Home >Common Problem >What are the dangers of malware?
Malware includes all software that can cause harm. The harms it brings include: 1. Stealing passwords and forcing advertisements to pop up; 2. Spreading itself to all address books through the email address book of the infected user. 3. Download malicious code into the computer; 4. Plant various advertisements into the system at will.
Recommended: "Programming Video"
Malware is malicious program code, or is secretly installed on the system software that affects the security, integrity or usability of data or programs on the network. Malware can cause serious damage or disconnection to a network, requiring a lot of effort to restore system security and user trust.
"Malware" includes all software that can cause harm.
How much do you know about the dangers of malware
1. Virus
A virus is a type of malware that can replicate itself and infect other files, just like biology Like viruses on the Internet, viruses first infect cells and then use these cells to multiply.
Viruses can do many things. For example, it can hide itself, steal passwords, force advertisements to pop up, and cause the computer to restart. These alone are not enough to call it a virus. Viruses are called viruses because of their ability to reproduce. When a virus runs on a computer, it infects programs on the machine. If the infected program is run on another computer, that machine will also be infected. For example, a virus may infect a USB flash drive. When the USB flash drive is plugged into a computer and the infected program is run, the virus will be infected into the computer and then infect more program files. That's it. , the infection will continue indefinitely.
2. Worms
Worms are very similar to viruses, but they spread in different ways. Worms spread through the network, and viruses spread by infecting files or by manually moving virus files. Although worms are now less common due to the default firewall in Windows systems, they still have other ways to spread. For example, a worm can spread itself to all people in the address book through the email address book of an infected user.
Like a virus, a worm can accomplish many purposes once it successfully infects a computer. Its main purpose is to continue copying and spreading.
3. Trojan horses
Trojan horses can disguise themselves as normal files. When someone downloads it and tries to open it, the Trojan runs in the background and opens a portal that allows third-party access. Trojan horses can do more tasks, such as monitoring the computer and downloading malicious code to the computer. It can also download large amounts of malware to the computer.
4. Spyware
Spyware is also a type of malware that monitors users without their knowledge. Different spyware collects different data. Malware can be regarded as spyware. For example, Trojan horse is a kind of malicious spyware that can monitor the user's keyboard and steal financial data.
5. Adware
Forced advertisements are often found in spyware. Any type of software may contain advertisements and prompts may pop up from time to time. Software that contains advertisements within the program is generally not called malware. Malicious adware always arbitrarily implants various advertisements into the system. They can generate pop-up ads that prevent users from doing anything else. They can even place ads into the web pages the user is browsing.
6. Keylogging Tool
Malware keylogging tool also runs in the background and can record all keyboard operations. These operations include usernames, passwords, credit card numbers and other sensitive data. Various data will then be sent to the hacker's server for analysis to find useful data.
7. Botnet
A botnet is a relatively large network, and the computers in the network are all under the control of network developers. Each computer was infected with a bot called a special kind of malware.
Once the zombie software infects the computer, it will establish a channel between the computer and the control server and wait for the controller to issue instructions. For example, it can carry out DDoS attacks. If the controller wants to launch an attack on a certain website, then all zombie computers will immediately attack that website. These tens of thousands of attacks can immediately paralyze the server.
The creators of botnets will sell network entrances to other creators, and hackers can also use them to make profits.
8. Root access tool
Root access tool is a type of malware designed to gain the highest authority of the system and avoid inspection by security programs and users. For example, the tool can be loaded deep into the system before the system is running, modifying system functions to avoid detection by security programs. And it can be hidden in Task Manager too.
The core of the root access tool is that once it is running, it can be hidden.
9. Ransomware
Ransomware is a type of malware that hijacks computers or files. After the resources are hijacked, the user is generally required to pay a certain ransom. Some ransomware first renders the computer unusable and then pops up a window asking for payment before continuing to use it. But this kind of software is easily detected by anti-virus software.
The above is the detailed content of What are the dangers of malware?. For more information, please follow other related articles on the PHP Chinese website!