The Difference Between a Computer Virus & Worm
The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.
What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked- about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely
What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files.
Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.
People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked- about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely
Posted in
Internet
,
Technology/Science
Related posts:
If you enjoyed this article, subscribe to receive more great content just like it.
Sponsors
Popular Posts
-
Breast tattoos are different from chest tattoos, since many tattoo designers only consider tattoos put directly upon a woman's tit to be...
-
Here Are Some More Cool Military Tattoo Designs. Military Tattoos Pictures Military Tattoos Pictures Military Tattoos Pictures Military Tatt...
-
Whether found on the beach or bought in a craft store, shells can add a touch of seaside flair to any room. Beach Detailed Flower Holder Rep...
-
Here Are Some Latest Cat Tattoo Designs. So cute this cat. I love this cat tattoo. Though this black cat is not that cute, still I like it s...
Recent Stories
Connect with Facebook
Sponsor
Search Site
Archives
-
▼
2011
(117)
-
▼
January
(69)
- Dating Tips For Man
- Ladies, Know Your Proper Bra Size
- Gobi Aloo Tamatar masala
- Top 20 Most Beautiful Women in the World
- Thought Provoking Questions
- Bachelor Party
- Baby Shower Party Invitation
- Do's and Don'ts on First Date
- Cheesy Scallion Bacon bread
- Chota Alu (Baby Potatoes) Masala
- Lychees-mixed fruit bread pudding
- Baby Shower Decoration
- Baby Shower Party
- Garden Lawn
- First Date Tips
- Rose Day:Meaning of Roses by Number
- Rose Day : Meanings of Roses (By Colours)
- The Okutama Mountains in Japan
- Dating Advice For Women
- Valentine's Day Quotes 2011
- Victims of Drinking
- Volkswagen SUV Touareg
- Valentine Day Gift Ideas
- Crocheted Valentines
- Student Borrowing: University Payment Plans Vs. Fe...
- Using Base Metals As An Economic Indicator
- Rolls-Royce Apparition ... Concept Car ...
- Chicken Patty,Asparagus Stir-fry with Cheese Bread
- The Young Thief and his Mother
- Baby Shower Party Favors
- Baby Shower Party Theme
- Baby Shower Party Planning
- Valentine Week 2011
- The Life Cycle Of Mercedes Benz
- Room Decor Ideas
- Cinnamon Apple Pancakes,Sausages and savory Hashbrown
- Carib Cream
- Baby Shower Party Gifts
- Baby Shower Party Games
- FACTS OF LIFE...... Enjoy Reading..
- Japanese Eco-friendly Electronic Rickshaw
- Healthy Living Tips Without Medicine
- Most Gorgeous Skin Ever In Just 10 Minutes A Day!
- The Difference Between a Computer Virus & Worm
- Improving Your Sales Results - Successful in Makin...
- 2010 Was Not Good For Nokia...
- New Mercedes-Benz, Without Steering !!
- New Car From China - For $600
- The top most dangerous websites for your PC enlisted
- Oil Rig Hotel from Malaysia
- Facebook Tightens User Security
- Creative Food Art
- Banarasi Aloo
- HOW TO : Rename Internet Explorer To Your Name
- Organdi Flower Roses
- Gazpacho with Indian spices and ginger Sherbet!
