List Of Computer Viruses-How To Remove Computer Virus Easily?
The list of computer viruses is getting bigger and bigger compared to earlier times when they were created by pranksters that did no much harm. When a virus is neutralized by anti virus measures, new ones crop up quickly to take it’s place.
The threat to computer online security has become a pressing issue in recent times. This can be understood by analyzing the number of keyword searches done on google keyword tool. The monthly search volumes for some of the hacking keywords ‘how to hack-1670000,hacking software-273000,hack computer-101000,hacking tools-88000,computer hacking-78600,learn to hack-47000’ are indicative of the magnitude of the problem.
The incidences of hacking and other cyber crimes have increased many fold because of the phenomenal growth of computer and internet usage by more and more people. The term ‘computer virus’ is used to describe a whole set of malicious software known as ‘malware’. It can be defined as a hostile software created to access a computer without the knowledge or consent of the owner for unlawful activities of the creator of the malicious software. It contaminates and infects the computer so that people (other than the legitimate owner) of the computer can use it surreptitiously. Usually the term computer virus is rightly or wrongly understood to include Trojan horses, spy ware, ad ware, viruses, worms and rootkits. More may be added to the list in the future as more and more people start using computer and internet.
The purpose of creating a virus is to carry out hostile intentions by corrupting files, to know the browsing habits of the user, to take control of the computer for nefarious activities such as denial of service attacks for extortion, sending spam mails, child pornography etc.., to steal financial information such as bank log in information with the intent to defraud. Those who create viruses and circulate them do so for financial gain and some do it for the fun of it and some for the sadistic pleasure in seeing others' hard work destroyed in seconds causing heavy financial loss.
Viruses and worms, are differentiated by the way they spread. Viruses may also contain a malicious ware that performs harmful actions. Computer virus is used for infecting some executable software and spreads to other executable files when run. A virus is activated by user intervention to spread, whereas a worm is designed to spread automatically. Infections transmitted by Microsoft Word documents or email, depend on the recipient opening a file or email to contaminate the system. Worms are designed to transmit itself over a network to infect other computers and they usually carry a malicious software.
Trojan horse is a program that is disguised as a useful one and tempts the user to run it but contains harmful software which infects the computer. It may take effect immediately causing undesirable end results , such as corrupting or deleting the user's files or for installing harmful software. Trojan horses are used to carry and introduce other software to harm the computer and the network. It is merely a software program which looks like a desirable program that tricks the user into installing it. Usually it carries a spy ware or ad ware which sometimes show off as legitimate by even including an end user license agreement containing terms that users are unlikely to read or understand.
Back doors is a method to facilitate unauthorized entry into a computer by bypassing normal authentication procedures. Hackers use back doors to enter a computer by remote access and remain hidden from inspection. Trojan horses are used for installing back doors which facilitate backdoor entry through the installed malicious ware at a latter date for remote control.
Spy ware programs are malicious software that are used for the purpose of commercial gain by gathering information about computer users, to benefit the spy ware creator. They are also used for diverting search engine traffic to paid advertisements. Some spy ware are created to steal legitimate affiliate commissions of others, by altering affiliate codes so that the commission is diverted to the spy ware creator. These malicious ware are also created to make use of Trojan horses to get installed on the computer and these computers are then used for sending spam messages and denial of service attacks.
Botnets are malicious software created to send coordinated command to all infected computers simultaneously and also for thwarting anti virus security software that may try to dislodge the spy ware.
Keylogger is a software that deciphers key strokes and is used for stealing sensitive personal information such as bank password, credit card information and transmit it to the spy ware creator to steal money from the victim’s bank account.
Data-stealing software are also used for acquiring sensitive data for gain. These are used mainly by some nations and big business houses to spy on their enemies or competitors to outsmart them in business deals and other functions. This type of malicious software is designed in such a way that it does not leave behind any trace to avoid detection. They are also programmed to thwart detection by ‘Intrusion Detection Systems’ and disc encryption.
The Rootkit is a software that facilitates access to a computer, but hides itself from detection and subsequent disinfection. User level access is initially obtained by a hacker to install a Rootkit on a computer either by entering it by using hacked password or by other fraudulent ways. The installed rootkit then modifies the computer operating system to hide it’s presence. It is also programmed to resist detection by anti virus measures by not allowing it’s files to be visible to the legitimate user. Rootkit is also programmed to repel detection and removal.
back to family&home page
back to home page
we protect your privacy
terms and conditions
Note:All external links are sponsored