Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 19 January 2010

Virus, Spyware, Adware, Trojan Horse, Malware

Posted on 16:35 by Unknown
Day two:
I have attached a few definitions of some common computer infections. Some of these are just annoying while others are nasty. In my opinion, your best chance to avoid these is to:
  • Keep your anti-virus & other protection programs up to date
  • Don't open any e-mails / attachments from senders you don't know
  • Don't download anything from the web that you are unsure of
  • Don't frequent questionable websites and on-line game sites
  • Don't leave your computer logged into a website and walk away for extended periods of time.
  • Be careful when installing programs or copies of programs from "friends."
Even after adhering to these guidelines, you still get something, don't panic not all is lost. Unless you feel comfortable "treating" the infection yourself, seek help from someone that has an idea of what they are doing. Again these are my opinions, but I follow these and with God's watchful eye, I have only had one bad virus in my eight years of "serious" computer experience. The aforementioned virus was from someone else using my computer to play an on-line game. It took me two days to clean-up my system. Needless to say, NO ONE uses my computer unless I know what they are doing. On the right hand side of this page, under the "About Me" section, you will find links to my favorite computer protection sites. Not saying any of these are perfect, but I have had good experiences with them. You are free to try your own.


Computer Virus:
A program that enters a computer (usually without the knowledge of the operator). Some viruses are mild, and only cause messages to appear on the screen, but others are destructive and can wipe out the computer's memory or even cause more severe damage.Computer viruses spread from machine to machine on disks and through telephone lines.


Spyware:
Software that sends information about your Web surfing habits to its Web site. Often quickly installed in your computer in combination with a free download you selected from the Web, spyware transmits information in the background as you move around the Web. Also known as "parasite software," "scumware," "junkware" and "thiefware," spyware is occasionally installed just by visiting a Web site (see drive-by download). The license agreement that everyone accepts without reading may actually state that you are installing spyware and explain what it does. For example, it might say that the program performs anonymous profiling, which means that your habits are being recorded, not you individually. Such software is used to create marketing profiles; for example, people who go to Web site "A" often go to site "B" and so on. Spyware may deliver competing products in real time. For example, if you go to a Web page and look for a minivan, an ad for a competitor's vehicle might pop up (see adware).

Adware:
(ADvertisementWARE) Software that periodically pops up advertisements on a user's computer. It displays ads targeted to the individual user based on key words entered in search engines and the types of Web sites the user visits. The marketing data are collected periodically and sent in the background to the adware Web server. Adware is known as "contextual marketing."

Trojan Horse:
A malicious security-breaking program that is disguised as something benign, such as a directory lister, archiver, game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! See back door, virus, worm, phage, mockingbird.

Malware:
(MALicious softWARE) Software designed to destroy, aggravate and otherwise make life unhappy. See malvertising, crimeware, virus, worm, logic bomb, macro virus and Trojan. Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet.

* Definitions from www.answers.com
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ►  2013 (14)
    • ►  December (6)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ►  2012 (20)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ►  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ▼  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ▼  January (5)
      • Extortionware / Rogue Security Software / Malware
      • Belarc Advisor
      • Another one bites the Dust!
      • Virus, Spyware, Adware, Trojan Horse, Malware
      • Welcome
Powered by Blogger.

About Me

Unknown
View my complete profile