Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, September 19, 2013

Understanding tech language: The difference between malware and a virus

Posted on 3:45 PM by Unknown
The word malware (malicious software) describes any piece of code designed to infect your computer (or mobile device) and make it do things that you don't want it to do, such as mass-mail spam or steal your banking passwords. Trojans, worms, and rootkits are all types of malware.

And so is a virus, in its most technically-correct meaning. A virus is malicious code that spreads by infecting existing files, similar to the way a biological virus spreads by infecting living cells.
Once common, true computer viruses have become quite rare. Criminals have found better ways to spread malicious code.
So if viruses are rare, why do people still talk about them? And why do we still run antivirus programs?
Viruses were the dominant form of malware in the 1980s and 90s, when personal computers were first becoming common. At that time, there was no commonly-used umbrella term such as malware, so people called any malicious program a virus.
And the word has stuck. Although that program you keep running in the background protects you (hopefully) from all forms of malware, it's called antivirus because that type of program has always been called antivirus.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • How Access Registry Using Command Prompt
    Firstly, you need to know that regedit.exe is a tool that created to access registry based on windows. And reg.exe is a tool that created ...
  • Pirate Bay to sue antipiracy site for pirating its design
    An antipiracy group may find itself in legal trouble after borrowing the look of the Pirate Bay Web site for a new campaign. The Pirate Bay...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ▼  September (6)
      • How to ease the transition to a new email account
      • Learn to build a PC in under two minutes
      • Google Chrome update: How to access apps and recen...
      • Understanding tech language: The difference betwee...
      • Why you may want a desktop instead of a laptop
      • Your Twitter account has been hacked! Here's what ...
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile