wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Worms, viruses and Bots

profile
Chirag Badani
Jul 12, 2023
2 Likes
0 Discussions
30 Reads

WORMS:

A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection. Naturally, you must be wondering what is a Trojan and how does it relate to computer worms?To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems.

Viruses:

A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer. Viruses are harmful and can destroy data, slow down system resources, and log keystrokes.Cybercriminals aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats. When people talk about “getting a virus” on their computer, they usually mean some form of malware—it could be a virus, computer worm, Trojan, ransomware or some other harmful thing. Viruses and malware continue to evolve, and often cybercriminals use the type that gives them the best return at that particular time.

Bots:

A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity. Bots are normally used to automate certain tasks, meaning they can run without specific instructions from humans.An organization or individual can use a bot to replace a repetitive task that a human would otherwise have to perform. Bots are also much faster at these tasks than humans. Although bots can carry out useful functions, they can also be malicious and come in the form of malware.


Comments ()


Sign in

Read Next

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Pandas Matrix Applications

Blog banner

?How long does wisdom tooth pain last?

Blog banner

INSTAGRAM

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Service Design Principles

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Banaras

Blog banner

Theads

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Is Your Password Complex Enough?

Blog banner

My Favorite Country

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Deadlock in Operating System

Blog banner

Pipedrive

Blog banner

geographic information system (GIS)

Blog banner

Security in Cloud Computing

Blog banner

Linux 94

Blog banner

RAID - LEVELS OF RAID

Blog banner

Modern OS

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

File system implementation

Blog banner

Virtual Machine

Blog banner

Blockchain Transactions

Blog banner

Getting into anime My anime suggestions

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Modern operating systems (OS)

Blog banner

Tools to support CSI activities

Blog banner

RAID

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Never give up

Blog banner

File management In Operating System

Blog banner

Way to make your meal healthier.

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Security issues

Blog banner

How I use google in my daily life

Blog banner