![]() |
What is malware ? |
Malware's short form is "malicious software". The same malware refers to such software programs which are designed only to damage or in a computer system to such an additional action.
In Spanish, "mal" is a prefix, which means
"bad", so that this term can be understood by "bad-ware" to
remember it is an easy way.
Malware is the collective name of several malicious software variants, including viruses, ransomware, worm’s spyware etc.
Viruses, for example, can make much devastation in a computer's hard drive, in which they often delete files or directory information.
Malicious intent is often the theft of your personal
information or the creation of a backdoor to your computer, which allows
someone without your permission, access to its resources and its data.
It can be a file or code that is usually delivered to a
network that treats infect, explorer, theft, or virtually anything that the
attacker wants.
The same another Malware called “spyware” steal data from the system of a user, that too without telling the user. These include browsing history of user, the same personal information such as passwords and credit card numbers. It is probably a bit surprised to hear that there are also software programmers who work with the dirty thinking and malicious intent, but it is good to know that before this, the first address was going on.
Types of malware:
1) computer worm:
Computer worms use removable media or networks to gain access to other systems and usually require a program to assist them in this task. Worms spread through e-mail use the e-mail program of the users to send themselves to all the addresses in the address book.
Worms are considered the most common type of malicious
software.
2) Ransomware:
The software goes one step ahead of the spyware by blocking access to the computer's operating system or blocking important files.
This program demands ransom payment to withdraw the blocked data.
3) computer viruses:
viruses are programs that are capable of spreading differently by making copies
of themselves and then infiltrating other computer programs
A virus multiplies after the virus program starts, and then
interferes with the computer's functions, spying on users, destroying data, or
even damaging the hardware.
4) Adware:
The term adware is considered to be a contraction of advertisement and software
and is operated by placing advertisements in the program. It is usually
included in free software and is mostly legitimate, but it can also be
dangerous if it shows a pop-up or fake website, or makes different changes to
the system as well as browsers without permission of the user.
Trojan horse is a type of malware that initially pretends to be a useful and
secure application, so that it can access a computer's system. It performs
functions that are mostly hidden from users. Trojan horses can carry out many
harmful actions such as monitoring the data traffic of a computer. Some of
these actions occur with copying and sending information or files, while others
execute special tasks on the computer in addition to replacing or installing
new software.
6) Spyware
7) Viruses
8) Rootkits
9) Keyloggers
10) Malvertising
And many more……
➡ Connect with me : https://linktr.ee/geekykaushal
Do #share ❤
THANKS FOR READING :)
0 comments:
Post a Comment