Friday, May 20, 2011

Internet Viruses

Whether you are considering the many free antivirus programs or subscription based options, both can help protect your computer from the multitude of threats found on the internet today. Malware defined as software that enters into your computer without your knowledge have been in existence since the 1970s.

Types of malware include viruses, worms, spyware, trojan horses, and a host of other unwanted programming. These threats can be found on websites inside email, email attachments and potentially anything downloaded from the internet.

In 1971 the Creeper virus written by Bob Thomas was found on ARPANET a little know technology later to be known as the internet or world wide web. Once Creeper gained access to ones system a message "I'm the creeper catch me if you can" would display on the screen. Another virus Elk Cloner (the first Apple virus) in 1981 was created as a practical joke. Lastly the first PC virus called Brain was released in 1986 and was designed to prevent software piracy. However innocent intentions have given way to the exploitation of computer programming for profit.

Spyware is just such a case in that software is designed to monitor unsuspecting users browsing habits, which then causes unsolicited advertisements called "pop-ups" to appear on their computer screen. Once they click on the pop-up albeit to close it or possibly for curiosity they'll be redirected to the advertisers website.

Some other examples include programs that take control of computer systems known as BOT Networks. A BOT network (short for robot) can range in the millions of infected computers that are remotely controlled by the "bot herder". A bot herder is the person responsible for infecting your computer. Bot networks can be used to send out mass amounts of spam messages and perform other malicious activities.

Viruses and worms are two of the most common malware we hear about in regards to online threats. Computer virus spread by human intervention and worms are programmed to spread themselves. Therefore infections transmitted through email are classified as viruses and not worms because user participation although unwittingly is required.

A trojan horse, the term derived from the Trojan Horse story of Greek folklore tricks you into clicking on and opening something you may actually want. This usually is done by packaging the malicious software with something desirable like a picture, calendar, or music download to name a few. When the user unwittingly installs the desired program it also downloads and installs these malicious softwares. Trojan horses are known to delete files, steal data, and create backdoors for hackers who then can access the computer at will.

The internet like the world is full of wonderful things to see, hear and experience and things that are not so wonderful. Many things can be avoided like suspicious websites or emails. However sometimes malicious software can be concealed as in the case of a Trojan horse. That is why it is essential to have an up-to-date antivirus program installed on your computer. A good antivirus program and your own common sense should help you avoid time consuming and costly computer repairs or more.

No comments:

Post a Comment