Hello There, Guest! RegisterLogin with Facebook
Login with Facebook

New Anna University (UG / PG) Nov/Dec 2016 and Jan 2017 Theory , Practical Exam Timetable
>>> Anna University Sixth Semester Question Bank Collection (R2013) ECE,MECH,CSE,IT,EEE,CIVIL,EIE
>>> Anna University November/December 2015 Examination Question Papers
>>> Anna University Study Materials for all Departments
>>> Anna University Question Papers : April May June 2015 Question Papers | Nov Dec 2014 and Jan 2015 Question Papers

Register or Login to Submit Study Materials , Shoutbox and also to access Many Features !!

Vidyarthiplus Shop :: Handwritten Premium Lecture Notes
Share your Study Materials with us
Share your Study Materials with us : Click Here

Explanation of Malware

We all heard about Virus, Worms, Trojans, Spyware but we don't know the Whats that means!
The combination of all things are known as Malware.
Now we can Know it.

[Image: f9e70942c2ab6cce849334211cc231e6.png]


A virus is a self replicating program that attaches itself to an executable file.
When the file is executed the virus automatically gets executed and enters into system memory.
Once it enters into system memory it either searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.

program that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.
Key loggers is a great example of spyware software.

Worms are very similar to viruses but differ in way that they don't bind themselves to executable files instead to replicate themselves they uses the network.
If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm don't require a user to execute any file for its execution it can work without user intervention.

Trojan Horses:
It is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to facilitate unauthorized remote access to the computer.
Trojan’s don't replicate themselves.

[Image: jRHNJwz.gif]



Recommend on Google