- Flyaway Plant Pokes Craft
- Microfinance: What It Is And How To Get Involved
- Quotes on India
- Happy Republic Day
- HOW TO : Remove Gmail Web Clips
- 10 Amazing Dangerous Toothpaste Ingredients
- Latest Silk Sarees Designs For 2011
- Paper Cut Art
- World’s Most Expensive Mobile Number
- Latest Salwar Suits Designs For 2011
- Vitamin D Health Benefits
- Useful Tips For A Business Presentation
- Chocolate Exhibition - Hong Kong
-
▼
January
(69)
Categories
- Art (37)
- Automobiles (6)
- Craft (66)
- Drinks / Starters (29)
- Economics (6)
- Fashion (19)
- Festivals (25)
- Finance (45)
- Gardening (16)
- Health and Fitness (39)
- Home And Living (26)
- Humour (62)
- Internet (6)
- Management (49)
- Nutrition (6)
- Other Stuff (66)
- Party (21)
- Quotes/SMS (4)
- Receipes (138)
- Relationship (1)
- Relationships (29)
- Spiritual (26)
- Stories (44)
- Tattoos (39)
- Technology/Science (17)
- Tips (32)
- Travel (6)
Blog Archives
-
▼
2011
(117)
-
▼
January
(69)
- Dating Tips For Man
- Ladies, Know Your Proper Bra Size
- Gobi Aloo Tamatar masala
- Top 20 Most Beautiful Women in the World
- Thought Provoking Questions
- Bachelor Party
- Baby Shower Party Invitation
- Do's and Don'ts on First Date
- Cheesy Scallion Bacon bread
- Chota Alu (Baby Potatoes) Masala
- Lychees-mixed fruit bread pudding
- Baby Shower Decoration
- Baby Shower Party
- Garden Lawn
- First Date Tips
- Rose Day:Meaning of Roses by Number
- Rose Day : Meanings of Roses (By Colours)
- The Okutama Mountains in Japan
- Dating Advice For Women
- Valentine's Day Quotes 2011
- Victims of Drinking
- Volkswagen SUV Touareg
- Valentine Day Gift Ideas
- Crocheted Valentines
- Student Borrowing: University Payment Plans Vs. Fe...
- Using Base Metals As An Economic Indicator
- Rolls-Royce Apparition ... Concept Car ...
- Chicken Patty,Asparagus Stir-fry with Cheese Bread
- The Young Thief and his Mother
- Baby Shower Party Favors
- Baby Shower Party Theme
- Baby Shower Party Planning
- Valentine Week 2011
- The Life Cycle Of Mercedes Benz
- Room Decor Ideas
- Cinnamon Apple Pancakes,Sausages and savory Hashbrown
- Carib Cream
- Baby Shower Party Gifts
- Baby Shower Party Games
- FACTS OF LIFE...... Enjoy Reading..
- Japanese Eco-friendly Electronic Rickshaw
- Healthy Living Tips Without Medicine
- Most Gorgeous Skin Ever In Just 10 Minutes A Day!
- The Difference Between a Computer Virus & Worm
- Improving Your Sales Results - Successful in Makin...
- 2010 Was Not Good For Nokia...
- New Mercedes-Benz, Without Steering !!
- New Car From China - For $600
- The top most dangerous websites for your PC enlisted
- Oil Rig Hotel from Malaysia
- Facebook Tightens User Security
- Creative Food Art
- Banarasi Aloo
- HOW TO : Rename Internet Explorer To Your Name
- Organdi Flower Roses
- Gazpacho with Indian spices and ginger Sherbet!
- Flyaway Plant Pokes Craft
- Microfinance: What It Is And How To Get Involved
- Quotes on India
- Happy Republic Day
- HOW TO : Remove Gmail Web Clips
- 10 Amazing Dangerous Toothpaste Ingredients
- Latest Silk Sarees Designs For 2011
- Paper Cut Art
- World’s Most Expensive Mobile Number
- Latest Salwar Suits Designs For 2011
- Vitamin D Health Benefits
- Useful Tips For A Business Presentation
- Chocolate Exhibition - Hong Kong
-
▼
January
(69)
Recent Comments
Tag Cloud
Tags
- Art (37)
- Automobiles (6)
- Craft (66)
- Drinks / Starters (29)
- Economics (6)
- Fashion (19)
- Featured (5)
- Festivals (25)
- Finance (45)
- Gardening (16)
- Health and Fitness (39)
- Home And Living (26)
- Humour (62)
- Internet (6)
- Management (49)
- Nutrition (6)
- Other Stuff (66)
- Party (21)
- Quotes/SMS (4)
- Receipes (138)
- Relationship (1)
- Relationships (29)
- Spiritual (26)
- Stories (44)
- Tattoos (39)
- Technology/Science (17)
- Tips (32)
- Travel (6)
0 comments for this post
Leave a reply