Get Started. It's Free
or sign up with your email address

1. Is any software intentionally designed to cause damage to a computer, server or computer network.

2. TROJAN HORSE In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

2.1. DDoS: A sub sect of backdoor Trojans, denial of service (DoS) attacks are made from numerous computers to cause a web address to fail.

2.2. Rootkit: Programmed to conceal files and computer activities, rootkits are often created to hide further malware from being discovered. Normally, this is so malicious programs can run for an extended period of time on the infected computer.

2.3. Backdoor: These are created to give an unauthorized user remote control of a computer. Once installed on a machine, the remote user can then do anything they wish with the infected computer. This often results in uniting multiple backdoor Trojan-infected computers working together for criminal activity.

2.4. Exploit: Exploit Trojans are applications that seek security vulnerabilities of software and operating systems already installed on a computer for malicious intent.

3. BACKDOORS Backdoor is an undocumented way of gaining access to a program, online service or an entire computer system. A backdoor will bypass normal authentication mechanisms.

4. WORM A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

5. VIRUS A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

5.1. Type of virus: 1.Boot Sector Virus. 2.Web Scripting Virus. 3.Browser Hijacker.