Search For Any I.T Related Information

Monday, January 3, 2011

Widgets

What is the real meaning of Malware

Posted on 7:38 AM by Unknown

What is Malware

What is Malware

Most of us have had close brushes with malware, with some of us actually suffering it's evil effects. So what is malware? Come, let's get to know this enemy of our PCs and laptops from a closer angle.

WARNING! You are about to install some malware!

Starting from the moment a malware warning similar to the above message pops up on your screen till the time you've followed all instructions to protect your computer from the threat, it's sheer panic! While most of us have faced this
malware threat situation and many among this "most" have actually gone through the harrowing experience of setting things right after their computers have been invaded, the exact facts and information regarding malware is still a bit obscure for most. While we all know that malware are wicked programs and software designed to stealthily access our computers and cause considerable damage, in terms of data stealth and system corruption, such knowledge is generic for most as we have a general idea rather than specific insight into it. So, what is malware? Let's find out!

What Is Malware and What Are Its Various Forms?


The term
malware is the combined cropping of malicious software. As mentioned above, malicious software is a program that is specifically designed to stealthily invade a computer system that is accessing the Internet and such invasion is done without the informed consent of the human user or owner of the computer system. A malware is usually a hostile, intrusive or annoying program which may cause considerable damage such as data stealth, data loss, drive corruption, file system corruption, etc. The status of malware is usually given to a software based upon the perceived intention of the writer of such a program behind creating such a program code. You must have often wondered what is the difference between malware, adware and spyware, haven't you? Well, malware usually comes in eight forms - computer viruses, computer worms, trojan horses, dubious adware, crimeware, spyware, scareware and rootkits. Each of these forms of malware are being briefly discussed below.


What is Malware Virus?

A computer virus is a program which is designed in such a way that once it invades a computer system, it replicates itself just like an actual biological virus. The replication continues till either steps are taken to remove the infection or till the virus has taken over the entire system. Computer viruses need to attach themselves to other programs in order to be able to replicate. Similar to biological viruses, even computer viruses need working hosts. Email viruses are the most common ones to invade a computer system.

What is a Computer Worm?

A computer worm is also an infection, and like a virus, it replicates across the entire computer system. However, unlike a virus, a worm does not need to attach itself to an existing program and the replication can take place even without user intervention. Worms don't always corrupt files or drives like viruses. Worms usually invade computer networks due to faulty computer security and low network security. The harm caused by them may include something as simple as eating up bandwidth and slowing down the system. Follow the link to know more about computer viruses and worms.

What are Trojan Horses?

Trojan horses are malware that enter the computer system under the guise of a useful application, mostly with the user's knowledge, and appear to perform relevant or desired functions. However, under this guise of utility, trojan horses make way for unauthorized access to the user's system, once it has been installed and run on the system. Like the Trojan Horse of Greek legends, this malware appears as a harmless object before getting entrance into the user's computer system. Trojan horse virus removal could be quite a time consuming task, if the infection has spread considerably.

What are Dubious Adware?

These are advertising supported software which automatically play or download advertisements to the computer and in doing so, expose the computer to spyware and other privacy invasive programs and software. These mostly come in form of pop-ups and the best way to avoid them are to stop pop ups by installing the relevant tool bars or enabling pop up blocking options. You can also take the help of various adware protection tools.

What are Crimeware?

These malware are specifically designed for the purpose of cyber crime and are mostly used to carry out identity thefts and hack the user's accounts to commit fraud. Such fraud usually includes fraudulent online financial transactions by hacking the genuine user's account.

What are Spyware?

As the name suggests, spyware are malware that are installed on the user's computer system to spy upon user information without the latter's knowledge. Detecting these malware is a really difficult task, as they may exist in your system for months without your knowledge. That's why, getting spyware protection by installing an anti spyware software is advisable - after all, prevention is better than cure.

What are Scareware?

These malware are marketed to users under claims that they would correct a threatening computer situation. Most of the times, these malware are sold by cyber criminals who claim that your computer is hit by a virus and that downloading this other software and installing it on your system will be beneficial. Most scareware are scam software or spyware.



What are Rootkits?

A rootkit is an auxiliary malware that allows privileged access of another software to a computer system by hiding the latter's entity from the users and even administrators. It does so by causing a subversion of the functionality of the regular operating system.

I guess that gives you a somewhat clearer idea of what is malware, including a brief overview of the various forms of malware. Nowadays, a lot of anti malware products are available which, when installed on your computer, protect the system from potential malware threats and gives you malware warning when you access certain sites, and when you are about to install certain unknown software applications. This is a better option than
anti virus software as anti malware software safeguard your system against all the other seven types of threats as well as viruses. These software are enabled for malware detection as well as malware removal. Many free spyware removal programs are also available online these days. So, the next time you see that attractive offer to download and install a free application, stop right in your tracks! It could be a malware....

By Ishani Chatterjee Shukla

Feel Free to share this blog post with your friends using the share buttons below this post.

