Define and explain the difference between virus worms logic bombs and trogen horses?
What is the difference between a virus and a worm?
"Virus" has become a generic term that includes all the malicious ways your computer can be attacked. Viruses are distributed by making copies of themselves or replication. So…metimes the replication itself causes damage to your hard disk. Sometimes the accumulative effect of replicating again and again disables the computer. Sometimes the energy used by replication takes over the system and there's no computer energy left. Here's a short list of different kinds of computer diseases: A Virus is a program that piggy-backs on other programs. It can be attached to a Word or Excel file. Each time the file is run, the virus runs too. It attaches itself to other programs and continues to reproduce. An Email virus is a special type of virus sent as an attachment to an email message. It replicates by automatically mailing itself to everyone in the recipients email address book. A Worm uses computer networks to replicate itself. It searches for servers with security holes and copies itself there. It then begins the search and replication process again. A Trojan Horse is a computer program masquerading as a game or a "cute" program. However, when it runs it does something else - like erasing your hard drive or blocking your screen with a graphic will not go away. Some viruses use several of these in combination to replicate themselves. It is disturbing that people actually spend large amounts of time and creative energy putting these devious things together. But they do and will continue to do so. The best protection is to get an anti-virus program and install it BEFORE you have any virus problems. Too many people find out they have a virus only after sending it off to all their friends and business associates. It's simply not worth the risk. Norton and McAfee are the most common anti-virus programs for home and small business use. Be sure to install the updates regularly. If you have an old version, get updated. New viruses are being created every day, it is important to keep your anti-virus software up to date. When your anti-virus program pops up and tells you it has detected a virus, always choose the option to fix it. Here are some tips on recognizing viruses in email attachments: Once you were safe from viruses if email attachments were not opened, however, this is no longer true. Make sure you have the most current updates from Microsoft for your operating system. These are patches for holes that virus creators exploit in the Windows operating system. Select "Windows Update" from your menu system and follow the directions. If you have a dial up connection, this can be very tedious, but it's worth the effort. Most viruses come from opening an attachment that comes with an email. Basically, don't open an attachment that comes from someone you don't know. If it's from someone you know, stop and think. Does it have a reasonable introduction in the email? If the email contains nothing but the attachment or only has a brief note like "I'd like your advice on this" or "Here's something cool" it is suspect. If the attachment is an executable file (ends in .exe or .com), it is also suspect. Don't open suspect attachments. What Is a Virus? A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail. What Is a Worm? A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm , the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
What is the difference between a worm and a virus?
A virus is a program that is designed to spread from file to file on a single PC, it does not intentionally try to move to another PC, and it must replicate, and execute itsel…f to be defined as a virus. A worm is designed to copy itself (intentionally move) from PC to PC, via networks, internet etc. A worm doesnt need a host file to move from system to system, whereas a virus does. So worms spread more rapidly then viruses. The word 'Virus' has become a common term a lot of people use to refer to worms and trojans too. Which is not exactly correct.
What is the difference between a Trojan horse and a virus and a worm?
Trojan horse- It is a program, using this program it will make the victim system to make listen on particular port, so that attacker can do anything on y our system, i.e. he …can tamper with, steal, and destroy the data etc...., a Trojan horse wont spread in to the system like a virus so it won't effect the system performance. virus- It is a malicious program, using this program it will damage your system, by injecting the virus in to another programs are files, so that it will regrade your system performance. Virus will come to the system with user interaction only. worm- It is also one type of virus, using this program it will damage your system like virus, not only system it will spread through out the network and checks for honey pot of your os, and enter into the os, it will regrade your system performance and also it will eat your network bandwidth.
Define and explain the difference between viruses worms logic bombs and Trojan horses?
Virus: a program that replicates by attaching itself to other programs; worm: a program that copies itself throughout a network or the internet without a host program; logic b…ombs: dormant code added to software and triggered at a predetermined time or by a predetermined event; Trojan horse: needs a host program to work hides as a legitimate program.
Define and explain the differences between viruses worms logic bombs and Trojan horses?
Quotes taken from the Panda Anti-Virus website and altered for ease of reading**.
Viruses are computer programs designed to infect files. In addition, some can have annoying, …destructive or even irreparable effects on systems. .
Worms are programs that make copies of themselves in different places on a computer. The objective of this type of malware is usually to saturate computers and networks, preventing them from being used. Unlike viruses, worms don't infect files. .
Logic Bombs: They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. .
Trojan Horses: Unlike viruses, Trojans do not reproduce by infecting other files, nor do they self-replicate like worms. They appear to be harmless programs that enter a computer through any channel. When that program is executed (they have names or characteristics which trick the user into doing so), they install other programs on the computer that can be harmful. .
What is a trogen horse?
Well, to begin The Trojan Horse was a wooden horse that the Greek army built to enter a city and rescue a princess. (that's the epic told by homer) They offered the horse as… a gift, but inside were solders and when the night set, the soldiers popped out and killed and burn the city.
