Malicious programs descriptions


A malicious program is a piece of code intended to do damage to a system or the information it contains. Malicious programs are separated into different groups: hacker utilities, worms, Trojans, viruses, rootkits and other unwanted software. These programs are typically created to impede the behaviour of computer systems.

Hacker Utilities include the following:

  • Programs that are especially developed to aid in developing malware;
  • Programs or utilities that can be used to make viruses, Trojans, and worms;
  • Programs that hinder usual computer tasks or functions;
  • Programs that intentionally mislead users;
  • and programs made to damage protected technology.

Malicious Program Description - Network Worms

A worm is a program which works by infecting one computer and then contaminates the whole system of computers. A worm is also a program that can replicate itself from one computer to the next throughout a computer network.

These worms are capable of overloading your entire network or computer system, which impairs the speed of your computer’s performance.

It frequently performs malicious procedures, such as using up the computer’s resources and then shutting the system down. It may also transmit an infectious payload.

To be able to propagate, worms utilize different networking system such as instant messaging, email, LANs, WANs, etc.

Few numbers of packet worms spread as network packet wherein it directly goes through the RAM of the infected or victim machine, and the code is executed.

Malicious Program Description - Viruses

Viruses are programs that duplicate themselves through one machine to activate a code after a user does a certain action and infiltrate other resources inside the infected system.

Viruses do not employ network resources to infect other computers. Virus copies can only penetrate other computers if a code is activated or an infected item is accessed on an uninfected computer. Virus replication can occur in these manners:

  • The code infects a network resource’s files. The files are accessed by other users.
  • It infects transferable storage media which are affixed to an uninfected machine.
  • A user contacts another recipient with an infected email.

Malicious Program Description - Trojans

Trojans comprise many programs which execute actions without the knowledge or permission of the user. These malicious programs can collect, destroy, or alter data; causing malfunctions to the system. Trojans can also be used for nefarious intent, such as sending spam.

DriverScanner
How outdated are your PC drivers?
Old drivers harm system performance and make your PC vulnerable to errors and crashes.

Posted in Viruses

Leave a Comment

Please note: Comment moderation is enabled and may delay your comment. There is no need to resubmit your comment.