What are the differences between Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets?

There are many different issues that can affect your computer and network. Some of the things that can cause harm to your computer might be done on purpose. These threats are known as malware. There are different forms of malware that can harm your computer; Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets. Adware is a form of malware that helps online advertisers make sales by placing banners on webpages. This software gathers information from you based off your browsing habits. A third party company usually makes a deal with a business to help advertise. The third party company places tracking software on your computer, this allows them to monitor what you search. A Virus will affect your entire computer. A virus can be spread to other computers via file sharing or email. “All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.” (Quinstreet Enterprise). Worms are like viruses, but they are self-replicating. Worms take advantage of holes in the security features of an applications or other software. Worms are usually spread through email and instant messaging. Worms can use up a computers resources, which could cause the computer to shut down or crash. Spyware is a form of tracking software. Spyware is installed usually without your knowledge. Spyware collects; passwords,...

The Different Types of Malware

Virus A virus is a self replicating nasty. It runs when a user launches something that is infected. It infects your computer by taking over your computer’s functions.  A virus will either destroy data or search for personal information, such as credit card numbers, passwords, and other sensitive information. Your personal information will be sent to another computer. A virus can also relay spam email or pornography on your computer. Worm Worms are often viruses, or are used to deliver viruses. Worms do not require any user interaction to be activated. A worm will copy itself and launch itself, then look for security holes to spread through. You can get worms from emails, and worms will search through your email’s address book. The worm will send a copy of itself to others in your address book, using your email to make it seem like it’s you. Trojan Trojan is a type of malware disguised as a file or program using code to conceal in what seems like something normal. It is not self-replicating, but it can often download other things or provide a back door. The trojan may have an actual function, but it has bad intentions. If you have a trojan on your computer, it can delete your data, compromise the security of your computer,  and relay spam email or pornography like a virus. Spyware Spyware is a type of malware that is installed on your computer to spy on the activity on your computer, collect keystrokes, and data harvest. It will also target you with advertising malicious software to download to your computer. The software will spy...

How to wire your house with Cat6 cable? Which equipment use to create a wired network?

Although nowadays wireless is being considered simpler , a lot of people still don’t trust it due to multimedia sharing, bandwidth on a home network, and paranoia about wireless security.  If you are feeling the same way, you may want to use a hard wired solution for home networking. Having a wired network at home allows you to have a private, high-speed network for internet access, file sharing, media streaming, online gaming, IP security cameras, and much more. Therefore, here’s a step-by-step guide to wiring your home with Cat5e or Cat6 ethernet cable. Step 1: Initial Considerations and Planning (decide what it is your want) Which room(s) do I want wired? How many ports do I want in each location? What is a good location for distribution? . What path should the cables take? (How should they be laid out around your home) This is probably the most difficult consideration. What network speed do I need? (This depends on what you plan to do with your internet connection. Gaming? Media downloading etc…)This will mainly play a part in what kind of switch to get.   Step 2: Required Tools and Materials (and Costs) The cost of tools and materials can vary, based on your needs and what you already have. Tools Ethernet crimping tool (only if you’re putting plug on the ends). Cost: $13 on Amazon. Drill (primarily for drilling through wall top plates, but makes screwing faster too). Cost: varies Paddle bit or hole saw (size will vary by how many cables you’re running). Cost: usually around $20. Pointed hand saw (this makes it easy to cut holes...

The different types of malware and what they do

Greetings, Welcome to another information article here on the MATC IT Support website. For this article, I will be talking about the different types of computer ailments (or malware) that are out there, such as viruses, spyware, worms and others. I’m sure everyone has experienced one of these different “illnesses” during your time using a computer. Some of these ailments might not be too bad, but most can be downright nasty. They can either change or delete files, make you go to websites you don’t wish to go to, or just plain make your computer not work at all. While these all can be nasty, what is the difference between one or the other? Such as what makes a Trojan a Trojan? We will start off with viruses: Virus A virus is a malware program that replicates by inserting copies of itself into other computer programs, data files, or boot sector of the hard drive. Computer virus are often spread through email with attachments or instant messaging. Be very careful about opening any attachments or links sent by someone you don’t know. One of the most famous viruses was the “Melissa” virus back in March of 1999. It spread through Word documents that were sent through email. When someone clicked and opened the Word document, it would infect the host computer, along with sending the same exact email (and virus) to multiple people from the host computer’s address book. Worms A worm is a stand-alone malware program that replicates itself in order to spread to other computers. Worms usually use a network to spread themselves, looking for a security...

Knowing the Differences between certain types of attacks.

  With so many dangers out there on the internet today, one must take all possible measures to protect not only their personal information but their computers from attacks.  However, one big mistake people often make is to assume that all attacks are the same when in fact they behave and act rather differently.  It is always best to prepare yourself by knowing and understanding the differences between attacks so you can better protect yourself from them.           What are the differences between a Computer Virus, Worm and Trojan Horse? A computer virus attaches itself to a program or file and is enabled when you activate the file or program. It then spreads from one computer to another, leaving infections as it travels. A worm on the other hand may be similar to a virus however it does not require human action to travel.  It relies on the file or information transport features of your system and can also copy itself and thus consumes too much of your system’s memory causing your computer to stop responding. A Trojan horse believe it or not is not a virus, it is a program which does exactly as its name implies. At first glance, it will appear as useful software but once installed and activated it can actually do damage or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source, thus named a Trojan horse.  Unlike viruses and worms, Trojans do not reproduce by...