Monday, April 15, 2019

Spyware, viruses, malware, worms, Trojan horses and adware: symptoms, solutions and prevention

Virus:

A virus or computer virus is a self-replicating program or a piece of script or code that copies itself and then attaches itself to an existing file on an infected system, or stores a copy of itself in the system under the name & #等辜的名字39;维修工具'.

Viruses are limited to being transmitted by transmission or transmission by an uninformed user or from one system to another on a portable storage medium. However, if a virus is embedded somewhere on a network drive, anyone who opens or clicks on an infected document or file will eventually become infected.

Spyware:

Spyware is a piece of software that collects information about a user's Internet habits, browsing patterns, email passwords, usernames, and even credit card information, essentially "spyware." On the unfortunate user. This type of software is usually installed without the user's knowledge, and can also secretly transmit the collected data to a third party via the Internet.

malicious software:

Malware can refer to any number of malicious forms of software or code that is deliberately designed to perform one or more of the following malicious acts:

>Infiltrate the user's computer system without the user's consent.
from

  > Collect sensitive personal information such as credit card numbers, social security numbers, date of birth or system password.
from

  > Create backdoors or remote entry points to allow hackers to access the system.
from

  > Destroy critical data and/or destroy system files.

Malware is a generic term commonly used to include viruses, worms, spyware, Trojan horses, and some forms of adware. The actual intent of the malware may vary, but by definition it is any destructive software. Because the term malware is so extensive, it is difficult to cite most infections from a particular source.

Worm:

A worm or computer worm is a self-replicating computer code that uses a computer network to propagate its own copy to other nodes on the network. Unlike viruses, worms can do this without user intervention or help. Unlike computer viruses, worms do not have to attach themselves to existing computer programs or files.

Many times, worms are also used to carry payloads. Payload ' is the code used to perform certain functions. In some cases, the payload allows the worm to send the document as an attachment to the email through the infected system's email account. The process begins again when the unsuspecting recipient of the email opens the attachment.

Trojan horse:

A Trojan horse or Trojan horse virus is a program that is typically installed and executed on a computer system that appears to perform some useful functions but unknowingly allows simultaneous unauthorized access to the user's computer system.

A hacker uses a Trojan horse to remotely access a user's computer and then perform any number of malicious activities. These evil activities may include but are not limited to:

> Data theft.
from

  >Key record.
from

  > Download or upload a file.
from

  > View the victim screen.
from

  > Destroy the user system.

Adware:

Adware is an advertiser-supported software that displays as a condition for software installation, plays or downloads advertisements to a computer desktop or computer web browser. Most adware is free to use, as long as you don't mind the annoying pop-ups that advertise some products or other products at random intervals. I saw some adware open a new window every 1 to 2 minutes, making it almost impossible to use the system before it has to be removed.

In addition, adware almost always collects data about your Internet habits and browsing behaviors to specifically tailor ads to best match recovered data. In this respect, it is actually very similar to many types of spyware. In most cases, adware is just a way of placing ads in front of users, even though it is a good boundary before classifying them as spyware.

However, for adware, in some cases, you may actually have the opportunity to review and choose whether to accept the terms and conditions associated with the software prior to installation.

Please read these terms carefully before choosing to accept.

Symptoms of infection:

> Computer performance is very low.
from

  > Random system lock or crash.
from

  > Browser Redirection - You will be taken to a website that was not searched while browsing the Internet.
from

  > There are too many pop-ups that appear randomly when you go online.
from

  > You are told that your system already has hundreds of ' activity infections, you are redirected to a website, insist on paying and downloading their specific packages to eliminate the infection.

Solution:

There are many excellent anti-virus/anti-spyware products on the market designed to detect and eliminate these types of infections. McAfee and Kapersky are good, but AVG and Avast! There are similar products and a free download version is available. Be sure to complete a full ' system scan and quarantine and remove all active infections. Configure your antivirus software to perform active 'scan or real-time system monitoring.

Prevention:

>If you do not have software from a known reliable source, please do not install software downloaded from the Internet.
from

  >Be careful if you download files using a file sharing platform such as the LimeWire or torrent website.
from

  >Do not open any email attachments from unknown sources.
from

  > Use a good anti-virus/anti-spyware application and scan your system at least once a week. Make sure your antivirus software is exactly the same as the latest virus definition.
from

  >For Windows users: Be sure to visit the Microsoft Updates site and download all the latest Microsoft security patches.




Orignal From: Spyware, viruses, malware, worms, Trojan horses and adware: symptoms, solutions and prevention

No comments:

Post a Comment