Articles Service - Marketing And Unique Articles - Online Directory - Quick Promotion - Free Contents


   

How Malware Attacks Your Computer



[Valid RSS feed]  Category Rss Feed - http://www.look4articles.com/rss.php?rss=32
By : Jake M. Black    29 or more times read
Submitted 2009-11-05 04:13:10
Malware refers to harmful software or scripts that are affect computers. Malware such as Trojan horses and viruses will be described.

The term malware is an abbreviation for "malicious software". The term is commonly used to describe any software that causes damage to computers, servers, storage systems and computer networks.

Viruses are the most common forms of malware. They are usually made of scripts or programs that multiply and spread files within a computer, server or network. They also spread files from one computer to the other. This is usually done without permission of the user. Some people define viruses as programs that trick the user or computer to install them for the purpose of corrupting deleting, or dislocating the data stored in the hard drive. This is a wrong definition. A win32 virus may not damage the data, but it is distinguished by its ability to multiply within a computer or the user does server. Mostly, the damage is done when a user attempts to eliminate the virus. Viruses are spread through downloads or e-mail attachment. They can also be spread from one computer to another through portable storage devices, like a flash drive or memory stick.

What is a worm? A worm is a virus that creates copies of itself in a computer.

Viruses can be detected and destroyed by a scanner. A scanner scans all the programs and the files in a computer. It will detect all malicious scripts hidden in the computer. After detection, the malicious software will destroyed. Programs with virus-like characteristics will also be destroyed. Viruses can be prevented from attacking your computer or server in the first place. Executable programs usually contain viruses, therefore, when you receive an executable file in your e-mail, you should delete it unless it is from a trusted source. Downloading files from unknown sources is also dangerous, as is exchanging files with other users.

Another type of malware is a "Trojan horse". A Trojan horse is a stealth program that tries to enter the computer without the user's permission or knowledge. The word Trojan horse is derived from a Greek myth about characters that pass through security walls by presenting or hiding themselves in a different form. One example of a Trojan horse is the 'swen virus' that presented itself as a Microsoft application.

Trojans can steal, destroy or alter the data as soon as they start. Memory stored in a hard drive can be erased, and information such as credit card numbers, passwords and other secret details can be stolen. Mostly, Trojan horses are designed to be destructive, and thus, they pose a great threat. Viruses and worms may be the result of an unintentional error caused by a programmer. Whatever the cause, viruses are unwanted.

Author Resource:

trojan vundo remover malware today quickly and easily with our tools and guides.

Related Articles


HTML Ready Article. Click on the "Copy" button to copy into your clipboard.




Firefox users please select/copy/paste as usual


New Members
select
Sign up
select
Learn more
ASK It!
ASK It!

 
Directory Menu
Home
Login to Directory
Submit Articles
Submission Guidelines
Top Articles
Link Directory
About Us
Articles Directory Advertisement
Articles Directory Advertisement Media Kit
Contact Us
Privacy Policy
RSS Feeds


Categories

Accessories
Advice
Aging
Arts
Arts and Crafts
Automotive
Break-up
Business
Business Management
Cancer Survival
Career
Cars and Trucks
CGI
Cheating
Coding Sites
Computers
Computers and Technology
Cooking
Crafts
Culture
Current Affairs
Databases
Death
Education
Entertainment
Etiquette
Family Concerns
Film
Finances
Food and Drinks
Gardening
Healthy Living
Holidays
Home
Home Management
Internet
Jobs
Leadership
Legal
Medical
Medical Business
Medicines and Remedies
Men Only
Motorcyles
Opinions
Our Pets
Outdoors
Parenting
Pets
Recreation
Relationships
Religion
Self Help
Self Improvement
Society
Sports
Staying Fit
Technology
Travel
Web Design
Weddings
Wellness, Fitness and Di
Women Only
Womens Interest
World Affairs
Writing
 
Actions
Print This Article
Add To Favorites
[Valid RSS feed]

Copyright LOOK 4 ARTICLES FREE DIRECTORY - 2005-2012 - Powered By: HYIP