123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Malware

Profile Picture
By Author: John Cicero
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The five types of malware are:

Virus: A virus is a computer program that has been coded to replicate itself and infect a computer without the user's knowledge. A virus spreads from computer to computer by infecting network files as well as CDs, USB drives, and other forms of removable media.
The best free anti-virus is AVG anti-virus which can be found at http://free.grisoft.com/ .

Trojan horse: Trojan horse or just Trojan is a program which looks legitimate but performs illegitimate actions such as granting full access to the intruder, installing a keylogger, disabling security software and as an invisible downloader and spywares. Spybot Search and Destroy is a free program that can find and delete Trojan horses and spywares. It can be found at http://www.safer-networking.org/en/download/index.html

Adware: Adware (advertising supported software) is a software bundle which automatically downloads and displays advertisements to a computer in which it is installed. Adwares can be classified as privacy invading software. It is seen as a way to recover development costs by software developers. The best ...
... program to combat adwares is Ad-Aware 2007 and it can be downloaded at http://www.lavasoftusa.com/products/ad_aware_free.php

Rootkit: A rootkit is a program which has been coded to take complete (or root) control of the system without the user's knowledge. Rootkits take full control of the operating system and therefore cannot usually be removed by anti-virus software. Rootkits usually modify the boot sector of the operating system or disguise as drivers and load during boot up. As a result, it is usually hard to delete them. The most recommended rootkit remover is Sophos Anti-Rootkit which can be downloaded at http://www.sophos.com/products/free-tools/sophos-anti-rootkit.html

Total Views: 137Word Count: 268See All articles From Author

Add Comment

Computers Articles

1. Why To Choose Java Outsourcing Development For Your Project?
Author: goodcoders

2. Why Use Expressjs Over Nodejs For Server-side Development?
Author: goodcoders

3. Why Use Kotlin Over Java For Android Development?
Author: goodcoders

4. 10 Ways To Get The Most Out Of Las Vegas Phone Repair
Author: Fones Gone Wild

5. Why The Discovery Phase Is Important To Your Software Development Project?
Author: goodcoders

6. Why Should Your Business Invest In An End-to-end Custom Software Solution?
Author: goodcoders

7. Why Small Businesses Are Developing Mobile Apps?
Author: goodcoders

8. What Should You Do If Your Laptop Stops Functioning?
Author: Joshua Kirby

9. How Customer Awareness Is Crucial For Buying Refurbished Laptops
Author: usedstore

10. It Staff Augmentation: A Model To Extend Your Team And Succeed
Author: ICSI

11. Why Should You Hire Managed It Services For Your Business?
Author: goodcoders

12. Why Should Enterprises Use Xamarin Forapp Development?
Author: goodcoders

13. Why Micro Teams Are The Future Of Software Development?
Author: goodcoders

14. Indicators That It's Time To Visit A Computer Repair Shop
Author: Anna Paquin

15. Can Mickey Mouse Power Cord Be Used As A Laptop Battery Charger?
Author: Jennifer Truong

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: