Tuesday, March 3, 2009

A breif detail about Virus, Worms and Trojan Horses

The most common blunder when the topic of a computer virus arises is that people will often refer to a Worm or Trojan Horse as a Virus. While the words Trojan, worm, and virus are used interchangeably, they are not the same. Viruses, worms, and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences between the three, and knowing those differences can help you to better protect your computer from their often damaging effects.


A computer Virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.


A Worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.



A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. The Trojan horse itself would typically be a Windows executable program file, and thus must have an executable filename extension such as .exe, .com, .scr, .bat, or .pif. Since Windows is sometimes configured by default to hide filename extensions from a user, the Trojan horse is an extension that might be "masked" by giving it a name such as 'Readme.txt. exe'. With file extensions hidden, the user would only see 'Readme.txt' and could mistake it for a harmless text file. When the recipient double-clicks on the attachment, the Trojan horse might superficially do what the user expects it to do (open a text file, for example), so as to keep the victim unaware of its real, concealed, objectives. Meanwhile, it might discreetly modify or delete files, change the configuration of the computer, or even use the computer as a base from which to attack local or other networks - possibly joining many other similarly infected computers as part of a distributed denial-of-service attack. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.


Added into the mix, what is called a blended threat? A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat. Blended threats use server and Internet vulnerabilities to initiate, transmit and spread an attack. This combination of method and techniques means blended threats can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.



To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For examplem it wouldn't just launch a DoS attack — it would also install a backdoor and damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. For example, a worm may travel through e-mail, but a single blended threat could use multiple routes such as e-mail, IRC and file-sharing sharing networks. The actual attack itself is also not limited to a specific act. For example, rather than a specific attack on predetermined .exe files, a blended thread could modify exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.



Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats require no human intervention to propagate.

Combating Viruses, Worms and Trojan Horses :



The first steps to protect your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan Horses. Additionally you want to make sure your anti-virus program has the ability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. If this isn't enough protection, then you may want to consider installing a firewall as well.

A firewall is a system which prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is unable to get rid of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

41 comments:

Anonymous said...

若對自己誠實,日積月累,就無法對別人不忠了。........................................

Anonymous said...

I love readding, and thanks for your artical. ........................................

raxon said...

Thanx for the article . I have already lost my important data due to these viruses and since then Iam very much aware of these and search for windows data recovery program

志竹 said...

打炮自拍貼圖夫妻自拍片成人無碼片線上看18限成人影片甜心寶貝貼影區都都成人貼圖站都都成人網都都貼片區都都貼圖站都督成人貼圖都督情色網野求拳陰莖套陰道貼圖陰道遊戲最女優最性感美女遊戲最新av女優無碼都都成人貼片都都成人區都都成人往聊一夜情聊天,ut聊天男 聊天室聊天室男同志莉的遊戲處女免費處女男喜歡人少年阿賓系列小說言情小說免費線上閱讀 色情影片成人貼圖站

Anonymous said...

真得很不錯的blog,留言加油! ........................................

Anonymous said...

Hello~Nice to meet you~..................................................

Anonymous said...

很用心的blog,推推哦 ........................................

Anonymous said...

thanks................................................

Anonymous said...

非常感謝~3Q~....................................................

Anonymous said...

從未遭遇失敗的人,對自己或是別人,都是一知半解的。 ..................................................

Anonymous said...

免費視訊聊天室美女貼圖518人力銀行性感美女視訊交友loveliness正妹做愛正妹強正妹報時成人 影片明星色情文學明星色情寫真明星色情貼圖真真明星色情照片明倫高中正妹明道中學口交日本漫畫卡通排行榜日本漫畫卡通 h 線上觀看日本漫畫色情日本人妖影片 bt視訊 辣妹視訊甜心寶貝av貼片區視訊交友av1688視訊情人後宮電影主入口a圖打飛機專用網情色cu成人bt入口77p2p影片網性愛貼圖sogo論壇xvideos日本線上免費a片免費a片卡通一夜成人聊天室免費影片線上直播ut同志聊天室台灣kiss色網高雄視訊淫美論壇免費18影片85st免費影片觀看成人交友qk176

Anonymous said...

外表往往與事實不符,世人卻容易被外表的裝飾所欺騙。 ..................................................

水慧 said...

After a storm comes a calm...................................................

向花 said...

成功的第一要素是珍惜自己......................................................

tyroneb said...

處順境須謹慎,處逆境要忍耐。......................................................

許美玉 said...

能猜得出女人真實年齡的男人也許耳聰目明,但肯定毫無大腦。哈哈!..................................................................

向霖 said...

大師手筆﹐果然不凡.................................................................

Anonymous said...

死亡是悲哀的,但活得不快樂更悲哀。......................................................................

Anonymous said...

河水永遠是相同的,可是每一剎那又都是新的。....................................................................

Anonymous said...

It takes all kinds to make a world.............................................................

Anonymous said...

當一個人內心能容納兩樣相互衝突的東西,這個人便開始變得有價值了。............................................................

Anonymous said...

很榮幸能到你的BLOG留言o^~^o..................................................................

Anonymous said...

文章是心情的反應~~祝妳天天寫的都是讓人開心的好文章哦!!............................................................

Anonymous said...

開心不開心都是一天,祝您能夠笑著面對一切!............................................................

Anonymous said...

感謝分享--每天都要快樂喔....................................................................

Anonymous said...

人不可以求其備,必捨其所短,取其所長............................................................

Anonymous said...

耐心是一株很苦的植物,但果實卻很甜美。.......................................................

Anonymous said...

百發百中不是一試就成的。..................................................

Anonymous said...

Some people cannot see the wood for the trees.............................................................

Anonymous said...

幸福不是一切,人還有責任。............................................................

Anonymous said...

Learning makes a good man better and ill man worse.............................................................

文王廷 said...

堅持是為著某種目的或目標,而持續不斷朝向既定方向努力的一種意念。..................................................

Anonymous said...

Poverty is stranger to industry.............................................................

Anonymous said...

成功是優點的發揮,失敗是缺點的累積............................................................

Anonymous said...

快樂,是享受工作過程的結果......................................................................

Anonymous said...

來塊巧克力吧~~心情會好哦~~...............................................................

Anonymous said...

happy to read~ thank you!............................................................

Anonymous said...

良言一句三冬暖,惡語傷人六月寒。......................................................................

孫邦柔 said...

打聲招呼,祝你一切平安!............................................................

Anonymous said...

卡爾.桑得柏:「除非先有夢,否則一切皆不成。」共勉!.................................................................

Govt Jobs said...

Nice Information in the post

MPPSC recruitment 2016