Internet is considered to be the home of viruses, malware, Trojans and other similar threats that are ready to infect PCs. The system is prone to these infections while you are browsing or downloading content online, including web sites, portals, blogs, and others. Today, viruses are adopting different media in addition to the usual e-mails and attachments. These threats enter your system while you open an infected e-mail message or download an attachment. They use these carriers to run on your system and steal important data. They also damage the software, applications, and general operation of the PC.
There are several types of viruses that can easily infect your PC online. Some of them are very dangerous and you should ideally know about their behavior, mode of infection and the damage that can cause.
Taking into account the widespread attack of such threats and let you know about them, have been discussed in this article 5 most dangerous viruses.
Trojan horse of the beast
This is a common and one of the most dangerous Trojans, also known as Remote Administration Tool (rat). As we all know that this Trojan horse is a malicious software that damages or infects a PC only when the virus in this program is executed. Once the virus is executed it makes many copies of itself and spreads in different locations and directories. With this type of propagation, gets your PC under control and begins to steal secret information to records keystrokes that you enter for user names and passwords. This harmful Trojan can also harm to PC with reverse connection. Once detected must be immediately removed from otherwise disastrous consequences may follow.
SQL Slammer
SQL Slammer is a computer worm that is also known as Sapphire. First observed on 25 January 2003, when infected over 75,000 units around the world through the exploitation of the vulnerabilities found in the SQL servers. SQL Slammer is designed to deny service on certain Internet hosts and slow down the general Internet traffic. However, it is a misnomer because it does not use the SQL language, something explodes the failure the buffer overflow in the Microsoft SQL Server, as well as database products Desktop Engine. A patch was later released to control and stop the rampant activities of this virus.
Black worm
Black worm is also known as my wife, Nyxem, etc. is a dangerous virus that typically spreads via e-mail using the external SMTP engine. Black worm moves on the PC along with body different texts, attached files and themes. As a typical worm or Trojan creates several copies of itself and insert to infect the hard disk. It is so cleverly programmed that it infects the hard drive with the name of a legitimate Windows file so that it remains undetected. Once you reach the hard drive begins to corrupt the data stored there. The worst of this worm is that you can also remove or disable antivirus programs if both happen to be in the same directory.
Numbing Nimda
Numbing Nimda worm is highly active computer which is also known as the concept virus. Like other worms Nimda numbing is also capable of creating multiple copies of it and then spreading them as embedded attachments. When the recipient of the corrupted e-mail messages open the particular email, the virus goes through to get PC to the recipient. In addition, this virus can also travel through traffic from the web server, downloads and shared hard disks.
This has been designed to modify documents on the web, as well as executable files that make it much more dangerous for internet users.
Expletive deleted explorer
Expletive deleted explorer also is a computer worm that can delete documents from Microsoft Windows as PowerPoint, Excel, Word files, apart from other documents and important files. This worm sneaks into the PC of the victim via email which usually come from a known user. The file or the file containing this virus shows a fake error message to fool the victim. Keeps on displaying the Inbox of the victim and after getting the right opportunity begins sending replies to several senders.
Brooke M. Perry is a fervent technical partner with online support Qresolve, with wide experience in issues of fixing with PCs, laptops, tablets and smartphones. With a solid history of devising effective ways of security support and online pc system, it has helped me so far thousands of users around the world. His writings on topics of technology are a reflection of his deep interest in and command that takes as a computer support technician. Their blogs and articles have received a high rating for his style lucid, easy to understand language.
No comments:
Post a Comment