Select Page

There are many different issues that can affect your computer and network. Some of the things that can cause harm to your computer might be done on purpose. These threats are known as malware. There are different forms of malware that can harm your computer; Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets.

Adware is a form of malware that helps online advertisers make sales by placing banners on webpages. This software gathers information from you based off your browsing habits. A third party company usually makes a deal with a business to help advertise. The third party company places tracking software on your computer, this allows them to monitor what you search.

A Virus will affect your entire computer. A virus can be spread to other computers via file sharing or email. “All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.” (Quinstreet Enterprise).

Worms are like viruses, but they are self-replicating. Worms take advantage of holes in the security features of an applications or other software. Worms are usually spread through email and instant messaging. Worms can use up a computers resources, which could cause the computer to shut down or crash.

Spyware is a form of tracking software. Spyware is installed usually without your knowledge. Spyware collects; passwords, usernames, and screen captures. The captured information then is sent to the attackers.

A Trojan is a program that can appear as a normal program but, it contains harmful contents. An example of a Trojan horse could be a simple weather application that you downloaded online, but this application could contain a key logger.

A Rootkit is malware designed to hide itself from Windows and antivirus software. Rootkits are used to monitor network traffic and keystrokes. A Rootkit hides itself inside the operating system. “Rootkits primarily aim at user-mode applications, but they also focus on a computer’s hypervisor, the kernel, or even firmware. Rootkits can completely deactivate or destroy the anti-malware software installed in an infected computer, thus making a rootkit attack difficult to track and eliminate. When done well, the intrusion can be carefully concealed so that even system administrators are unaware of it,” (Techopedia Inc).

Backdoor is a hidden feature in a program that allows a user to perform actions he or she would not normally be allowed to do. When used in a normal way, this program performs completely as expected and advertised. Programmers might install a back door onto a program for troubleshooting.

A Logic Bomb is a malicious program timed to cause harm at a certain point in time, but is inactive up until that point. “A logic bomb may be implemented by someone trying to sabotage a database when they are fairly certain they won’t be present to experience the effects, such as full database deletion. In these instances, logic bombs are programmed to exact revenge or sabotage work,” (Techopedia Inc).

A Botnet is group of networked computers infected with malware and viruses. “They’re typically used to send spam emails, transmit viruses and engage in other acts of cybercrime. Sometimes known as a zombie army, botnets are often considered one of the biggest online threats today,” (Kaspersky Inc). These computers are controlled by attackers. The computers owners usually are not aware of what is happening.


Works Cited

Kaspersky Inc. (n.d.). Retrieved from Kaspersky lab:

Quinstreet Enterprise. (n.d.). Retrieved from Webopedia:

Techopedia Inc. (n.d.). Retrieved from techopedia:

Techopedia Inc. (n.d.). Retrieved from Techopedia: