![]() Unlike viruses or worms, trojans don’t usually try to infect other software or replicate themselves. In reality, behind the scenes, it’s doing malicious things. Unfortunately, it turned out to be the worst piñata ever, filled with Greek soldiers who snuck out at night and opened the city gates for the rest of their army.Ĭomputer trojans work in exactly the same way, except instead of a big horse you’ll get a program that says it’s something useful and harmless. In the original story, the people of Troy wheeled a giant wooden horse statue into the city, thinking it was a goodbye present from their enemies. Trojans are named after the Trojan Horse of Greek mythology. ![]() These days, firewalls and other network security systems are highly effective at stopping worms from spreading, but new holes are always being discovered. ![]() Worms usually use vulnerabilities discovered in operating systems, hardware, or software to run their code without the user having to do anything at all. So if one computer at a company or school became infected, the program could quickly spread itself to other connected machines. For example, the Blaster Worm spread like wildfire in the mid-2000s thanks to a vulnerable open network port on Windows computers. They also spread by themselves, without human intervention. A virus needs a host program to infect and relies on users to spread that infected program using removable storage, email, or another similar transmission method.Ī worm exists as its own independent program, not as code attached to a third-party application. What’s a Worm?Ĭomputer worms and viruses are very similar in the sense that they self-replicate and execute a (usually) malicious payload on computer systems. The majority of viruses do harm your data or system on purpose by deleting data, stealing it, or otherwise doing something that’s not good for you or your PC. Some viruses have benign payloads that don’t actually damage anything. The payload can be anything the virus author wants it to be. Apart from trying to spread to other programs, viruses also have a payload.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |