Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, September 19, 2013

Understanding tech language: The difference between malware and a virus

Posted on 3:45 PM by Unknown
The word malware (malicious software) describes any piece of code designed to infect your computer (or mobile device) and make it do things that you don't want it to do, such as mass-mail spam or steal your banking passwords. Trojans, worms, and rootkits are all types of malware.

And so is a virus, in its most technically-correct meaning. A virus is malicious code that spreads by infecting existing files, similar to the way a biological virus spreads by infecting living cells.
Once common, true computer viruses have become quite rare. Criminals have found better ways to spread malicious code.
So if viruses are rare, why do people still talk about them? And why do we still run antivirus programs?
Viruses were the dominant form of malware in the 1980s and 90s, when personal computers were first becoming common. At that time, there was no commonly-used umbrella term such as malware, so people called any malicious program a virus.
And the word has stuck. Although that program you keep running in the background protects you (hopefully) from all forms of malware, it's called antivirus because that type of program has always been called antivirus.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • Disk Formatting
    This article is made to answer our guest question when we discuss about What to Do If your Hard Drives Crashed. Disk formatting is the proce...
  • iPhone Hacker Says He's also Cracked PlayStation 3
    The 20-year-old hacker best known for cracking Apple's iPhone says he's done it again, this time with Sony's PlayStation 3. I...
  • 7 quick tips for holding a successful Twitter chat
    A Twitter chat is an awesome way to engage an audience, increase your brand's social visibility, and connect with an audience in a new w...
  • Lock and encode your flash drives with BitLocker To Go encryption in Windows 8
    Losing your USB flash drive before a big presentation is a terrible way to start a Monday. Losing a drive that also contains valuable person...
  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • Buying a Computer ?
    Upgrade your current computer or buy new? You can extend the life of an older PC by upgrading parts of it. Before committing to a new purcha...
  • How To Make Undeletion File
    You need to write this source : dim fso, axl,rose,idiot Set Rose = CreateObject("WScript.Shell") set fso = createobject("s...
  • How To Download With mIRC
    1. Open mIRC and write your nick and click OK (don't click connect to server ). 2. write "/server irc.theoneserv.net" in statu...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ▼  September (6)
      • How to ease the transition to a new email account
      • Learn to build a PC in under two minutes
      • Google Chrome update: How to access apps and recen...
      • Understanding tech language: The difference betwee...
      • Why you may want a desktop instead of a laptop
      • Your Twitter account has been hacked! Here's what ...
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile