Indonesia 1/12/2011 12:07:30 AM
A Virus, Trojan horse and Worm, what are the Different
Mostly people make blunder when talking about computer viruses. They always refer to a Worm, Trojan horse as a Virus. Facts are true that they are all malicious programs that can cause damage to your computer, but there are differences between them. And knowing those differences can help you better to protect your computer from their often damaging effects.
For the next information and some tutorial regarding virus and how to fixed them, you can visit This all about no virus zones and windows tips Website or Structure of virus article.
A computer Virus is attached to program or file, so it can spread from one computer to other, leaving infection on every computer that occupied on it. Almost all viruses attached on an executable file, which means the virus may exist on your computer but it cannot infect to your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action. People continue the spread a computer virus, mostly unknowingly, by sharing infected files or sending email with viruses as attachments in the email.
A Worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worm spread from one computer to other, but unlike a virus, it has ability to spread without any helping from a person. The biggest danger with a Worm is it has ability to replicate itself in to your system, so rather than your computer sending out of a single worm, it could send out hundreds or thousands of copies itself, creating huge devastating effect. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory or network bandwidth, causing Web server, network server and all PCs to stop responding.
A Trojan horse is trickery as mythological Trojan horse it was named after. The Trojan horse, at first glance will appear to be useful software but will actually do damage, once installed or run on your computer. The users a Trojan horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the result can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojan are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojan do not reproduce by infected other files nor do they self-replicate.
A Blended Threats, what it is. Added into the mix, we also have what called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristic of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attack in one payload. Blended threats are considered to be worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.