WORMS
~A program which copies itself across a network.
~It differs from a virus in that a computer worm can run itself.
~A virus needs a host program to run, a worm only needs a network to run.
~It differs from a virus in that a computer worm can run itself.
~A virus needs a host program to run, a worm only needs a network to run.
TROJAN
~Is a malicious program that is disguised as or
embedded within legitimate software.
~Uses fake names to trick users into running the program.
~The differences from virus are:
- It seems like a normal program, except it causes destructive.
- It is not designed to spread itself, it relies on fooling people to execute the program.
~Example of a trojan:
-A program named "pr0n.jpg.exe“, claiming to be a pornographic picture file from a website which, when run, begins erasing all the files on the computer.
SPYWARE
~Designed to collect personal information and transmit it to advertisers.
~It can track your movements on web – your passwords, credit card details or frequently visit websites.
~Often it is bundled with other programs
JUNK MAIL
may refer to:
~Advertising mail received through the post
~Spam (electronic)




No comments:
Post a Comment