A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.
Keystroke logging/Keylogger.
Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware- and software-based to electromagnetic and acoustic analysis.
Remote Administration Tool/RAT
A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:
- Screen/camera capture or control
- File management (download/upload/execute/etc.)
- Shell control (usually piped from command prompt)
- Computer control (power off/on/log off)
- Registry management (query/add/delete/modify)
- Other product-specific function
List of Computer Viruses.
http://en.wikipedia.org/wiki/List_of...r_viruses_(A-D)
http://en.wikipedia.org/wiki/List_of...r_viruses_(E-K)
http://en.wikipedia.org/wiki/List_of...r_viruses_(L-R)
http://en.wikipedia.org/wiki/List_of...r_viruses_(S-Z)
Protection
To protect your computer from viruses, or any of the above you can do the following things:
- Install Anti-Virus Software. (Check at the bottom for my set up).
- Don't accept suspicious files.
- Don't go to websites that may be suspicious and may have an auto-downloader on.
My Setup.
Here is my setup, pretty simple really but also pretty effective.
avast! Home Edition
Spybot - Search & Destroy
Both of these software, are free!
Links:
Enjoy my guide, and stay safe!







Reply With Quote













