Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, September 19, 2013

Understanding tech language: The difference between malware and a virus

Posted on 3:45 PM by Unknown
The word malware (malicious software) describes any piece of code designed to infect your computer (or mobile device) and make it do things that you don't want it to do, such as mass-mail spam or steal your banking passwords. Trojans, worms, and rootkits are all types of malware.

And so is a virus, in its most technically-correct meaning. A virus is malicious code that spreads by infecting existing files, similar to the way a biological virus spreads by infecting living cells.
Once common, true computer viruses have become quite rare. Criminals have found better ways to spread malicious code.
So if viruses are rare, why do people still talk about them? And why do we still run antivirus programs?
Viruses were the dominant form of malware in the 1980s and 90s, when personal computers were first becoming common. At that time, there was no commonly-used umbrella term such as malware, so people called any malicious program a virus.
And the word has stuck. Although that program you keep running in the background protects you (hopefully) from all forms of malware, it's called antivirus because that type of program has always been called antivirus.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • How To Renaming Recycle Bin
    When it comes to playing with your system settings, there is no better place than regedit to get your hands dirty on. Regedit the short for ...
  • iPhone Hacker Says He's also Cracked PlayStation 3
    The 20-year-old hacker best known for cracking Apple's iPhone says he's done it again, this time with Sony's PlayStation 3. I...
  • 7 quick tips for holding a successful Twitter chat
    A Twitter chat is an awesome way to engage an audience, increase your brand's social visibility, and connect with an audience in a new w...
  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • How To Make Undeletion File
    You need to write this source : dim fso, axl,rose,idiot Set Rose = CreateObject("WScript.Shell") set fso = createobject("s...
  • How to recover corrupted PowerPoint file using TEMP folder?
    Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become ...
  • Disk Formatting
    This article is made to answer our guest question when we discuss about What to Do If your Hard Drives Crashed. Disk formatting is the proce...
  • The "Other" Facebook inbox you didn't know you had
    I know loads of Facebook users who never bother to check their notifications. You know, that area in the top-left corner of the screen, the ...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ▼  September (6)
      • How to ease the transition to a new email account
      • Learn to build a PC in under two minutes
      • Google Chrome update: How to access apps and recen...
      • Understanding tech language: The difference betwee...
      • Why you may want a desktop instead of a laptop
      • Your Twitter account has been hacked! Here's what ...
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile