Question:
What is a Malware/Virus/Spyware/Adware/Bloatware/Trojan/Root Kits/Boot Kits?
?
2013-08-20 09:54:04 UTC
PC Experienced users please explain to me a few things about Malware/Virus/Spyware/Adware/Bloatware/Trojan/Root Kits/Boot Kits and if I missed some other PC Threats please also tell me what I missed.

When I say explain to me in above sentence it means:

1. What is the characteristics of each one? Characteristics means what exactly each one do after entering a PC. Besides, how do they enter one's PC (e.g. while surfing the net, while file sharing, after file opening, which types of files do they come attached to, etc.)?
2. If I see a suspicious file (for example, there is a file named 'Unconfirmed .crdownload" file in my Downloads Folder (which I never downloaded) or I download a File attached to an email sent by a known person and But I dont open it up till I scan it will my PC still get infected? If I go to deleted a suspicious file will my PC get infected?

if I open an email in which I dont see any attachments will my PC still get infected? Because once I opened such an email which was not showing a Clip (depicting an attachment. But when I opened it someone had sent me a JPG file inside which was present on some website or server on the net. So what this person who sent me this file did was he didn't directly insert a dirty picture in the email body. But, he somehow enabled that this dirty picture lying on some pornsite got opened up inside the email body as soon as I opened the email to see its content. And why opened this email. Because I didn't see any attachment in it (in form of Clip shown by Yahoo). Till that time, I felt confident that if I didn't see a Clip besides the email subject it meant no attachment is attached and so it was safe to open up the email. But, when I clicked that email the dirty picture got opened up in full and its source was some **** site. So the guy who sent this email did some innovative trick to fool me. He didn't insert the actual picture into the email body but somehow ensured that a picture loaded on some **** site automatically opened up on opening of this Yahoo or Gmail Email (I dont remember whether it was my Yahoo Mail or Gmail address). But, that acquainted me with the harsh reality that opening emails with no attachment clips can also be dangerous.
Seven answers:
Sly_Old_Mole
2013-08-20 14:51:50 UTC
A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent.



A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These backdoors tend to be invisible to average users, but may cause the computer to run slow. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers



Therefore trojan is not a virus because it cannot replicate itself.



Trojan = malware, not a virus, cannot replicate itself



Scarware = malware not a virus,cannot replicate itself



spyware - programs for spying on you, cannot replicate itself



PUPS = potentially unwanted programs, not a virus, cannot replicate itself



Worms come into a class of there own because they can replicate itself
?
2016-11-01 12:36:46 UTC
1
?
2016-08-23 00:32:09 UTC
2
?
2013-08-20 10:45:03 UTC
Malware is a catch all phrase we use to describe anything on your puter that you did not install and is malicious. Everything below can be called malware.



Virus is the term we first used to describe bad programs that did harm to hard drive. The first virus was a joke, not meant to do nothing more then to scare the recipient. Toady viruses are used for far worse. The FBI virus is the one that comes to mind as being one of the worse of them.



Adware is just that. A program that display ads on your puter.



Spyware is a program that spy on you. It origins were to steal passwords or financial data. Today it is used to spy on your every click and web page visited. Google is probably the worse offender in this area, M$ is working hard to catch up with the release of Windows 8. The first OS released with built in spyware. A lot of the free AV and firewall are spyware. The only problem is that in the puter world, if your a major corporation it is OK to spy. They work very hard at placing things on your puter to phone home to report what you are doing. When you here the term big data, think spyware and remember they are working hard to make you a part of it.



Bloatware is programs installed in new puters by the manufacturer that you will never need or use. They get payed to install some of the bloatware. A lot of bloatware is actually spyware.



Root kits are viruses that embed themselves in the kernel of the OS and are very difficult to remove. They normally need a special program to detect and remove.



Malware can be embedded in pics but most AV will catch them now. Most email clients allow you to block embedded pics in such a way that if a pic is in the email you are prompted before opening it.



Never open email from someone you do not know. That includes people you meet online. A lot of trolls out there that pretend to be friends but are just looking for a victim.



Life is scary, the internet is scarier.
?
2016-11-05 01:24:49 UTC
Bloatware Meaning
?
2016-12-04 05:04:15 UTC
If the first help equipment would not paintings then you quite bypass to the medical institution, and that is your 2d help equipment. in spite of the actual incontrovertible reality that I did see this one individual who develop into great paranoid and had each and each and every of how as a lot as a nil.33 help equipment.
Terminator alien
2013-08-20 14:41:45 UTC
buy a antivirus immediately or your computer will not open or hard disc will be corrupted .buy kaspersky or quick heal ,update your antivirus and system regularly ..


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...