Trojan Horse

Some viruses have a delayed charge, which sometimes is called pump. For example, a virus may display a message in a day or wait a specific time until it has infected a number of hosts. However, the most negative effect of viruses is their uncontrolled auto playback that overloads all the resources of the PC. Due to Internet, worms viruses today are more common. Antivirus programs, originally designed to protect the PCes against viruses, have been expanded to cover other threats such as Spyware and worms. THAT it is a worm a worm or computer worm is similar to a virus by its design, and it is considered a subclass of virus.

Computer worms are spread from PC to PC, but unlike a virus, has the capacity to spread without the help of a person. A computer worm exploits a file or characteristics of transportation of your system, to travel. The most dangerous worms or worms is its ability to replicate itself in your system, so your PC could send hundreds or thousands of copies of itself, creating a huge devastating effect. An example would be sending a copy of itself to each of the contacts in your address book of your email program. Then, the worm replicates and is sent to each of each of the receivers address book contacts and thus continuously. Due to the nature of copying a computer worm and his ability to travel through networks the outcome in the majority of cases, it is the worm consumes too much memory system (or network bandwidth), making servers and PCs individual stop responding. In recent worm attacks, as the worm Blaster Worm, the worm is designed to tunnel into your system and allow malicious users remotely control your PC. A Trojan is a Trojan computer, Trojan horse or Trojan Horse is so full of dirty tricks as it was the mythological Trojan horse that the name has been taken.