Virus
History records the malware has spread because of the user. User error PC doing some kind ofaction to trigger the virus to act. The classic example of this is to open an e-mail attachment. Virus disguised image file or some other common file types. When the file is spread out, an misplay occurs or the file can be open as usual, but the trick users into thinking nothing is wrong. In any case, a virus requires user intervention to spread.
At the end of the 1990s, this type of malware is more commonly called is the most threatening virus. Now, the threat of computer virus* lives more fictive. The virus can now “hide” in other files, are like an Excel file or PDF file. So be careful because the virus by the method of reproduction and new infections continue to be developed.
Trojan
Trojan, in contrast with the virus in terms of content, can infect a PC via the same method as above. While the virus tried to run malicious code on a PC, the Trojan tries to allow third party access to some or all of the functions of your computer. Trojans can infect your computer through almost any method used virus. Indeed, viruses and Trojans are often lumped together as malware due to some security threats have properties associated with viruses and Trojans.
Worm
The term "worm' is several inclined to the method of infection and means of reproduction. A worm represents an spyware that give the sack infect computers without user intervention. The worm infects computers through vulnerabilities in the network. General characteristics of the spread of the worm is making copies of itself and spread randomly. Each copy has instructions to attack a particular network vulnerabilities. When a vulnerability is found, the worm uses a network’s vulnerability to gain access to a PC and used to distribute the load of virus. Once that happens, a recently louse using the infected personal computer to repeat the whole process from scratch.
Rootkits
Rootkits are able to obtain special access rights to the computer and hide from antivirus in general. The term “rootkits” is used primarily as a means to explain certain types of cargo. Rootkits can infect your system and produce themselves by using a number of tactics. They can operate like a worm or hide away in a file that looks common.
In various ways many rootkits charge is trying to achieve the same purpose as a virus or a Trojan. Rootkits charge will attempt to remove, destroy files, try to record the beat of the keyboard (keylogging), or perhaps trying to find your password and then send it to third parties. All this is usually done by a virus or trojan, but rootkits are much more effective camouflage themselves in their jobs.
Rootkits use security flaws in the operating system to disguise itself as an important system file or, in severe instances, inserting itself into the file system comprises important so as to make removal impossible without damaging the operating system.
The good news is more difficult rootkits to be made from the virus or Trojan. Rootkits to plunge deeper and deeper into the PC operating systems, rootkits are made more difficult because if there is a bug in the rootkits, rootkits can make it crash into the target PC.
Phishing and Pharming
Global of malware in the 1990s looks very old likened to today. Inwards the retiring, malware are often made by a hacker who wants to display their talents and gain fame among their peers. The resulting damage can be severe, but limited to the infected computer.
Meanwhile, modern malware is often used by criminals seeking to steal personal information. This information can then be used to hijack the credit card, make a false identification, doing all sorts of illegal activities that impact negatively on the lives of victims.
Phishing and Pharming is a technique that is most appropriate to describe the criminal element on PC security. This threat is significant, but technically they are not attacking your PC, unlike the virus. Instead, they use your PC to trick you and steal important information.
Phishing and Pharming, the two terms are closely related. Pharming is a technique utilized to lineal a person to a fake website. Phishing is the act of harvesting it is private information by masquerading as a trustworthy entity. Both of these techniques often help-help. Pharming techniques to send someone to a fake site which is then used to "lure" of a such personal information.
The classical example of this kind of attack gets down with an e-mail that seems like sent from your bank. In the e-mail stated that the alleged security breach online bank server and you need to change the username and password. You then provided a link that looks exactly like the look of your bank’s website. At one time opened, it will postulate you to inform your username and password and then type a new username and password.
Happened already. You do not realize what is wrong until you try to login to your bank site.