What is the difference between computers time bomb and logic bomb?
The Time Bomb is a subclass of a logic bomb which were designed by programmers who get fired in an act of spite or a cheap shot to get rehired since they can 'trigger' the bom…b to go off (which is why it's called a time bomb)..
A Logic bomb is a like a back door which allows hackers to implant viruses which either preven a system from accessing the main Operating system or expose low security areas.
What is the Difference between Trojan Horse and virus?
Despite the fact that viruses and trojans are frequently confused, they are actually two very different types of unwanted pests. A virus is a small program that "adds itsel…f" onto an existing program, and forms a modified file. Because of this it is difficult to detect, as no new or suspicious files will initially appear on the infected system. Once activated, a virus will usually spread itself onto other systems - either across a network, via email, through the internet, or even via disks and CDs. A virus can delete or alter files and data, and may sometimes go to great lengths to remain undetected, and may often prove to be extremely difficult to remove. They often remain quite invisible to the unwary user, and may even disable anti-virus software to remain hidden and safe from detection and deletion. A trojan on the other hand is a standalone program. It does not add itself onto existing files, nor does it try to replicated and spread to other systems and networks. A trojan's main purpose it to make it's host system open to access, usually via the internet. A trojan may allow an unwanted person to see the files and data on the infected system. It may grant free access to the intruder, who may then be able to freely explore, view, modify and delete data from the hard drive. They may be able to intercept incoming and outgoing data, including emails, keystrokes, passwords, sensitive information and so on. For the Trojan to be effective, it needs to be run at every reboot of the infected system. Because of this it may add entries to the registry or even the startup folder. Removing the trojan tends to be quite simple. You simply delete the offending file, and remove all references to it. Detecting it, however, in the tens of thousands of files on most hard drives, is an altogether more difficult process.
What is the primary difference between a virus and a worm?
A worm can replicate itself and does not need a host for distribution
Define and explain the differences between viruses, worms, logic bombs, and Trojans?
A virus is a program that replicates by attaching itself to other programs. A worm is a program that copies itself throughout a network or the Internet without a host progra…m. A logic bomb is dormant code added to software and triggered at a predetermined time or by a predetermined event. A Trojan horse does not need a host program to work: rather ,it substitutes itself a legitimate program. ch 19 p.1039,1040 A+ guide to managing & maintaining your PC
What are the differences between a computer virus and a computer worm?
A worm is just another type of virus. Viruses in general can do lots of different things. Worms however, are designed to spread across a computer network by exploiting securit…y vulnerabilities in the network. A computer virus can only be activated by running the program in which it is located, however, the computer worm will run without a program open. Therefore, a worm is worse than a virus. Although both are malware, a computer worm is self-replicating, while a virus is not. Worms also do not need to be encrypted to a file to be spread over networks.
Can you remove a logic bomb virus?
1. Run Malwarebytes Anti-Malware 2 Run a complete scan with free curing utility Dr.Web CureIt! If you still have problem or want to protect your computer install any of the… programs below 3. Run the anti spyware removal programs Spybot - Search & Destroy 4 Run Download SUPERAntiSpyware FREE Edition
Answered
In Computer Viruses
What is the difference between a computer virus and the computer worm?
Both a virus and worm are types of malware programs that range from very annoying to extremely dangerous. Viruses attach themselves to programs or files, and count on humans t…o run the program or open the file in order to infect a PC. Worms, a subset of computer viruses, are similar to viruses but they do not require any human action to infect a PC and spread throughout a network and even beyond, say by emailing itself to everyone in your address book.
Answered
In Computer Viruses
What is the difference between Trojan horse and a virus?
A Trojan Horse virus comes into you computer, and your computer usually won't expect it. It then send many other different and horrible viruses into your comp. Look up the sto…ry of the Trojan Horse if you still don't understand.
Answered
In Computer Viruses
What is a logic bomb computer virus?
A logic bomb is a type of malware that executes itself once aspecified condition is found to be true. These conditions can rangefrom a certain program being deleted to an empl…oyee being firedfrom a company.
Answered
In Computer Viruses
What is the primary difference between virus and worm?
dsdfsdf
Answered
In Uncategorized
What does the virus trogen do?
There are diffferent kinds but they can be serious, some havekeyloggers so can see everything you do on the keyboard, if youhave a webcam I could send you a phony fb freind re…quest, then ifyou accept see you right now, some are designed to steal all yourlogins so they can highjack acounts, some are just vandals whodesign them to crash your computer, some are designed just to getyou to buy software-ironically to prevent trojans. They have onecalled false trojan (or something like that) that takes over yourscreen and will fix it if you buy what they are selling, althoughit's no better than any other scanner really. Scammers do this onEbay all the time-(highjack accounts, sell something run off withthe money and leave acct holder accountable to Ebay with the helpof trojans. Scan your computer at least once a week.