Is Your Computer Contaminated By Viruses?
The threat to computer online security has become a pressing issue in recent times
. This can be understood by studying the number of keyword searches done on Google keyword tool. The monthly search volumes for some of the hacking keywords 'how to hack-1670000,hacking software-273000,hack computer-101000,hacking tools-88000,computer hacking-78600,learn to hack-47000' are indicative of the magnitude of the problem.
The incidences of hacking and other online crimes have increased many fold because of the phenomenal growth of computer and internet usage by more and more people. The term 'computer virus' is used to describe a whole set of malicious software known as 'malware'. It can be defined as a hostile software created to access a computer without the knowledge or consent of the owner for unlawful activities of the creator of the malicious software.
Malicious software contaminates and infects the computer so that people (other than the legitimate owner) of the computer can use it surreptitiously. Usually the term computer virus is rightly or wrongly understood to include Trojan horses, spy ware, ad ware, viruses, worms and Rootkits. More may be added to the list in the future as more and more people start using computer and internet.
The purpose of creating a virus is to carry out hostile intentions by corrupting files, to know the browsing habits of the user, to take control of the computer for nefarious activities such as denial of service attacks for extortion, sending spam mails, child pornography etc.., to steal financial information such as bank log in information with the intent to defraud. Those who create viruses and circulate them do so for financial gain and some do it for the fun of it and some for the sadistic pleasure in seeing others' hard work destroyed in seconds causing heavy financial loss.
Viruses and worms, are differentiated by the way they spread. Viruses may also contain a malicious ware that performs harmful actions. Computer virus is used for infecting some executable software and spreads to other executable files when run. A virus is activated by user intervention to spread, whereas a worm is designed to spread automatically. Infections transmitted by Microsoft Word documents or email, depend on the recipient opening a file or email to contaminate the system. Worms are designed to transmit itself over a network to infect other computers and they usually carry malicious software.
by: Chandrasekaran Rajamani
How To Select The Correct Dvd Copying Software Applications Have You Fried Your Computers Chips? Save On Expensive Printing Mistakes Through Copyediting Tricks To Make Catalog Printing Fun And Easy All About Cheap Designer Laptop Totes Batteries Shelby Township - Shelby Township Batteries Buy Cheap Laptop Sleeves Online Clean Your Personal Computer From Existing Malware With A-squared Beat Making Programs What To Do If Your Printer Ink Cartridges Run Dry The Rights And Wrongs Of Spying On People Through Your Computer How I Can Watch Live Tv On My Computer Very Important Issues To Know Before Shopping For A Card Printer Machine
www.yloan.com
guest:
register
|
login
|
search
IP(216.73.216.61) California / Anaheim
Processed in 0.019272 second(s), 5 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 10 , 2531, 55,