Some of these actions deal with copying information or files and sending them on while others execute particular tasks on the computer besides changing or installing new software. Trojan horses can execute a number of harmful actions such as monitoring a computer’s data traffic. It carries out functions that are mostly hidden from users. Learn more about: What is a Computer Virus and its Types?Ī Trojan horse is a type of malware that initially pretends to be a useful and safe application so that it can access a computer’s system. A virus multiplies after a virus program starts and it then interferes with a computer’s functions, spies on the user, destroys data, or even causes damage to the hardware. ![]() Virus is the best known and oldest type of malware. Viruses are programs that are capable of spreading separately by making copies of themselves and then infiltrating other computer programs. Worms are considered to be the most common types of malicious software. Just like viruses, worms can damage the system and are frequently used to gain secret control over the computer. Worms spreading via e-mails use the user’s e-mail program in order to send themselves to all contacts in the address book. Computer worms use removable media or networks to gain access to other systems and generally need a program to assist them in this task. ![]() ![]() Worms also reproduce and spread more actively than viruses without depending on other files.
0 Comments
Leave a Reply. |