If you have anything to contribute or ask, Kindly make use of the comment form below.

Please, do not forget to SUBSCRIBE to this blog, so that you can be receiving future Information Technology News,money making tricks,browsing cheat latest I.T Jobs,latest I.T career article DIRECTLY into your email inbox, even when you are not online.

We also offer Computer Engineering and Networking Training,Sales of both Laptop and Desktop Computer @ a very cheap price

NOTE: If the LINKS are NOT clickable, it simple means you are not reading this at www.olamoshsystem.com. So, visit WWW.OLAMOSHSYSTEM.COM now to read the original article.

Phone number:08026652529
E-mail Address:olamosh.system009@gmail.com
Join me on facebook:www.facebook.com/olamoshsystem
Website address:-www.olamoshsystem.com or www.latestdreamjob.blogspot.com

Group name on facebook:Information Technology(OLAMOSH SYSTEM LTD)

Group name on facebook:(LATEST DREAM JOB) 

No Response to "What is the real meaning of Malware"

Leave A Reply

SUBSCRIBE TO RECEIVE MY FUTURE ARTICLE THROUGH EMAIL

Enter your email address:

Delivered by FeedBurner

Latest ICT News
Ghana seeks ICT assistance from India
Three banks begin integration to national switch
Cyber fraud activities in Ghana peak at 1am daily – Report
Top BlackBerry Torch 9800 apps
Nigeria Ranked 2nd Highest Country in Software Piracy
GTBank Rolls Out FX Fund Transfer, Opens e-Branches
Glo Ranked Among Africa’s 10 Most Valuable Brands
Airtel Nigeria launches new BlackBerry packages
YouTube in Nigeria –YouTube.com.ng
Google Scholarships for 2012
HiTV Offers Dove and TVC Free
Etisalat Unveil ‘9ja Free Credit’ SIM promotion
Airtel Launches 15k Per Second Plan
Airtel launches new global brand across its operations in Africa
Airtel Nigeria defends name change
Airtel slashes call rates in Nigeria
Nigeria, China sign pact to replace faulty satellite by 2011
Visafone, Etisalat Battle to Acquire Multi-Links
Etisalat Chairman- Industry should emulate music industry
Etisalat Users to Retrieve Lost SIM Cards Online
Online Money Making Tips
How To Make Over N183,000 On a Monthly Basis Doing Just Four(4) Legitimate Biz
Affiliate Blogging
Buy a Very Cheap Tokunbo Laptop & Desktop Cumputer
Great Cheap Browsing for Just N1000 Per Month
Home-Based Business You Can Start Immediately with Low Capital
Hot Business! Real Income!! Hot Opportunity!!!
How to Cash Your Google & International Check in Nigerian Banks
How to Make Money From Your Website
How To Register Business Name in Nigeria
How to Start a Blog and Make Money
How to Use Blogging to Build Your Email Marketing
Make Money Online Schemes Nigerians Should Avoid
What Sort of Website Should I Create In Order to Earn Money?
What You Need To Start & Run a Successful Business in Nigeria
Why Small Business Fail
Blogging Tips
10 Essential Tips for Getting Targeted Traffic to Your Blog
10 Practical Ideas to Drive Traffic to Your Blog
15 Tips for Blog Block
3 Proven Tips to For Creating an Extremely Successful & Profitable Blog
5 Tips for Effective Blogging
Blogging Through Social Media Websites
Blogging Tips for Beginners
Blogging Vs Journalism
How to Make Your First Sale on the Internet the Easy Way
How to Use Blogging to Build Your Email Marketing
How to Use RSS to Generate Tons of Traffic to Your Blog
Some Basic Usability Tips for Commercial Websites
Tips on Choosing a Good Domain Name
What Does Blog Stand For
Wordpress vs Blogger
Admission/Scholarship Info
Abia Poly Wins Ispon Competition
NNPC/CHEVRON 2011/2012 Scholarship Award
Uniport 2011/2012 Merit Admission List Released
Adekunle Ajasin University 2011/2012 Admission Status, Released
FUPRE 2011/2012 Post UTME Results is out
EBSU 2011/2012 Merit Admission List, Now Online
Uniben Direct Entry Screening Exercise for 2011/2012 Academic Session
University of Benin Uniben Releases 2011/2012 Post Utme Results & Admission List
Delsu Releases 2011/2012 Post Utme Cut-Off Marks
Tai Solarin Univeristy of Education Releases 2011/2012 2nd Batch Admission List
UNN Begins Payment of 2011/2012 Acceptance Fees
OAU 2011/2012 Pre-Degree Entrance Examination Date and Time
FUTA 2011/2012 Admission in Pre-Degree and Diploma Programmes Now Available.
Polytechnic Ibadan Releases 2011/2012 Admission List
TASUED Releases 1st batch Admission List

TWITTER UPDATES

Infolinks In Text Ads

 
Twitter Bird Gadget