Virus makes the system corrupt in some feature, or some aspect of operation...
WORM - Write Once Read Many - replicates itself, spawning clones, that slow your system.
Either one could lead to theft of ID, if they permit Bots to run.
BTW, there are only a few that are 'Proof of Concept' in all the 'nixs.. that is, Mac OS X (DarwinBSD), the BSDs, the Linux 500+ OSes, Solaris, Irix, and, etc...
More, Microsoft.com, Hotmail.com, MSN.com, all routers, all firewalls, run on over 45,000 Linux computers, and, the Remond Campus Lab 400 systems, all MS development systems, run Linux, too. None of the 114,000 "Microsoft Virus Definitions" work on them... That includes the Worms, bots, virus, Trojans, malware, ad ware, etc, infinitum... Maybe the reason Microsoft has switched???
Or, could it be that any 'nix system runs 50X faster than any MS system? Or, could it be that one 'nix system replaces up to 12 MS servers? Or, the huge layoffs of techs in the IT server farms, could mean shareholders rejoice at higher dividends? Or, secure shell remote control of any desktop in the world, so techs don't answer phones, and can control the computer remotely?
You can check it out and get the FREE 500+OSes, at:
http://pclinuxos.com
http://livecdlist.com
http://distrowatch.com
2006-10-17 03:18:58
·
answer #1
·
answered by Anonymous
·
0⤊
0⤋
2
2016-08-26 22:10:30
·
answer #2
·
answered by ? 3
·
0⤊
0⤋
A computer worm is just some specific kind of virus. There´s no difference. A Worm is normally called as Spyware or Ad ware. It stands itself hidden into the hard drive, turning available input/output devices for a hacker, and creating log files of several activities.
2006-10-17 03:12:04
·
answer #3
·
answered by Ledbird 3
·
0⤊
0⤋
A computing gadget virus is a self replicating virus that would not alter documents yet is residing in energetic reminiscence and duplicates itself.Worms use factors of an working device that are automatic and many times invisible to the person.it incredibly is uncomplicated for worms to be observed purely whilst their out of control replications consumes device ingredients , slowing or halting different projects.
2016-12-13 09:52:10
·
answer #4
·
answered by ? 4
·
0⤊
0⤋
A virus infects files and uses them to replicate itself. A worm doesn't infect files, and doesn't replicate. A virus sounds worse doesn't it? They aren't. Worms are amazingly more destructive and much smarter...
2006-10-17 03:09:54
·
answer #5
·
answered by Phantom Sky 2
·
0⤊
0⤋
wow ive never heard of a computer worm b4.
2006-10-17 03:10:34
·
answer #6
·
answered by Perth-beachbabe15 4
·
0⤊
0⤋
VIRUS:
Secure Remote Control for IT Support Organizations
Remote control software is a cost-effective way of providing remote support. Some are concerned that this exposes PCs or the network to unauthorized use. This paper examines how these products provide a cost-effective help desk tool and defines security requirements.
Register Now to Download.
Break Through the Dissimilar Hardware Restore Challenge
Need to minimize downtime for critical IT services by recovering entire systems to dissimilar hardware or virtual environments? Learn how the Symantec Backup Exec System Recovery can help.
Register Now to Download.
Continuous Data Protection for Better Backup
Backing up mission-critical data can become a burden to IT because data volumes are growing at 40-50% each year. Improve overall data protection without a costly solution that weighs down IT. Learn more.
Register Now to Download.
Optimizing Performance of the Continuous Protection Server
The stress points that continuous data protection places on system architectures are different from traditional backup and recovery technologies. Learn how one customer characterizes these points and quantifies best practices.
Register Now to Download.
Webcast: Best Practices for Protecting Microsoft Exchange with Backup Exec
Learn how to manage your applications in an efficient manner for faster restores and minimized impact on business productivity.
Register Now to Watch.
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Worm:
Secure Remote Control for IT Support Organizations
Remote control software is a cost-effective way of providing remote support. Some are concerned that this exposes PCs or the network to unauthorized use. This paper examines how these products provide a cost-effective help desk tool and defines security requirements.
Register Now to Download.
Break Through the Dissimilar Hardware Restore Challenge
Need to minimize downtime for critical IT services by recovering entire systems to dissimilar hardware or virtual environments? Learn how the Symantec Backup Exec System Recovery can help.
Register Now to Download.
Continuous Data Protection for Better Backup
Backing up mission-critical data can become a burden to IT because data volumes are growing at 40-50% each year. Improve overall data protection without a costly solution that weighs down IT. Learn more.
Register Now to Download.
Optimizing Performance of the Continuous Protection Server
The stress points that continuous data protection places on system architectures are different from traditional backup and recovery technologies. Learn how one customer characterizes these points and quantifies best practices.
Register Now to Download.
Webcast: Best Practices for Protecting Microsoft Exchange with Backup Exec
Learn how to manage your applications in an efficient manner for faster restores and minimized impact on business productivity.
Register Now to Watch.
(1) A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Also see virus.
2006-10-17 03:08:57
·
answer #7
·
answered by Andrew B. 4
·
0⤊
0⤋
both have the same goal. To screw up your computer. Get as much information as it can and screw up your computer.
2006-10-17 03:08:48
·
answer #8
·
answered by Jack 4
·
0⤊
0⤋