Viruses, Malware, Adware/Spyware, Worms, Trojan Horse QuickTime™ an d a TIFF (Uncompressed) decompressor are need ed to see this p icture . ~ Malicious Programs~ Viruses, malware, adware/spyware, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the them, and knowing those differences can help you better protect your computer from their often damaging effects. What is a Virus? A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. QuickTime™ and a Almost all viruses are attached to an executable file, whichTIFF (Uncompressed) decompressor are needed to see this picture. means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email. What is a Malware? • Along with viruses, one of the biggest threats to computer users on the Internet today is malware. It can hijack your browser, redirect your search attempts, serve up nasty pop- up ads, track what web sites you visit, and generally screw things up. • Malware programs are usually poorly-programmed and can cause your computer to become unbearably slow and unstable in addition to all the other havoc they wreak.Many of them will reinstall themselves even after you think you have removed them, or hide themselves deep within Windows, making them very difficult to clean. QuickTime™ and a TIFF (Uncompressed) decompressor are neede d to see this picture. QuickTime™ and a TIFF (Uncompressed) decompressor are need ed to see this picture. What is a Malware? • Malware often comes bundled with other programs (Kazaa, iMesh, and other file sharing programs seem to be the biggest bundlers). These malware programs usually pop-up ads, sending revenue from the ads to the program's authors. Others are installed from websites, pretending to be software needed to view the website. • Still others, install themselves through holes in Internet Explorer like a virus would, requiring you to do nothing but visit the wrong web page to get infected. • The vast majority, however, must be installed by the user. Unfortunately, getting infected with malware is usually much easier than getting rid of it, and once you get malware on your computer it tends to multiply. What is a Adware? • Adware is the class of programs that place advertisements on your screen. These may be in the form of pop-ups, pop-unders, advertisements embedded in programs, advertisements placed on top of ads in web sites, or any other way the authors can think of showing you an ad. The pop-ups generally will not be stopped by pop-up stoppers, and often are not dependent on your having Internet Explorer open. They may show up when you are playing a game, writing a document, listening to music, or anything else. Should you be surfing, the advertisements will often be related to the web page you are viewing. QuickTime™ and a TIFF (Un compresse d) decompressor are needed to se e this picture. What is Spyware? • Spyware: Programs classified as spyware send information about you and your computer to somebody else. Some spyware simply relays the addresses of sites you visit or terms you search for to a server somewhere. Others may send back information you type into forms in Internet Explorer or the names of files you download. Still others search your hard drive and report back what programs you have installed, contents of your e-mail client's address book (usually to be sold to spammers), or any other information about or on your computer - things such as your name, browser history, login names and passwords, credit card numbers, and your phone number and address.Spyware may also use a program that is always running in the background to collect data, or it may integrate itself into Internet Explorer, allowing it to run undetected whenever Internet Explorer is open What is a Worm? A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. QuickTime™ an d a A worm takes advantage of file or information TIFF (Uncompressed) decompressor are need ed to see this p icture . transport features on your system, which is what allows it to travel unaided.The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. What is a Worm? One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. QuickTime™ and a TIFF (Uncompressed) decompressor are need ed to see this picture. QuickTime™ and a TIFF (Uncompressed) decompre ssor are neede d to see this picture. What is a Trojan Horse? • The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Symptoms of a Virus Quic kTim e™ and a TIFF (Uncompres sed) dec ompressor are needed to s ee this pic ture. • After a virus begins to spread, many program files can become unstable and display warnings. • The operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. Quic kTime™ and a • TIFF (Uncompres sed) dec ompress or Critical files may get deleted automatically, and this can happen are needed to s ee this pic ture. periodically or all at once. • Error messages will become prevalent; it may become difficult to save documents, and the computer may be running slower than usual. • If a system or network is infected severely, it may even black out or not even launch the startup process. • Out-of-memory error messages appear, even though your computer has plenty of RAM. • Windows spontaneously restarts unexpectedly. Quic kT ime™ and a T IF F (Unc om press ed) dec ompres sor are needed t o see t his pict ure. • Windows will not start at all, even though you have not made any system changes, or you have not installed or removed any programs. • Programs that used to run now stop responding frequently. If you try to remove and reinstall the software, the issue continues to occur. Symptoms of a Virus • In addition, disk space can become overloaded and cause frequent computer crashes. • Viruses can duplicate large-sized programs to the point that the computer Quic kTim e™ and a cannot handle the files. This will reduce the chances of even installing an TIFF (Uncompres sed) dec ompressor are needed to s ee this pic ture. antivirus program successfully, so early detection is key to detecting and removing the dangerous virus. • Lately, computer viruses have been created so they can change some of the core system files (Microsoft Windows) so that web sites of most of antivirus software companies become inaccessible. Your Internet browser will either switch to some other web site or simply show ﾒnot foundﾓ. What is happening is that you are being prevented from finding a way of getting antivirus software cleaning your system. Quic kTime™ and a • ･A program disappears from the computer, and it was not intentionally TIFF (Uncompres sed) dec ompress or are needed to s ee this pic ture. uninstalled. • Someone tells you that they have recently received e-mail messages from you containing attached files (especially with .exe, .bat, .scr , .vbs extensions), which you did not send • The computer runs very slowly and it takes a long time to start. Quic kT ime™ and a T IF F (Unc om press ed) dec ompres sor are needed t o see t his pict ure. QuickTime™ and a TIFF (Un compressed) decompressor How to Prevent are neede d to se e this picture. Viruses Etc. You can prevent a computer virus from entering your machine. A virus can compromise your personal information and even destroy your computer completely. Luckily, there are many low cost things you can do to protect yourself and stay one step ahead of the hackers. Here are 11 things you can do to help prevent computer viruses from invading your computer. 