Distinguish viruses, trojans, worms and rootkits
Most of us have heard of spyware, malware, viruses, trojans, worms or rootkits… but do you really know the difference between them? It's really not easy to understand all the terms that refer to these computer threats.
Spyware (spyware) in the original sense is a program that is installed on the system without the user's permission or secretly accompanied by another valid program to collect personal information of the user. and then send it to a remote computer.
Malware (malware) is basically any type of software that intends to do harm to a computer (collect information, access sensitive data, etc.) Malware includes viruses, trojans, rootkits, worms, etc. keyloggers, spyware, adware, etc. Now, let's dive into the different types of malware.
Virus
Is a program that can spread itself from one computer to another. This feature is also present in worms, but the difference is that the virus usually has to implant itself in an executable file in order to be activated. When a user runs this executable, the virus can spread to other executables.
Viruses are cleverly inserted into executable files in a variety of ways. The popularity of office applications entails "army" of Macro viruses. These are viruses that are implanted in data created by Microsoft products such as Word, Excel, PowerPoint, Outlook .
Trojan
Many people still think that viruses make up the majority of malware, that's not true. According to the list of top threats compiled by Microsoft, the most common malware are trojans and worms.
The Trojan does not self-replicate, does not implant a file like a virus, but is instead installed on the system by posing as legitimate and harmless software that then allows the hacker to take control of the computer remotely. One of the most common purposes of a trojan is to make a computer part of a botnet. Botnets are a series of computers connected over the Internet that are used to send spam or do denial-of-service attacks that bring down websites.
Worm
Capable of self-replicating without implanting a host file. They also often use the Internet to spread, thereby causing serious damage to an overall network, while viruses usually only target files on the infected computer. Worm spreads mainly due to security holes of the system. So as a precaution, you need to install the latest security updates for your computer's operating system.
Rootkit
Actively "stealth" from the eyes of the user, the operating system and anti-virus/anti-malware programs, rootkits are malware that are difficult to detect. Rootkits can be installed in many ways including exploiting vulnerabilities in the operating system or gaining administrative rights to a computer.
Once installed and with full administrative rights, the rootkit will hide itself and change the status of the operating system and software to prevent future detection. Rootkits will disable anti-virus programs or implant themselves in the core of the operating system, so your only option may be to reinstall the entire operating system.
You should read it
- Difference between Virus, Spyware and Malware
- How to avoid Malware
- Differentiate types of malware
- Protect your computer from viruses and spyware
- 10 typical malware types
- Prevention of viruses, spyware, malware ...: It's easy but not easy!
- Introduction to viruses, worms, and Trojans
- 7 computer viruses you should be careful
- How to Remove Viruses from Flash Drive
- Viruses are not only a threat to computers
- How to delete malicious programs using Kaspersky Virus Removal Tool
- How to remove Trojan, Virus, Worm or Malware?
Maybe you are interested
14 rare 'super powers' of humans Learn how Jews teach children to communicate from a young age The battery, super athlete, eagle's eyes ... 15 'mutants' possess super powers of 'superhuman' 26 'unimaginable' images of micro-apartments in the world Do you feel electrocuted when you touch things and others don't, why? 'Hunting' season and bloody 'carnage' dolphins in Taiji, Japan