There are too many differences to explain here, but here are the highlights:
Packaging: Viruses essentially send themselves around and -----------------include the code necessary to reproduce as part of their contents. Spyware is reproduced through the agency of active Web content or other transient programs that users run on their machines (usually without their knowledge or consent). Viruses are thus quite self-contained and may be definitively identified by their contents.
Spyware includes various types of packages that may run on a user's desktop, but is neither self-contained nor completely identifiable. It can only be identified from traces that remain behind after active content has run and is gone. Also, a virus can be sent somewhere for inspection and analysis; spyware requires identifying, finding it in your system and then visiting a source of infestation.
Self-documentation: Viruses can usually be identified and ----------------------------conquered by those who can disassemble a PC. There, it will reproduce and possibly create new directories in which the new copies can reside. Likewise, changes to configuration files, the Windows Registry and other activity all result from chunking through the virus payload. Because the active content that deposits spyware on a PC must be "caught in the act," the remaining changes can only be discovered by rigorous, painstaking analysis of "before" and "after" snapshots of clean machines deliberately exposed to infestation.
Spyware investigators may never see the source code for the afflictions they seek to cure. Virus investigators invariably get to dig into that code directly.
Distribution: Viruses transport themselves around and seek -----------------to reproduce in many ways. Spyware waits for visitors to specific Web sites and pages. Here, the active content that delivers spyware will then run on a user's machine to download related software elements and make related Registry and configuration changes. With viruses, the mountain (the virus) comes to Mohammed (the countermeasures investigator); with spyware, Mohammed (the countermeasures investigator) must go to the mountain.
Complexity and ease of change: Because viruses propagate --------------------------------------------on their own after leaving their creators' hands, they survive or die out based on their contents and payloads. (Some viruses may be described as self-mutating, where mutations usually deal with forms of disguise, not with outright changes to activity.) Spyware remains available to its creators over time, so they can tinker with it at will. This explains why spyware changes so quickly and changes its activities and modes of infection.
Analysis, identification and repair: Anti-virus companies can ----------------------------------------------generally update their anti-virus signatures within 24 hours of discovering a new virus or determining that a known virus has a new variant. Anti-spyware companies must find a source of infection before they can begin the comparison processes needed to identify the spyware activity and changes. Then they must work through file replacements, updates or deletions necessary to remove the infection. Responses tend to take at least 72 hours to complete, and can sometimes take as long as a week. Thus, spyware has more opportunities to spread.
The final answer
--------------------------------
Self-contained packages and definite signatures for viruses are the keys to perfect recognition and handling for viruses. For spyware, the transient, nonportable and often unavailable code for varying traces and symptoms give us a "close is the best we can come" answer for now.
hope this will help
Cheers :)
2007-06-09 00:01:23
·
answer #1
·
answered by Neeraj Yadav♥ 6
·
0⤊
0⤋
2
2016-08-27 17:23:44
·
answer #2
·
answered by Debra 3
·
0⤊
0⤋
Spyware is a piece of software usually used to spy (hence the name) on your internet browsing activities. They use this to popup adverts related to your browsing activities.
Viruses are usually a piece of malicious software using security exploits in your system to delete files, create more security holes or even just to annoy you.
2007-06-09 00:02:11
·
answer #3
·
answered by Anonymous
·
3⤊
0⤋
in case you want something loose, pass with AVG. i could propose identifying to purchase your application nevertheless. Kaspersky is astounding. Norton is powerful besides (2009 and up in basic terms!). Older Norton courses are particularly gradual. do not hotel to those. so some distance as your browser, carry on with Firefox or Chrome.
2016-11-27 19:26:03
·
answer #4
·
answered by habbs 4
·
0⤊
0⤋
Yes Yogi and you need all the programs listed below to be totally protected.
2007-06-09 03:08:33
·
answer #5
·
answered by Dell techie 3
·
1⤊
0⤋
Yes, search for the terms at:
2007-06-09 00:00:56
·
answer #6
·
answered by ELfaGeek 7
·
1⤊
0⤋
sure it differs
2007-06-08 23:59:22
·
answer #7
·
answered by Jack Dawson 2
·
0⤊
0⤋