The most common at the moment type of malware. Sent with emails.
Disguised as a variety of useful files, or important messages. An inexperienced user who received the e-mail and not paying attention to the second file, or to an unknown postal address, opens a subdocument or image, and thereby launches a virus program.
Worms are widely used vulnerabilities in the form of critical errors mail programs and browsers.Have a very high ability to reproduce, but at the same time, other programs do not impress and their source code is not modified.
Kind of malicious program which by their harmless appearance penetrate to the user's computer. Can be implemented in the form of a program with meaningful and useful, at first glance, functionality, but actually harmful and damages.
Trojan may send to its Creator through a Network sensitive information as passwords or credit card numbers or gives you the ability to remotely control the infected machine.
Most often disguised under a variety of key generators and "lomalka" for paid programs or are sent by e-mail as attached files with biting and intriguing phrase like "so-and-so artist did this vile act".
Some Trojans send yourself an email through letters, and a particularly nasty Network download from gigabytes of junk, viruses and files for obscene content.
A program designed to hide traces of the attacker or malware on another computer.
Deeply embedded in the system and hardly detected by antivirus software. In most cases, to remove rootkits is by using the highly specialized program, and sometimes you end up formatting the flash drive or the system partition and reinstalling the operating system.
These viruses are invisible by intercepting calls to the operating system partially or totally conceal its presence in the system of infected machine. Intercept treatment for access to sector-by-sector disks, read-set or write position in the file
Detected and neutralized by booting the computer from the CD or DVD containing antivirus program.
Malware that allows you to secretly control your computer. At its core, open the back door to the attacker on another computer.
Know how to copy files from the infected computer and give the attacker remote access to the registry operating system.
Very dangerous because it can use the computer of the unsuspecting user to network attacks and hacking networks.
Originally developed as a keyloggers to capture information about the pressing of keyboard keys.
Modern keyloggers are able to capture information from software Windows, capture mouse clicks, monitor clipboard, take snapshots of the screen and active Windows, record all email, to monitor system registry, intercept jobs sent to the printer, to capture audio from a microphone or images from a webcam.
Detected and neutralized by special programs anti-spyware.
To reduce the amount of work for antivirus programs be sure to turn off your computer autorun flash drives and optical media.
Every day a growing number of viruses and malware that are expanding their own functionality and are closely intertwined with other types of viruses. But despite this, computer viruses can successfully resist, knowing their types, methods of infection of the operating system and using anti-virus software!