Basically, viruses, worms, trojans, malware and spyware are both programs that may damage the computer. However, there are some differences. I purposely did not get an explanation of interesting and easy to digest, the following explanation for readers to better understand the aims and understand that wiser use of personal computer antivirus masing2 origin ... and not delete, not all the files captured by the antivirus harm for the PC,
The program follows the five differences:
The program follows the five differences:
Table 1.1 Differences between Viruses, Worms, Trojans, Malware and Spyware
No.
|
Karakteristik
|
Virus
|
Worm
|
Trojan
|
Malware
|
Spyware
|
1.
|
Definition (sense)
|
A computer program that can duplicate or copy itself and spreads by inserting copies of itself into other programs or documents
|
A computer program that can reproduce itself by itself within a computer system.
|
A form of suspicious software (malicious software / malware) that can damage a system or network.
|
The software was created to infiltrate or damage a computer system, or computer network without the waiter termaklum permission (informed consent) from the owner.
|
Software that collects and sends information about a computer user without the user's known by.
|
2.
|
The nature and purpose
|
Can damage (eg by corrupting the data on the document), make computer users feel annoyed, or no effect at all.
|
Such a virus is replicating. Usually the worm made to destroy certain computer systems have become a target from a distance (remote).
|
Having the ability to control themselves like a virus. In addition trojans can also control certain programs and can fool the system resembles a regular application.
|
To break into or damage a software or operating system.
|
The nature of spyware does not destroy the data and usually intentionally installed or installed by someone who needs information from its target computer.
|
3.
|
Examples of the types and
|
Rain, Ohe half, Die hard, XM/Laroux, Win95/CIH
|
I-worm/Happy99(Ska), I-Worm/ExploreZIP, Sobig, Nimda, Code Red, Sircam.
|
Win-Trojan/Back Orifice, Win-Trojan/SubSeven, Win- Trojan/Ecokys(Korean)
|
Virus, Worm, Wabbit, Keylogger, Browser Hijacker, Trojan Horse, Spyware, Backdoor, Dialer, Exploit and rootkit .
|
Keylogger, PC recorder, Parental Control Software, Detective software and internet monitoring software.
|
4.
|
The impact
|
Reproduce itself, which makes computer resources (such as memory usage) to be reduced significantly.
Virulent virus that will damage the hardware. |
Can cause loss of data files, encrypt files or email files on the computer that has infiltrated worms.
|
Trojan can create a "backdoor" on a PC where a hacker can use it to log into the system. From there, the hacker can enjoy free access to the computer system and cause all sorts of chaos.
|
Can open the browser, redirecting the browser to surf through, penetrated into the pop-up ads that are harmful, such as Music web sites visited, and generally with the program automatically locked.
|
Can cause the computer to run slowly or crash.
|
5.
|
Antivirus (how to combat that)
|
KasperSky, AVG, AntiVir, PCMAV, Norton, Norman, McAfee, dll.
|
NOD32 Antivirus, dll.
|
Trojan Remover, dll.
|
Norman Malware Cleaner, dll.
|
Spyware Doctor with Antivirus, dll.
|
I was diagnosed as HEPATITIS B carrier in 2013 with fibrosis of the
ReplyDeleteliver already present. I started on antiviral medications which
reduced the viral load initially. After a couple of years the virus
became resistant. I started on HEPATITIS B Herbal treatment from
ULTIMATE LIFE CLINIC (www.ultimatelifeclinic.com) in March, 2020. Their
treatment totally reversed the virus. I did another blood test after
the 6 months long treatment and tested negative to the virus. Amazing
treatment! This treatment is a breakthrough for all HBV carriers.