123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Keeping Your Pc Safe - Understanding Malware

Profile Picture
By Author: Lucy Carter
Total Articles: 102
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Malware is the term used to describe malicious software, in other words any program or file that slips into your computer without your permission. It then acts to damage your system, cause your PC to perform illicit actions or steal information.

The types of malware are wide ranging - from worms, viruses and Trojan horses to adware and spyware. Tackling and removing them from your PC depends on understanding the type of malware you're dealing with, since the approach will differ depending on the type of infection and how it operates in your computer system.

Although the malware threat began in the 1980's, the problem is now worsened significantly by the invention of automated tools, which allow hackers to produce these infections at a much more rapid rate. The implication of this is that all PC's are increasingly exposed to malicious software.

The way that malware is introduced to your computer system happens via the same way that any normal file is shared - between drives, through a network, and of course through the Internet. The majority of infections are spread through email (even those from friends ...
... can potentially and unknowingly be malicious), social networking platforms such as Facebook and MySpace as well as through websites (legitimate ones included).

The following guide explains the different types of malware and how they function so that you can best prevent and tackle them.

Trojan horses

Trojans cause a malicious or different action in your PC system than what you allow or expect. These types are most often introduced via remote access to your computer, effectively hijacking it. A common reason for doing this would be to attack other computers, such as a denial of service (DoS) attack which overloads a target computer system with such a flood of traffic, data or commands that it can no longer function properly. Another purpose of Trojans is they can enable hackers to steal your private passwords without your knowledge - this can be highly dangerous as criminals then have access to financial and other highly sensitive information.

Viruses

A virus is a malicious programme that infects legitimate files in your computer and replicates itself as it acts. They hide in your computer with the aim of corrupting your system for their own agenda and to generally cause damage. Some viruses are more subtle in that they don't directly infect files, but rather destabilise your system so that more harmful viruses can slip through the cracks.

Worms

While viruses infect your legitimate PC files, worms work to copy themselves from system to system. Examples of this would be an Internet worm which would use compromised computers on an Internet network to replicate itself and spread infection, or an email worm that propagates itself through mass-mailing.

Spyware

Unlike the worms or viruses that cause PC infection by replicating themselves, or Trojans that cause your PC to perform illicit actions, Spyware is malicious in that it monitors and tracks your computer and Internet activity - from the web sites you visit and ads you click to how long you spend viewing them. This "traffic data" is at best used for market research of consumer behaviour, but at worst spyware tracking can link your PC's unique IP address and ID (MAC address), combine it with your online surfing habits and match it with any personal information you enter when filling out web forms or registering for free programs. In the latter scenario, the spyware sender then trades this information with affiliate advertising partners, building a growing record of who you are and what you like. Ultra malicious spyware programmes also come in the form of keyloggers - these capture every keystroke or screenshot you make so that criminals can then gain access to your passwords, credit card numbers and other private details.

Adware

Often hidden inside free offers on the Internet, Adware act by hijacking your computer for marketing profit - once you unwittingly download the program it is then able to cause popup ads for unsolicited advertising or install a specific toolbar without your permission. Adware can in its worst forms wreak havoc with the functioning of your computer by hijacking your browser start or search pages and redirecting you to sites you've not chosen. Not only is this highly disruptive, it can cause significant damage to the functioning of other programs in your system.


Fighting off a PC malware infection effectively involves the right software, setup in the right way. If you're not web savvy in terms of choosing the tools and techniques to do this, it might be a good idea to take on some expert PC help so you can be sure to have the full security that will keep your computer safe.
Michael Preston - IT Consultant and expert in virus removal.

Total Views: 269Word Count: 784See All articles From Author

Add Comment

Computers Articles

1. How To Develop An App From Scratch In 13 Steps
Author: goodcoders

2. 7 Steps To Create A Safe Mobile App
Author: goodcoders

3. Why Do Businesses Need Vendor Management Software?
Author: Kiran

4. React Native App Development By Alvi Software
Author: Alvi Software

5. Custome
Author: Owner

6. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

7. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

8. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

9. The Rise Of User Centered Web Design
Author: goodcoders

10. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

11. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

12. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

13. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

14. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

15. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: