subject: Internet Viruses - What Are They? and Why Should I Care? [print this page] Internet Viruses - What Are They? and Why Should I Care?
Whether you are considering the many free antivirus programs available or subscription based options, each of them can help protect you from the threats found on the internet. What are some of these threats? and how can they harm you?
Malware; is software that enters into your computer without your knowledge, has been in existence since the 1970s. Types of malware include viruses, worms, spyware, trojan horses, and any other program intended to harm your computer or steal your data. These threats can be found on websites, inside email, email attachments and potentially anything downloaded from the internet.
In 1971, the Creeper virus written by Bob Thomas was found on ARPANET, a then little know technology later to become the world wide web. Once Creeper gained access to your computer system, a harmless message appeared on the screen saying "I'm the creeper catch me if you can". Elk Cloner was the first Apple virus created in 1981 as a practical joke. Next was the first PC virus called Brain in 1986 which was designed to prevent software piracy.
Although these viruses were written out of curiosity and fun, these innocent intentions soon gave way to maliciouscomputer programming.
Spyware for example is designed to monitor your browsing habits, which then causes unsolicited advertisements known as "pop-ups" to appear on your computer screen.
Some other examples of malicious programming include software designed to take control of your computer system and make them part of a network of computers known as a "BOT" Network.
A BOT network (short for robot) can range in the millions of infected computers and be remotely controlled. Bot networks can be used for profit in many ways, including sending out mass amounts of email otherwise known as spam.
Computer viruses have the unique ability to copy themselves into the computer and quickly spread throughout a network, infecting hundreds if not thousands of computers. It accomplishes this by way of an executable file embedded into an already existing program. An unsuspecting user clicks on the file and downloads the virus.
Computer worms like viruses also can copy themselves, however, unlike computer viruses they do not require user intervention or to be embedded in an existing program to spread. Instead they take advantage of the computers missing or out-of-date security program.
A Trojan horse, is like the Trojan Horse story of Greek mythology which used deception to enter into the guarded city of Troy. This usually is done by packaging the malicious payload with something desirable like a picture, calendar, or music download. When the user installs the desired program it also downloads and installs the malicious program. Trojan horses can delete files and install backdoors.
The internet like the world is full of the good, the bad and the ugly. That's why it's essential to be aware of the hazards and to have an up-to-date antivirus program installed and running on your computer.