wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Worms, viruses and Bots

profile
Chirag Badani
Jul 12, 2023
2 Likes
0 Discussions
30 Reads

WORMS:

A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection. Naturally, you must be wondering what is a Trojan and how does it relate to computer worms?To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems.

Viruses:

A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer. Viruses are harmful and can destroy data, slow down system resources, and log keystrokes.Cybercriminals aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats. When people talk about “getting a virus” on their computer, they usually mean some form of malware—it could be a virus, computer worm, Trojan, ransomware or some other harmful thing. Viruses and malware continue to evolve, and often cybercriminals use the type that gives them the best return at that particular time.

Bots:

A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity. Bots are normally used to automate certain tasks, meaning they can run without specific instructions from humans.An organization or individual can use a bot to replace a repetitive task that a human would otherwise have to perform. Bots are also much faster at these tasks than humans. Although bots can carry out useful functions, they can also be malicious and come in the form of malware.


Comments ()


Sign in

Read Next

RAID

Blog banner

Article on different management system

Blog banner

TAILS OS

Blog banner

Concurrency and Deadlocks

Blog banner

Memory management

Blog banner

Virtual memory

Blog banner

Education?

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Types Of Interrupt

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Virtual memory

Blog banner

Principles of Service Operation

Blog banner

 " Healing of Yoga "

Blog banner

Cryptanalysis tool

Blog banner

Yoga in INDIA and ABROAD

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

MENDELEY

Blog banner

Record Blocking

Blog banner

security controls

Blog banner

Virtual machine

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

Health and fitness

Blog banner

Consumer to consumer Business model

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Blockchain Transactions

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Decoding Confusion Matrix

Blog banner

Steganography

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

DNS Cache

Blog banner

I Personally

Blog banner

Modern OS

Blog banner

RAID - LEVELS OF RAID

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

MySQL

Blog banner

On-Page SEO

Blog banner

Music

Blog banner