Technology Networking & Internet

What Is The Difference Between a Worm, Virus and Trojan Horse?

Tips and recommendations for protecting your PC...

Most of us don't make a real difference between worm, virus and Trajan Horse or refer to a worm or Trajan Horse as a virus.

All of us know all are malicious programs that can cause very serious damage to PC. Exist differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Some viruses cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. A virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

A worm is a program or algorithm that replicates itself. A worm has the capability to travel without any help from a person from PC to PC and have ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.

A Trojan Horse is a destructive program that "working" as a benign application ( (like changing your desktop, adding silly active desktop icons) or can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a back door on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Trojans do not reproduce by infecting other files nor do they self-replicate.

Added into the mix, we also have what is called a blended threat. Blended threats combine the characteristics of viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities. By using multiple methods and techniques, blended threats can rapidly spread and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points, and exploits vulnerabilities. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities. They are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Therefore is very important to protect your PC with a good anti-virus software installed on your system with the latest fixes for new viruses, worms, and Trojan horses.

Additionally, you want to make sure your anti-virus program has the ability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. You should also install a a system that prevents unauthorized use and access to your computer (firewall as well). A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms.

I hope that reading the above information was both enjoyable and educational for you. Your learning process should be ongoing--the more you understand about any subject, the more you will be able to share with others.

Read More Tips and Tricks here... http://www.i-Bestseller.com and http://www.wBacklink.com

Copyright Anne-Marie Ronsen

You have permission to publish this article electronically, in print, in your ebook or on your web site, free of charge, as long as the author bylines are included.


SHARE
RELATED POSTS on "Technology"
What Can You Do to Prevent Link Rot?
What Can You Do to Prevent Link Rot?
What Makes a Phone Line DSL Enabled?
What Makes a Phone Line DSL Enabled?
Boost And Maintain Your Squeeze Page SERP Ranking By Turning It Into A Squeeze Blog
Boost And Maintain Your Squeeze Page SERP Ranking By Turning It Into A Squeeze Blog
Define RocketMail
Define RocketMail
How NOT to market on FaceBook and committ social blunders
How NOT to market on FaceBook and committ social blunders
Check Out These Ideas About Technology Blogging
Check Out These Ideas About Technology Blogging
How to Watch an Item on eBay
How to Watch an Item on eBay
Totally Dumb Copywriting Mistakes To Avoid
Totally Dumb Copywriting Mistakes To Avoid
How to Edit a MySpace Music Profile
How to Edit a MySpace Music Profile
Backlink Energizer Assessment
Backlink Energizer Assessment
Apple iPhone 5 With An Increase Of Additional Features
Apple iPhone 5 With An Increase Of Additional Features
Online Marketing Consultant
Online Marketing Consultant
How Social Bookmarking Can Be Advantageous For Your Website
How Social Bookmarking Can Be Advantageous For Your Website
How to Check My IP for a Blacklist
How to Check My IP for a Blacklist
Which Is Better: Internal or External Modem Software or Hardware?
Which Is Better: Internal or External Modem Software or Hardware?
Attention Empower Newtork Seekers
Attention Empower Newtork Seekers
Free of charge Casino Video games - The On the net Casino Bonus
Free of charge Casino Video games - The On the net Casino Bonus
Why Digital Marketing Should Be Just What The Doctor Ordered
Why Digital Marketing Should Be Just What The Doctor Ordered
Marketing Online Through Social media Marketing Service
Marketing Online Through Social media Marketing Service
Working With The Right SEO Providers
Working With The Right SEO Providers
How To Share a Desktop
How To Share a Desktop
Why Pay for Deutsche Post Secure Email?
Why Pay for Deutsche Post Secure Email?
SMO Company in India – The Best Option for Cost-Effective Online Brand Promotion
SMO Company in India – The Best Option for Cost-Effective Online Brand Promotion

Leave Your Reply

*