PANGKAS RAMBUT 09 BLOG

The virus is usually included on the program or file, the file is what helped the virus spread from computer to computer it infects. Computer viruses have varying levels of danger, which as we know them to pervert the virus software, hardware and your data. It's distressing when we are exposed to computer viruses is not it?
Almost all viruses include himself in the executable file, meaning the virus dikomputer glad it was you, but can only be run when you run / open the program that had been infected with the virus. Viruses can not spread without user assistance, meaning the virus is usually spread itself when the exchange of files that have been infected or send an e mail with email attachments that contain viruses.

If worms are collaborators with the virus. But bezanya worm is spread from computer to another even without the help of a user as the user's computer. Worm harness script file or information transport system that enables computer users to move without assistance. Who most terrible case of the ability of this worm is able to duplicate himself. Examples throughout the worm is able to send duplikasinya registered users at the e-mail address book that has infected the system. Once successful, the worm to duplicate itself again and again send one copy to each user's address book that had just attacked a computer and so on.

Unlike the Trojan horses. This program looks like regular software. After the install or run, the program may pervert the system. When the Trojan is active, the effects of various, there is a change the appearance of the desktop, the icon to delete a specific file in your computer system. Trojans can also create a backdoor on the infected computer which makes other users have access to that computer. Unlike viruses and worms, trojans do not produce themselves.

Categories:

Berikan Komentar Lanjutan