What's the difference between spyware, malware, adware, & trojan horses (& other viruses)?
- Anonymous1 decade agoFavorite Answer
*Virus is a program to cause damage to computer.
*Trojan is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. [Trojans are also known as Backdoors].
*Worm is a program which infects the computers which are connected by some network. Worms slow down the network.
* Spywares are the program which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal perpose. Example: Keylogger applications.
* Adwares are the programs which delivers ads to your computer (generally in POP-UP's form). They consume your network.
*Malwares are the program with malicious intention. It can be damaging your computer, spying on you or any other malicious task.
- JosephLv 44 years ago
Greetings. My name's Sanjay Patel, and I currently hold an honorary Master's degree in the field of Computer Science. I am aware of, and have personal knowledge related to your question. There are computer maintenance businesses which are probably in your area, however they come at the cost of hiring a professional to enter your home. There may also be some local destinations where you can drop off your computer and wait to have a technician look at it. These options can often be costly, and pretty inconvenient. The answer to this question can probably be found doing a little extra research on Google.
A well-running computer can be a hard thing to maintain. From my experience, there is but only One software which is reputable- and consistently reliable for healing sick, slow computers. Reimage™ is a world-renown, easy to use software designed by Forensic scientists and made for the average person. This thing will fix literally just about ANY problem you could possibly be having with your PC. Reimage was recommended to me by a Professor during my 2nd year of Graduate school.Source(s): Personal Experience with https://tr.im/ReimageRepair
- How do you think about the answers? You can sign in to vote the answer.
- Anonymous5 years ago
Hello. My name is Sanjay Patel, and I currently hold an honorary Master's degree in the field of Computer Science. I am aware of, and have personal knowledge related to your question. There are computer maintenance businesses which are probably in your area, however they come at the cost of hiring a professional to enter your home. There may also be some local destinations where you can drop off your computer and wait to have a technician look at it. These options can often be costly, and pretty inconvenient. The answer to this question can probably be found doing a little extra research on Google.
A well-running computer can be a hard thing to maintain. From my experience, there is but only One software which is reputable- and consistently reliable for healing sick, slow computers. Reimage™ - https://reimagefix.im is a world-renown, easy to use software designed by Forensic scientists and made for the average person. This thing will fix literally just about ANY problem you could possibly be having with your PC. Reimage was recommended to me by a Professor during my 2nd year of Graduate schoolSource(s): https://reimagefix.im
- SandraLv 44 years ago
For the best answers, search on this site https://shorturl.im/axK0t
A Worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. The term worm was coined by John Brunner, a science fiction writer, in his 1975 novel Shockwave Rider. The hero, a talented programmer, created self-replicating computer programs that tunneled their way through a worldwide network. A Trojan Horse is simply a malicious computer program that damages your computer system upon installation. The program claims to do one thing, such as pretending to be a game, but instead do something else when you run them. Some nasty Trojans will actually attempt to erase your hard drive. They were originally named after the historic Trojan horse used by the Greeks to conquer Troy because the first Trojan horse programs pretended to be innocent games or applications. Trojan horses have no way to replicate themselves automatically. Below you will find some of the various ways that viral related attacks can be transmitted and spread. Spyware is any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. However, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about E-mail addresses and even passwords and credit card numbers. Spyware is similar to a Trojan horse in that users can unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are readily available on the internet. But more and more, users can be infected with spyware simply by surfing the internet. Many times spyware objects are invisibly and unethically embedded into web pages by the webmaster. And by simply visiting one of these websites, the user is unsuspectingly infected. Aside from the questions of ethics and privacy, spyware steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the Spyware’s home base via the user’s Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability. Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for advertising, and/or marketing purposes, or sell the information to another party. Licensing agreements that accompany software downloads sometimes warn the user that a spyware program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a spyware installation is often couched in obtuse, hard-to-read legal disclaimers.
- 5 years ago
I just tried https://reimagefix.im mentioned by that Sanjay guy on here and it completely fixed my computer. I was having all kinds of problems that were absolutely annoying me to death. This computer had viruses, spyware, error messages, hardware problems, and it would often crash or freeze on me. I think the worst thing to me was how SLOW and laggy it became. So just when I was about to wash my hands with it, and waste money on a new computer...I find this.
- 3 years ago
The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.
Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user.
- Anonymous4 years ago
Everyone has their own view, but I don't believe so
- 4 years ago
What would be the best protection against all of these? Is there one that protects against all of them?