File sharing network worm:
This worm generally proliferates through a shared folder of a machine. It creates a copy of itself and masks its intent by using a seemlingly harmless and unassuming name. The moment youconnect to a networking site like ‘kazaa.com’ and your sharing folder gets accessed, the copy of the worm moves from your computer to other computers in the file sharing network. Withmillions of computers actively being used to access files from peer-to-peer networks, theseworms can proliferate very quickly. Another popular type of worm is the instant messagingworm (similar to the email worm, but uses an instant messenger service as its vehicle).
Trojans are malicious programs that pose as legitimate applications. When users execute such programs, blissfully unaware of their real intent, the host computer gets infected. Once on your computer, it may strike in a variety of ways, ranging from capturing what you see on your screento logging what you type. The captured information is then sent to the author of that malwarethrough the Internet. You could therefore stand to lose precious data, bank passwords and thelike. The different types of Trojans include remote access Trojans, where others can gain accessto and even take over your machine, data sending Trojans that scan your computer and send datato the author, and destructive Trojans that simply delete files on the host computer. Trojans canalso infect your computer and you may face denial of service (unavailability of data). Trojanseven have the potential to counter anti-virus software by changing their coding DNA (a processknown as polymorphism), making it harder to detect. Spyware is also a type of computer application, developed with the intention of stealing information from your computer. Theseapplications can steal data including the history of web sites you have visited, passwords thatyou have used to access online secure services, etc . However, unlike Trojans and worms,spyware cannot replicate but it does exploit the host computer for commercial gain. Theseinclude everything from throwing unsolicited pop-up advertisements, capturing your web browser’s home page and directing it elsewhere.
Adware is more of an annoyance than a threat. Typically found in applications downloaded fromquestionable web sites, it infects the host computer by downloading and installing other advertising material and displaying it on your computer via annoying popups that appear whileyou use Internet applications. This is where adware generally gets confused with advertising-supported software. The latter is not malicious and only displays an advertisement within thewindow of the application program (such as trial or shareware versions of software). Adware, onthe other hand, displays advertisements randomly, often when you least expect it.
The last call:
This new breed of Internet threats may or may not be harmful to users, but they do hamper the performance of computers. To protect computers from today’s digital threats, an anti-virus program is a good place to start. Look for application suites that specifically offer protectionagainst all of these threats and not just ones that offer plain vanilla virus protection. In today’sworld, data security requires blanket protection systems that do it all. You can also install anti-spyware and adware application like NoAdware, ErrorDoctor, Spynukke, AdAware, etc.Secondly, it is important to exercise caution on what applications and files are downloaded. Thisincludes your mail attachments. Chain mails with attachments (such as .exe, .com, .scr, .bat, or .pif), download sites that contain links of questionable web sites, applications that aren’t from