wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Worms, viruses and Bots

profile
Chirag Badani
Jul 12, 2023
2 Likes
0 Discussions
30 Reads

WORMS:

A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection. Naturally, you must be wondering what is a Trojan and how does it relate to computer worms?To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems.

Viruses:

A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer. Viruses are harmful and can destroy data, slow down system resources, and log keystrokes.Cybercriminals aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats. When people talk about “getting a virus” on their computer, they usually mean some form of malware—it could be a virus, computer worm, Trojan, ransomware or some other harmful thing. Viruses and malware continue to evolve, and often cybercriminals use the type that gives them the best return at that particular time.

Bots:

A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity. Bots are normally used to automate certain tasks, meaning they can run without specific instructions from humans.An organization or individual can use a bot to replace a repetitive task that a human would otherwise have to perform. Bots are also much faster at these tasks than humans. Although bots can carry out useful functions, they can also be malicious and come in the form of malware.


Comments ()


Sign in

Read Next

The launch of UniMap by HERE

Blog banner

Security Issues and Countermeasures

Blog banner

(Input/Output) in os

Blog banner

Blockchain Security Technique

Blog banner

What is Virtual Memory

Blog banner

MPL and how its effects?

Blog banner

Cyber Forensics

Blog banner

Windows Operating System

Blog banner

Is Your Password Complex Enough?

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Deadlock

Blog banner

Interrupts in operating system.

Blog banner

OS Assignment 3

Blog banner

Concurrency and Deadlocks

Blog banner

Multithreading in Operating System

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Royal enfield

Blog banner

Internet of Things

Blog banner

Deadlock and Starvation

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Service Strategy In ITSM

Blog banner

Man is free by the birth .

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Constrained Management in IT

Blog banner

Retiring ISS

Blog banner

K-means use cases

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

INSTAGRAM

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Developments in Modern Operating Systems

Blog banner

What is Minting & Mining

Blog banner

CoWIN

Blog banner

A book review

Blog banner

I/O buffer and its techniques

Blog banner

Virtual memory

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Health and fitness in technology

Blog banner

Why Data Security Is Important

Blog banner