HUO Computer Tips and tricks

Welcome to My Website. This website about Computer, Mobile and internet Tips and tricks,free Softwares and many more...

Welcome to My website

اسلام علیکم میرےویب سائٹ میں آنے کا بہت بہت شکریہ آپ اس ویب سائٹ میں مختلف کمپیوٹر،موبائل اور انٹرنٹ ٹپس اور ٹرکس سیکھ سکتے ہیں۔۔ ﷽ اVisit my new Website www.courseshub.org for free couses and other educational stuff

Monday, 12 March 2018

What is malware ?

💎Malware, or malicious software, is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.

🖌Malware can be classified in different ways  let's see them by their behaviors

🔷Viruses and worms – the contagious threat Viruses and worms are defined by their behaviour – malicious software designed to spread without the user’s knowledge. A virus infects legitimate software and when this software is used by the computer owner it spreads the virus – so viruses need you to act before they can spread. Computer worms, on the other hand, spread without user action. Both viruses and worms can carry a so-called “payload” – malicious code designed to do damage.

🔶Trojans and Rootkits – the masked threat Trojans and rootkits are grouped together as they both seek to conceal attacks on computers. ★Trojan Horses are malignant pieces of software pretending to be benign applications. Users therefore download them thinking they will get a useful piece of software and instead end up with a malware infected computer. Rootkits are different. They are a masking technique for malware, but do not contain damaging software. Rootkit techniques were invented by virus writers to conceal malware, so it could go unnoticed by antivirus detection and removal programs.

⭐Spyware and keyloggers - the financial threat Spyware and keyloggers are malware used in malicious attacks like identity theft, phishing and social engineering - threats designed to steal money from unknowing computer users, businesses and banks. Specially black hat hackers do this things .

No comments:

Post a Comment