Computers though were made to make ones work and life easier. Internet was an icing to the cake. But soon this icing proved fatal and hence not favorable for the system’s health. Computers encounter threat from various malicious applications with different names, types, intensity and the level of destruction posed. It is extremely necessary to be acquainted with these malevolent objects that are always residing in the cyberspace with an eagle’s sight for tracing loopholes leading to your computer. Here comes the need to get the system shielded and fortified by strong Antivirus protection. Few of the most ferocious and fatal malicious software programs known are as follows:
Computer viruses can be of varied origin, techniques, infected file types, hiding area, damage consequences, concerned operating system or etc. below are a few common type of viruses:
- Resident Virus
- Direct Action Viruses
- Overwrite Viruses
- Boot Sector Virus
- Macro Virus
- Directory Virus
- Polymorphic Virus
- File Infector Virus
- Companion Viruses
- FAT Virus
- Multipartite Virus
- Web Scripting Virus
These programs bear close resemblance to viruses. They can self replicate and impact your PC negatively. Antivirus programs can detect and prove effective in worm removal.
Examples: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Trojans or Trojan Horses
Malicious codes come in yet another filthy variation, the Trojans or Trojan horses. It is program which masquerades a useful program or application and back stab the system.
These are not programs, rather eventually they camouflage as segments of other programs. Once certain preset parameters are met, they destroy data on the computer. Logic bombs remain untraced until launched and cause destruction.
But how do you know if your system is infected? Here are some of the very common symptoms which when occurs are the signal of being compromised:
- Unexpected error messages or images appear.
- Strange sounds emits randomly.
- Sudden startup of programs.
- Personal firewall signals of an application having tried to connect to the Internet other than a program run by you).
- Sending e-mail messages from the users address list without the user’s consent.
- Frequent PC freezing or slow running programs.
- Unpredictable and inconsistent behavior of web browser.
But often it is challenging to find whether your computer has been compromised. Today there are varieties of technology loaded worm protection and antivirus programs to combat the cyber foes of the computers. But to keep pace and implement warfare the creators of viruses, worms, Trojans and spyware are tracing out incredible paths to hide their code and cover up the misdeeds their programs improvise on an infected computer. Hence it is utterly necessary to avail the best antivirus support to install Internet security software, ensure security patches are functional to your operating system and applications as well as regularly schedule backing up of data.