What Is Malware Types and How They Work?

Various types of mal ware and how do they work?

Mal ware is a general term used for viruses, worms, spyware and other malicious programs that are represented on the Internet. Cause in simple terms, a software that is designed to direct or indirect damage to the computer system referred to as malware.
mal ware, What Is Malware Types of malware How malware virus spy ware ad ware works
What Is Malware

Some malicious programs cause serious problems, such as the destruction of the system files, making or interruptions in the operation of the computer or the collection of sensitive information, while others may have a slight effect, and redirecting to pornographic users annoyed with pop-ups and banners.

In the routine, we would often malicious program that was known as a virus, but this is not correct! In fact, as mentioned above, there are several programs, where the virus is evil. Now many of you may be wondering to know what is the difference between the two. Well, this article contains information about the different types of mal ware that exist, how they work and how they differ:

Computer Virus:

As we all know, this is the kind of malware that has become very popular and is one of the most discussed topics in the field of computer security. A virus is a computer program in order to control unauthorized access to an infected machine to data or system performance degradation will be damaged.

Mode of Spreading:

Computer virus works by attaching a file or existing replicas and spread from one computer to another. In most cases tend to infect executable files that are part of the legitimate programs. Therefore, if the infected file is executed on a new computer, the virus is active and the game caused the damage or programmed into the system.

A virus can not damage his duties and replication, if they can be executed. Therefore, the virus is often choose an executable file as host and stick to it. Viruses are divided into two main types:

Types of computer virus
Nonresident viruses: These viruses are held in conjunction with the host, perform the necessary steps to find and infect other files, if possible, and transfers control to the main program (host). The transaction will be completed by the virus from the host.

The resident virus: For resident viruses when the infected program is executed by the user, the virus is activated, its own replication load module into the memory, and then control returns to the main program. In this case, the virus remains in the memory to find active waiting for an opportunity to infect other files, even after the main program (host) has been completed.


Viruses are known to cause the destruction of data and software. In some cases, a virus can do more than just playing. However, they are for the use of a large portion of the system resources, such as CPU and memory, which affect performance.

Remain immune to the virus, you can check out my other post about 12 tips to keep your computer virus free.


A Trojan or Trojan horse called simply. Kind of malicious program that is disguised as something legitimate and useful The main purpose of a Trojan horse is to win the trust of the users from so that you get the permission for the installation. But the back is designed to offer control unauthorized computer to the hacker.


A Trojan horse does not depend on the host. Thus, as opposed to a virus, it is not prone to attach to other files. Trojans are often used as video codec software, cracks, keygens and similar programs disguised downloaded from untrusted sources. Therefore, care must be taken taken to untrusted websites offering free downloads.

An example of the poplar DNSChanger Trojan was designed to deflect the victim DNS machine. It was by some dishonest pornographic sites as required video codec to view the contents distributed online.


Trojans are known to cause a variety of damage, such as stealing passwords and login data, theft of electronic money, keystrokes, log edit / delete files of user activity monitor, etc.


Worms are spread independently to computer programs with malicious intent from one computer to another. Unlike viruses, worms have the ability to work independently and not to bind to a different program.


Worms often use a computer network to spread by exploiting the vulnerabilities that exist in the different teams. In most cases, the worms are spread only to operate without any serious change in the computer system.


Unlike viruses, worms do not. Damage to the file system and other important programs However, they are responsible for the consumption of bandwidth and expanding network performance.

Spy ware:

Spy ware is a type of malicious software that can collect information about the activities of the target computer without the knowledge of its users. Spy wares such as keyloggers are often used by the owner or administrator of the computer, installed to monitor user activities. This can be a parent tries to his son, who control a company that tries to your employee or someone to spy on your husband / wife has tried to control.


Spyware is designed to fully operate in stealth mode, so that their presence is completely hidden by the user of the computer. Once installed monitor all computer activity, including keystrokes, web activities, instant messaging, etc. These log records are kept secret for later access or download online, so that the installer can access spyware.


In addition to monitoring, no spyware no. Damage to the equipment But in some cases, the affected computer experience performance degradation.


Adware is software that. Automatically displays users without their permission Common examples include pop-ups, pop-unders, and other annoying banners. The main reason for the design of the Adware is to generate revenue for its author.


Adware is usually some free services, such as browser toolbars, Video Down loader, etc. If such programs are installed installed, can take over the adware and redirect the user activity appears annoying ads.


Adware is harmless in most cases. However, it is known that some spyware that can be used to monitor the browsing habits of users are provided. This can be a threat to the privacy of users.

You can keep your distance ad-ware and mal ware. I hope this article informative and useful. Place your comment.
Previous Post
Next Post
Related Posts