The Difference Between a Virus, Worm and Trojan Horse

Knowing the Differences Can Help You to Better Protect your Computer

A computer virus attaches itself to a course of study or file so it can spread from one computer to another, leaving infections as it travels. much like human viruses, calculator viruses can range in asperity : Some viruses cause only gently annoyance effects while others can damage your hardware, software or files. Almost all viruses are attached to an feasible charge, which means the virus may exist on your computer but it can not infect your computer unless you run or open the malicious program. It is authoritative to note that a virus can not be spread without a human action, ( such as running an infect plan ) to keep it going. People continue the banquet of a computer virus, largely unwittingly, by sharing infecting files or sending electronic mail with viruses as attachments in the electronic mail .
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from calculator to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transportation features on your system, which allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your arrangement, so rather than your calculator sending out a one worm, it could send out hundreds or thousands of copies of itself, creating a huge annihilating effect. One exercise would be for a worm to send a copy of itself to everyone listed in your electronic mail address book. then, the worm replicates and sends itself out to everyone listed in each of the recipient ‘s address book, and the manifest continues on down the line. Due to the imitate nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes besides much organization memory ( or network bandwidth ), causing Web servers, network servers and individual computers to stop answer. In more holocene writhe attacks such as the much-talked-about .Blaster Worm., the worm has been designed to tunnel into your organization and allow malicious users to control your computer remotely.

See also  Sound vs. Noise

Xem thêm: Centrilobular emphysema: Diagnosis, treatment, and outlook

A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be equitable as destructive. Trojans besides open a back door entrance to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.

reference :
Category : What is?