English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

2006-11-25 07:19:35 · 5 answers · asked by jjmjr 1 in Computers & Internet Security

5 answers

Trojan Horses are impostor files that claim to be something desirable but, in fact, are malicious. Rather than insert code into existing files, a Trojan horse appears to do one thing (install a screen saver, or show a picture inside an e-mail for example) when in fact it does something entirely different, and potentially malicious, such as erase files. Trojans can also open back doors so that computer hackers can gain access to passwords, and other personal information stored on a computer.

Although often referred to as such, Trojan horses are not viruses in the strict sense because they cannot replicate automatically. For a Trojan horse to spread, it must be invited onto a computer by the user opening an email attachment or downloading and running a file from the Internet, for example.
A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating anew.

Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. Mydoom or ILOVEYOU are two examples of worms.

2006-11-25 07:23:45 · answer #1 · answered by Anonymous · 0 0

A Trojan virus is a virus that is encoded in to another file and set on a timer. Once the other file has been downloaded or installed, the Trojan virus will wait until it's set "detonation" time before being unleashed.

2006-11-25 15:28:49 · answer #2 · answered by quatrapiller 6 · 0 0

What Is a Computer Virus

Computer viruses are actually small programs that have the ability to replicate themselves and then spread throughout your system in many ways. This is usually done without a user’s knowledge. Such programs may copy themselves to a shared network resources or mail themselves to E-Mail Contacts that are stored in your address book.

After a Virus has infected your system, it will usually trigger itself in some sort of fashion. It can launch annoying pop up windows that repeatedly place messages on your screen. It can deny you access to your data files and even change your system configuration settings. In advanced stages of infection, a virus can cause major damage to your system as it can corrupt your files and render them unreadable. It can even start deleting files as well. A virus doesn’t always have to trigger itself upon infection. It can actually be programmed to launch at a specific time or on a specific date so that there will be no obvious sign of system infection. A virus will usually disguise itself and may even attach itself to another file, so as to trick a user into running it.

Worms And Trojan Horses

A Worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. The term worm was coined by John Brunner, a science fiction writer, in his 1975 novel Shockwave Rider. The hero, a talented programmer, created self-replicating computer programs that tunneled their way through a worldwide network.

A Trojan Horse is simply a malicious computer program that damages your computer system upon installation. The program claims to do one thing, such as pretending to be a game, but instead do something else when you run them. Some nasty Trojans will actually attempt to erase your hard drive. They were originally named after the historic Trojan horse used by the Greeks to conquer Troy because the first Trojan horse programs pretended to be innocent games or applications. Trojan horses have no way to replicate themselves automatically. Below you will find some of the various ways that viral related attacks can be transmitted and spread.

2006-11-25 15:24:11 · answer #3 · answered by G 7 · 0 0

They named it a trojan for faking to be a file, when it is actually a virus. You download it and it spreads throughout your system, slowing down your computer :/. Get Windows Defender from Microsoft to get rid of some. Hope it helps

2006-11-25 18:28:10 · answer #4 · answered by Yen N 1 · 0 0

I know that it is a virus and gives problems. I can give a few links that offer free virus and spyware removers...! Norton, AVG , Avast are free antivirus software. Ad-aware, Ewido are free spyware removers. You can download free softwares at
http://fixit.in/antivirus.html and http://fixit.in/spywareremover.html

2006-11-25 21:43:05 · answer #5 · answered by RICH 3 · 0 0

fedest.com, questions and answers