1. Install a reliable anti virus program. From the first moment you turn your computer on, you should have a trusted anti virus program by your side. There are even free anti virus programs you can download that work almost as well as industry giants like Norton and McAfee. 2. Install anti-spyware and anti-malware programs. As good as the best anti virus programs are, they sometimes need a little bit of help. Thankfully, many of the top anti-spyware programs are completely free. Spybot Search and Destroy and CCleaner are just two free programs that can help prevent computer viruses from doing any damage on your machine. As helpful as these programs are, however, you must update them and run them on a regular basis for them to do any good. 3. Avoid suspicious websites. A good virus protection program will alert you when you visit a website that attempts to install or run a program on your computer. If you get a warning, don’t go back, you may end up with a bug you can’t get rid of How to Prevent Viruses Etc. 4. Never Open Email Attachments Without Scanning Them First. The most common way viruses are spread throughout the Internet is still via email. Some attachments, like pictures, now display in emails and donﾕt require an QuickTime™ and a TIFF (Un compressed) decompressor are neede d to se e this picture. attachment to be manually opened, but other documents do. Make sure you use an email client that scans all email attachments before you are allowed to open them. This will help prevent computer viruses from getting a foothold on your machine. 5. Set up Automatic Scans. Many of the top anti virus programs, as well as the best anti-spyware programs, now have settings that will let them automatically run during down times or in the middle of the night. Of course, your computer must be on for this to happen, but having daily scans run when nothing else is going on is a great way to prevent even the latest computer viruses from QuickTime™ and a TIFF (Un compressed) decompressor sticking around too long. are neede d to se e this picture. 6. Watch Your Downloads. Part of the fun of the Internet is downloading music, movies and other items. However, since these downloads are so massive, it can be easy to sneak a virus along for the ride. Only download these files from trusted sites that you can count on, or, at the very least, scan them before you open them. 7. Updates, Updates, Updates. There is a reason why Windows has a feature called Critical Updates. There is an entire branch of Microsoft dedicated to QuickTime™ and a TIFF (Un compressed) decompressor are neede d to se e this picture. staying one step ahead of the hackers out there so when they manage to fix a possible security loophole, you need to download the patch right away. Help Microsoft help you prevent computer viruses from causing too much trouble. How to Prevent Viruses Etc. 8. Know What To Look For. Even if you are just a casual computer user, you should have an idea of how your machine operates, what normal pop up windows look like and what popular viruses are out there, that way, when your computer begins exhibiting tell tale signs, youﾕll know. You can help prevent computer viruses by staying updated and educated. 9. Stay Away From Cracked Software. It is so secret that you can download illegal, cracked versions of some programs online. As tempting as it may be, these files are almost always infested with advanced and difficult to detect bugs. Play it safe and get your software from the source. 10. Install a Firewall. A firewall is a program that screens incoming Internet and network traffic. Along with your virus program, it can help prevent unauthorized access to your computer. 11. Be prepared to Lock Down. If you hear of a virus that is spreading like wildfire through the Internet, make an extra effort to be careful. Donﾕt open any suspicious emails or accept any downloads for a week or two until your virus protection program has been updated and you are, once again, safe. QuickTime™ and a QuickTime™ and a QuickTime™ and a TIFF (Un compressed) decompressor TIFF (Un compressed) decompressor TIFF (Un compressed) decompressor are neede d to se e this picture. are neede d to se e this picture. are neede d to se e this picture. Anti-Virus Programs If updated regularly almost all types of computer viruses can be removed using the following anti-virus programs. • Norton • McAfee Virus • Kaspersky • AVG QuickTime™ and a TIFF (Un compressed) decompressor • Symantec are neede d to se e this picture. Do Macs Get Viruses? QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. Yes. However, the likelihood of an Apple Macintosh user getting a virus when compared to a Microsoft Windows user is very little to none. In fact, many of the Apple Macintosh users don't even run an antivirus protection program.Below are some of the reasons why Apple Macintosh computers do not have as many viruses as Microsoft Windows. 1.Newer Macintosh operating systems, such as the Mac OS X, is built on the Unix kernel, which is one of the oldest and most secure operating systems available. 2.Microsoft Windows is used by a lot more people than the Apple Mac OS. Because more people use Microsoft Windows, it is a much better target than Apple computers. 3.Most of the computer virus writers are more familiar with the IBM platform and Microsoft Windows, which means its easier for them create a virus for that platform. 4.Many of the tools and scripts used to help users create viruses or other malware are designed for Microsoft Windows. QuickTime™ an d a decompressor are need ed to see this p icture .
Pages to are hidden for
"Virus_ Worm_ Trojan Horse"Please download to view full document