When I hear the computer virus, many people talk about the 'poison' discoloration, and in daily life, it is inevitable to put those malicious software into the scope of the virus. For example: worms, Trojan horses, root access tools, keyloggers, spyware, etc. In fact, these are not among the ranks of viruses. So what do these mean? Today we will detail their meanings. Explain it.
Malware
<; malicious operating software & rdquo; referred to & ldquo; malware & rdquo;. Many people use "virus" to explain this type of software, but the virus is only one of this category. “Malware” includes all software that poses a hazard. Here are some common situations.
1, the virus
First talk about the virus. A virus is a type of malware that replicates itself and infects other files. Just like a biological virus, a virus first infects cells and then uses them to multiply.
The virus can do many things. For example, it can hide itself, steal passwords, force pop-up ads, and restart the computer. These are not enough to call a virus. Viruses are called viruses because of their ability to reproduce. When a virus runs on a computer, it infects programs on the machine. If you run the infected program on another computer, the machine will also be infected. For example, a virus may be infected with a u disk. When the u disk is plugged into a computer and the infected program is running, the virus will be transmitted to the computer, and then more program files will be infected. The infection will continue indefinitely.
2, worms
Worm is very similar to viruses, except that they are spread differently. The worm spreads over the network, and the virus spreads by infecting files or by man-made mobile virus files. Shockwave worms and shockwave worms are typical examples. They spread very quickly between Windows® XP systems because the Windows® XP system does not have a secure protection system and the system services are completely exposed on the network. The worm can enter the XP system service from the network, find the vulnerability in the system, and start to infect the system. Then it can use the infected computer to self-replicate. Although worms are now rare in Windows systems with default firewalls, they still have other ways to spread. For example, a worm can spread itself to people on all contacts through an infected user's email address book.
Like a virus, a worm can do many things once it successfully infects a computer. Its main purpose is to continue replication.
3, Trojan horse
Trojan horse can disguise itself as a normal file. When someone downloads and tries to open it, the Trojan runs in the background and opens an entry that allows third-party access. Trojan horses can do more tasks, such as monitoring computers and downloading malicious code to a computer. It can also download a large amount of malware to your computer.
The Trojan horse is characterized by its formation. It pretends to be a usable file. When it runs, the Trojan horse runs in the background, and the hacker can access the computer. But it doesn't replicate itself and spreads through the Internet like viruses and worms, and they can be hidden in pirated software for distribution.
4, Spyware
Spyware is also a type of malware that monitors users without their knowledge. Different spyware collects different data. Malware can be seen as spyware. For example, a Trojan horse is a malicious spyware that monitors the user's keyboard for stealing financial data.
More “legal> spyware bundles free software and monitors users' surfing habits. The authors of these software sell the collected data to advertisers for profiteering.
5, Adware
Forced ads are often stored in spyware. Any type of software may contain advertisements that pop up prompts from time to time. Software that contains advertisements in a program is generally not called malware. Malicious adware always arbitrarily implants various advertisements into the system. They can generate pop-up ads so that users can't do other things. They can even place ads in the webpage that the user is browsing.
After the adware gets the user's online habits, it can more effectively pop up ads that are of interest to the user. In Windows systems, adware is generally acceptable to users because of other malware because it is bundled with normal software. For example, using Oracle's Java-made know toolbar, users see it as adware.
What makes many users very troubled is that their own systems are always invaded. It doesnt matter i
Recently, many users are reporting that after the computer is turned on, there is a wrong prompt win
What should I do if there is not enough space on the C drive? I believe that many users have encount
I believe many users know that the u disk will have a hidden partition, so many users will put impor
Master tricks: computer automatic networking solutions
Computer boot prompt did not find how to solve comres.dll?
u disk initialization causes read instability how to solve?
How to easily deal with computer silent problems
How to solve the u disk capacity 0 bytes when using the u disk?
How to solve the problem of "Login component error 4" when the computer is turned on?
How to prevent malicious webpages from tampering with the registry
Ways to protect FTP security: use SSL encryption
After the vps restarts, the mounted hard disk cannot recognize
The small speaker icon in the notification area of win7 system is gone
How do I make the Win7 system desktop icon only display icons without displaying text?
The model of the computer motherboard, you know how many
Windows7 audio service is not running several solutions [Figure]
How to change the phone model of QQ space? Teach you to modify the Android phone model
Learn seven points of advice using Linux systems
Win7 system registration dll but prompted no permission reasons and solutions
Win8.1 how to set the right-click menu display fixed to the start screen option
What should I do if the Win10 system fails to format the disk?