Share on Facebook Tweet (Share on Twitter) Share on Linkedin Pin it (Share on Pinterest)

Computer Viruses, Worms And Trojans Explained


Computer Viruses, Worms And Trojans Explained -THE ENEMY – Hackers and Crackers


Computer Viruses, Worms And Trojans Explained77

A virus is “malware”…Fighting viruses and getting rid of them is big business right now. The first step is knowing just what the enemy is.

THE ENEMY – Hackers and Crackers

Computer Viruses, Worms And Trojans Explained8788


Viruses are often hidden inside of other programs, for example installation programs that arrive to you through email attachments. When you run this host program the virus is executed. When the virus is in your computer memory it will be able to do a lot of damage such as infecting other computer programs.

Once the infection phase of the virus is complete the next stage begins: the destructive phase. Viruses will wait for a certain trigger, such as a date or the number of times that the virus has been copied, before the payload is delivered. The payload can be as simple as messages all the way to the deletion of files to the destruction of your operating system.

Computer Viruses, Worms And Trojans Explained7777

When viruses were first created they were often distributed on a floppy disk. As the Internet has grown, email and file downloads are the best way for viruses to be passed. Email can have attachments that can contain any type of computer file. Executable files can be loaded with viruses and therefore you shouldn’t run them unless you’re sure that they are virus free.


Worms are much like viruses because they are self-copying. They can reproduce across multiple networks without human aid, such as through the sending of emails. Worms, however, don’t need an executable program in order to be passed along.

A worm can affect a computer network more than it can infect computers that are on that network. Because they self-copy they can overload the resources on a network. This can cause slow downs in the speed of data transfers by using a large amount of bandwidth…more bandwidth than is needed for normal network traffic. Any network that routes traffic on the Internet is simply known as software and hardware that is specialized. Both software and hardware can be bothered by malware.

Computer Viruses, Worms And Trojans Explained7777111

A worm can be created to carry payloads by using an installation program through the backdoor. A backdoor is an access point into the computer that is hidden. The worm uses the backdoor and ignores the usual procedure for login. Backdoors are often used by spammers so that they can send junk email.


A Trojan horse is another kind of malware. A Trojan horse is a computer program that acts as though it will do one thing when it will actually do something different. This term comes from the story of Troy, a city which was deceived by the Greeks to get into the inner city undetected. A Trojan horse can’t replicate itself the way viruses and worms can.

Computer Viruses, Worms And Trojans Explained122111

A Trojan horse can be hidden in software that is otherwise useful. When a Trojan horse starts it can do such things as corrupt files, install backdoors, erase data, and keep track of keystrokes. This information will enable hackers to steal your personal information such as passwords and credit card numbers.


In this series we will talk about what you can do to fight malware. Until then it’s important to just be passive and not expect that your computer problems will be taken care of by someone else. Combating viruses needs the involvement of users, webmasters, and software vendors.


Contact Information

Leave a Reply

Your email address will not be published.

Group 6 CopyCreated with Sketch.

More Information?

Fill out your details and we will get back to you as soon as possible.