Monday, February 24, 2014

Computer Infection Terms

Nothing ruins your day, computer and your internet browsing like a malicious computer virus.  If you’re a home pc user, picking up a virus can obliterate your precious free time removing the virus.  If you have a small business, a virus results in lost productivity and lost revenue.
In a worst case scenario, you may wind up totally rebuilding your computer and reinstalling all your applications.  Let’s take a quick look at some of the common terms used when talking about computer infections.
Malware – short for malicious software.  A catch-all acronym that generally includes things such as viruses, Trojans, worms.  In short, software that is designed to damage your computer or compromise your privacy.
Virus – malicious software that is generally spread by downloading and opening infected files.  These are spread through human interaction through web pages or removable media (usb drives, cd’s, dvd’s).
Trojan Horse – A form of computer virus that is generally downloaded onto a computer by what appears to be a useful or valid program.  Damage to your computer can range from annoying glitches to complete failure of your computer.
Worm – A worm is similar to a virus.  The difference is that a worm is capable of spreading itself whereas as a normal virus requires human interaction.  Once on a system, a worm can replicate itself and spread to other computers.  A worm is most commonly spread through email or on a company’s network.
Spyware – Malicious software that gathers user information without the user’s knowledge or consent.  Usually installed unknowingly with another program from the internet.  Once the information is gathered, it can be transmitted to someone else.  Spyware can be used to get email addresses, passwords, credit card information as well as other uses.
Rootkit – A software program that hides itself from detection while allowing another user unauthorized access to your computer.
Backdoor – Usually installed to allow a hacker to access and remotely control your computer.

Later this week, we’ll take a look at three ways to minimize your risk of computer infection.