Distinguish malware, viruses and Trojan horses

Most of us don't really know the difference between malware, viruses and Trojan horses. All three types are dangerous programs that can harm computers. There are many differences between these 3 types and if you know this difference you can better protect your computer from serious consequences.

What is Malware?

Distinguish malware, viruses and Trojan horses Picture 1

According to Science ABC, malware is a type of software (a piece of code) written to infect or harm the system it enters (for example, the server system). It is simply a generic term used to refer to a variety of software types that infiltrate or destroy, which adversely affect your system performance.

Malware can have many purposes. It can be used to spy on or steal information from your system, compromise your computer, or to extort money. Malware will become more dangerous when it is regularly hidden in normal harmless files.

Distinguish malware, viruses and Trojan horses Picture 2

Malware can include viruses, adware, nagware, spyware, worms, trojan horses, and many other types of malware. This means viruses and trojan horses are two types of malware. So if you want to distinguish malware and viruses, it's like you distinguish between "weapons" and "guns".

What is a virus?

Distinguish malware, viruses and Trojan horses Picture 3

A computer virus is a program or code that is loaded into your computer without your knowledge and it has the opposite effect to what you want. Some viruses not only cause small effects, but they can also endanger hard drives, software, or files. Most viruses are attached to a program file, which means that the virus may already exist on your computer but it cannot be dangerous unless you run or open the program.

A virus cannot spread itself without human impact (eg running virus-bearing programs). People will continue to spread viruses when sharing or mailing infected files.

What is Trojan Horse?

Distinguish malware, viruses and Trojan horses Picture 4

First, we will recall a famous monument in Greek mythology. After 10 years of fighting in the Trojan City, the Greeks were unable to defeat the Trojans with military strength, and were forced to follow the Odyssey's plan of unloading and taking wood to make a horse - meaning like a gift from the Greek army to compensate for the destroyed Athena statue. In fact the horse is full of soldiers. When the Trojans were drunk after the victory party, the Greeks in the horse's abdomen broke out and opened the gate for the outside troops to enter. Thanks to the wooden horse, the Greek army won and completely defeated the enemy. (By Wikimedia)

In the computer world, the concept of Trojan Horse was born since CDC (Cult of the Dead Cow) created Back Orifice, the most famous trojan ever. They were so named because the malware had a lot of similarities with the wooden horse that was put into the Trojan.

Trojan horse is a kind of malicious malicious computer program. If someone tells you that your computer has been infected with Trojan horse, then you will know that it is in serious trouble (unless your computer has an excellent antivirus software preinstalled).

Trojan horses have the ability to hide themselves into normal, harmless software. Unfortunately, this makes it easier for them to bring negative effects to your computer. For example, when you see a computer cleaning software that is quite interesting. This software is committed to maximizing the performance of computer systems. You find that your computer is also in need of cleaning up. So, you've downloaded the software and installed them yourself.

Boom! Unconsciously, you have successfully installed a Trojan horse on your computer!

The effects of Trojan horses are diverse. Some will "help" you change the screen image or throw your icons around, messy around the screen. Others cause more serious harm to your computer (spy, steal or sell your information to third parties). And because Trojan horses need to have human installation to harm computers, so the best thing you can do is not install any software unless it's a part. Soft origin reliable and legal.

Whether virus or trojan horse, they are all malicious software; and more or less, they all have a direct impact on performance and "life time" of your computer. And because your computer needs a lot of different software to serve your different purposes, you should have a powerful antivirus program that can protect your system from software. malicious, including viruses and Trojan horses.

4.3 ★ | 3 Vote

May be interested

  • Instructions for installing and configuring Microsoft Security EssentialsInstructions for installing and configuring Microsoft Security Essentials
    to provide a basic level of security in a small server environment, users can install microsoft security essentials with some simple changes, but most of the functions of windows defender.
  • What is Safe Malware? Why is it so dangerous?What is Safe Malware?  Why is it so dangerous?
    remote access trojan (rat) is a type of malware that allows hackers to monitor and control the victim's computer or network.
  • How many types of malware do you know and how to prevent them?How many types of malware do you know and how to prevent them?
    currently, computer criminals use a lot of different malware (malware) to attack the system. here are some of the most common malware types and ways to prevent them.
  • 'Super stealth' rootkit'Super stealth' rootkit
    a new trojan program is so clever that many security experts have called it a 'new chapter' in the fight against malware. with the name rustock (according to symantec) or mailbot.az (according to f-secure), this trojan uses sophisticated rootkit techniques to prevent viruses.
  • Trojan 2.0 - Implications of Web 2.0 technologyTrojan 2.0 - Implications of Web 2.0 technology
    finjan malware research center has just released the fourth security risk report. accordingly, measures against traditional malware - signature-based (virus detection based on a database of known malware software) and
  • Can a VPN Fight Malware?Can a VPN Fight Malware?
    sure, a vpn can help you maintain your privacy and security online. but can it protect you from malicious programs? can a vpn keep you safe from malware and viruses like antivirus vendors do?
  • Trojans 'confrontation' with dangerous softwareTrojans 'confrontation' with dangerous software
    a 'civilian' trojan is likely to want to protect computer systems from the effects of viruses every time users enter peer-to-peer (p2p) networks.
  • Trojan banks surpass the malware defense of Google PlayTrojan banks surpass the malware defense of Google Play
    bankbot shelter on the game is said to be very fun.
  • How to remove viruses, malware on MacHow to remove viruses, malware on Mac
    macos is one of the least virus-infected operating systems, but this does not mean it does not. this article will show you how to check and remove viruses on mac.
  • 10 typical malware types10 typical malware types
    currently, more and more sophisticated and more malicious new malware types appear. anyone can know the harmful effects of malware, but not everyone knows how they work. this article will point out the 10 most dangerous types of malware ever.