Internet Viruses - What Are They? and Why Should I Care?
Internet Viruses - What Are They? and Why Should I Care
?
Whether you are considering the many free antivirus programs available or subscription based options, each of them can help protect you from the threats found on the internet. What are some of these threats? and how can they harm you?
Malware; is software that enters into your computer without your knowledge, has been in existence since the 1970s. Types of malware include viruses, worms, spyware, trojan horses, and any other program intended to harm your computer or steal your data. These threats can be found on websites, inside email, email attachments and potentially anything downloaded from the internet.
In 1971, the Creeper virus written by Bob Thomas was found on ARPANET, a then little know technology later to become the world wide web. Once Creeper gained access to your computer system, a harmless message appeared on the screen saying "I'm the creeper catch me if you can". Elk Cloner was the first Apple virus created in 1981 as a practical joke. Next was the first PC virus called Brain in 1986 which was designed to prevent software piracy.
Although these viruses were written out of curiosity and fun, these innocent intentions soon gave way to maliciouscomputer programming.
Spyware for example is designed to monitor your browsing habits, which then causes unsolicited advertisements known as "pop-ups" to appear on your computer screen.
Some other examples of malicious programming include software designed to take control of your computer system and make them part of a network of computers known as a "BOT" Network.
A BOT network (short for robot) can range in the millions of infected computers and be remotely controlled. Bot networks can be used for profit in many ways, including sending out mass amounts of email otherwise known as spam.
Computer viruses have the unique ability to copy themselves into the computer and quickly spread throughout a network, infecting hundreds if not thousands of computers. It accomplishes this by way of an executable file embedded into an already existing program. An unsuspecting user clicks on the file and downloads the virus.
Computer worms like viruses also can copy themselves, however, unlike computer viruses they do not require user intervention or to be embedded in an existing program to spread. Instead they take advantage of the computers missing or out-of-date security program.
A Trojan horse, is like the Trojan Horse story of Greek mythology which used deception to enter into the guarded city of Troy. This usually is done by packaging the malicious payload with something desirable like a picture, calendar, or music download. When the user installs the desired program it also downloads and installs the malicious program. Trojan horses can delete files and install backdoors.
The internet like the world is full of the good, the bad and the ugly. That's why it's essential to be aware of the hazards and to have an up-to-date antivirus program installed and running on your computer.
Interview With Scott Tilton - Social Network Monetization SaaS Webmasters - What To Do When Law Enforcement Demands Archived Email? The right way to use social networking sites 3 Important Internet Marketing Rules FBMaxed - Facebook HTML5 iFrame Template and Guide Free Tout Sur Les Abdos download Free Smtp2go Gmail Download Does Pro Forex Robot Work Review Scam-Does Pro Forex Robot Work Download Download Limitless full movie in HD / DVD Quality The Holy Grail Body Transformation Program Pdf Download Forex Overdrive Torrent Free Download-Forex Overdrive Torrent Scam Fibroids Miracle Review Scam-Fibroids Miracle Download Producing Bucks Via The Internet Is Very Simple And Direct To The Point
www.yloan.com
guest:
register
|
login
|
search
IP(3.145.171.144) /
Processed in 0.008496 second(s), 7 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 22 , 3145, 49,