1. A computer virus is a program or file that attaches itself to it and can be transmitted from one computer to another. It spreads like wildfire and disrupts your computer system. Make Windows more error-prone Destroy user data Hardware, software, delete important files, etc.
However, most viruses are executable files, such as chrome.exe, system.bat, flashy.com, etc.
Even if they are on your computer, they will not infect your computer unless you open/run them yourself. There are several ways in which a virus can be spread: Forward e-mail includes attached files, memory stick (flash/thumb drives); Uploading virus-infected files from Full Sharing You have shared a virus-infected file without knowing each other
Malware is a combination of two English words: Malicious Software – A program called a virus that is easily called a computer virus by a computer expert. Unknowingly accessing single computer/server/computer network and causing computer system damage. Malware often includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software.
3. A worm is written to look like a virus. It can also be called a sub-class of a virus. It increases the used space of the hard disk. It increases the system memory of the computer. It increases the network bandwidth. It often causes the programs to run unresponsive. The well-known worm is the Blaster worm. The Blaster worm takes place in Registry
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunwindows auto-update = msblast.exe as soon as windows startup. msblast.exe has the same name, and once the Blaster worm is on the computer system, crackers can be used to remotely control the computer.
4. The Trojan horse is also known as the Trojan. As a child, you may have heard of the Trojan horse in world history as a child. You may have seen the Tri movie, which works like that. This game is called Trojan horse. It’s actually an official game, but it’s a virus-infected game. A Trojan horse can do the following: Remote Access, Data Destruction, Downloader/dropper, Server Trojan (Proxy, FTP, IRC, Email, HTTP / HTTPS, etc.). Disable security software, Denial-of-service attack (DoS).
5. Spyware: It’s a thief. You know how spies work, and so on. It sends important data daily to one of its main servers. Spyware usually accesses it through Web browsers, which then redirects you to the browser home page. ၊ You click a link, but other porn sites will open automatically if you do not open it. Some people think that HTTP cookies are spyware. In fact, they do contain spyware-tracked data, so many spyware removers delete cookies.
6. Adware is an advertising-supported software or software package that automatically pops up on the screen and forces you to download.
7. Crimeware is one of the most common types of spyware, adware, and malware. It is often used for financial crimes. links The keystroke logger software, such as keystroke logging software, is a type of crimeware.