I have to know the malware terminology big inventory

  

When I hear the computer virus, many people talk about the 'poison' discoloration, and in daily life, it is inevitable to put those malicious software into the scope of the virus. For example: worms, Trojan horses, root access tools, keyloggers, spyware, etc. In fact, these are not among the ranks of viruses. So what do these mean? Today we will detail their meanings. Explain it.

Malware

<; malicious operating software & rdquo; referred to & ldquo; malware & rdquo;. Many people use "virus" to explain this type of software, but the virus is only one of this category. “Malware” includes all software that poses a hazard. Here are some common situations.

1, the virus

First talk about the virus. A virus is a type of malware that replicates itself and infects other files. Just like a biological virus, a virus first infects cells and then uses them to multiply.

The virus can do many things. For example, it can hide itself, steal passwords, force pop-up ads, and restart the computer. These are not enough to call a virus. Viruses are called viruses because of their ability to reproduce. When a virus runs on a computer, it infects programs on the machine. If you run the infected program on another computer, the machine will also be infected. For example, a virus may be infected with a u disk. When the u disk is plugged into a computer and the infected program is running, the virus will be transmitted to the computer, and then more program files will be infected. The infection will continue indefinitely.

2, worms

Worm is very similar to viruses, except that they are spread differently. The worm spreads over the network, and the virus spreads by infecting files or by man-made mobile virus files. Shockwave worms and shockwave worms are typical examples. They spread very quickly between Windows® XP systems because the Windows® XP system does not have a secure protection system and the system services are completely exposed on the network. The worm can enter the XP system service from the network, find the vulnerability in the system, and start to infect the system. Then it can use the infected computer to self-replicate. Although worms are now rare in Windows systems with default firewalls, they still have other ways to spread. For example, a worm can spread itself to people on all contacts through an infected user's email address book.

Like a virus, a worm can do many things once it successfully infects a computer. Its main purpose is to continue replication.

3, Trojan horse

Trojan horse can disguise itself as a normal file. When someone downloads and tries to open it, the Trojan runs in the background and opens an entry that allows third-party access. Trojan horses can do more tasks, such as monitoring computers and downloading malicious code to a computer. It can also download a large amount of malware to your computer.

The Trojan horse is characterized by its formation. It pretends to be a usable file. When it runs, the Trojan horse runs in the background, and the hacker can access the computer. But it doesn't replicate itself and spreads through the Internet like viruses and worms, and they can be hidden in pirated software for distribution.

4, Spyware

Spyware is also a type of malware that monitors users without their knowledge. Different spyware collects different data. Malware can be seen as spyware. For example, a Trojan horse is a malicious spyware that monitors the user's keyboard for stealing financial data.

More “legal> spyware bundles free software and monitors users' surfing habits. The authors of these software sell the collected data to advertisers for profiteering.

5, Adware

Forced ads are often stored in spyware. Any type of software may contain advertisements that pop up prompts from time to time. Software that contains advertisements in a program is generally not called malware. Malicious adware always arbitrarily implants various advertisements into the system. They can generate pop-up ads so that users can't do other things. They can even place ads in the webpage that the user is browsing.

After the adware gets the user's online habits, it can more effectively pop up ads that are of interest to the user. In Windows systems, adware is generally acceptable to users because of other malware because it is bundled with normal software. For example, using Oracle's Java-made know toolbar, users see it as adware.

Copyright © Windows knowledge All Rights Reserved