleasure in it?alarming to me that there are no viruses for OS X. This is known technically not true. W?During Malware BadBunny both a virus and a worm was on Linux and Windows platforms, just like a virus on Mac OS X. traded

Worms

Worms are another subtype of the virus. Worms are traditionally referred to as malware, network, although it via USB or other methods, k?can spread. Worms from the use of vulnerabilities in software and network to spread itself by consumers in the target system. Recent examples of worms are very successful and Conficker QBot Koobface.

Like viruses, worms, k?can multi-component threats and many are trojans and worms. However, the term worm refers specifically to the F?ability of b?sartigem code to infect computers on your LAN or the Internet and to actively reach remote computers without user intervention.

Trojan

The key to the definition of a Trojan horse that is not reproducing itself. Like the Trojan horse of Greek antiquity, the most useful files as Trojans or applications that disguised their realization towed. Some of Artima?h?more often than we are seen to have spread the rash of trojan gef?lschten codecs or plug-ins that are needed to watch videos online and the famous "Angelina Jolie naked "E-mail messages.

Some confusion sets in. It seems that to be infected by a Trojan k?can you have?Open a sch?dliche bond, or w?Select a file from a gef?Dangerous for download source. What many people do not understand is that Troy, the technical classification of the sample. It does not require the user to w?, Choose to run it.

 

Other pages: : 1 * 2 * Next>>
Prev:Tri-Air technology developments?Decontamination provides financial protection of bio-attack Next:Blackhats exploit cynically breaking news tragic and shocking news to infiltrate legitimate websites

Comment:

Category: Home > the virus to be related