Solved

difference between virus and worm?

Posted on 2003-10-27
11
2,812 Views
Last Modified: 2008-02-01
what is difference between virus and worm?
0
Comment
Question by:she1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2
  • 2
  • +2
11 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9630756
0
 
LVL 21

Accepted Solution

by:
jvuz earned 20 total points
ID: 9632868
A virus is a file that cannot spread to other computers unless a infected file is copied and sent manualy to another computer were as a worm just does the opposite:

A worm is a wonderous creation that once in your machine usually copies itself and spreads using, irc, outlook or n e other applicable mailing unit, or as blaster just recently showed us using exploitations in ports on your computer... Usually a worm just uses ur computer as basically a server to spread as fast and silently as it can but others can have payloads attached to them, like a message box, or a deleting of certain files or shutdown of your computer, or just basically crashing your computer... Worms try to hide themselves as best they can(usually) but most of the time get caught really easily(look at blaster)

A virus once executed on your machine infects either com, exe or sys files or a combination of all three... Viruses are alot harder to get off your mmachine or even to get rid of... They have alot less spreading options then a worm does cuz viruses only infect files on ur machine... Usually viruses have a payload after infecting all files a certain number of files a certain time or date or just right after its infection takes place... These payloads differ but can be the same as the worms payloads or worse(i dont know wuts more worse then crashing sum1s machine but there must be much worse i guess)

Now this is pretty rare but sometimes there are combinations of the two.. A virus/worm combination can be EXTREMELY deadly. It can spread like wildfire through your machine and other machines upon which it can have payloads of crashing your computer or a network of computers while spreading to more computers.. There have been a select phew that do these tasks but there still are some out there and are very dangerous... Hope this helped a little bit
0
 

Author Comment

by:she1
ID: 9647439
jvuz:

thanks all of you.
what do you mean payload?
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 21

Expert Comment

by:jvuz
ID: 9648408
You can read it as "trouble"
0
 
LVL 6

Expert Comment

by:akboss
ID: 9682264
Various virus's, worms and backdoor programs use something as a distraction while the payload(program) is being downloaded.

Several use a large jpeg picture as the distraction .
This was the way back orifice was placed onto a computer .
0
 
LVL 1

Expert Comment

by:Mal-Tech
ID: 9822823
Basically today there is no distinction between a virus and a worm. Both infect a system, both carry out whatever commands they've been instructed to do, when they've been instructed to do it (payload) and both propogate to infect other systems via email (most common), operating system and application flaws, site coding and infected files.

A trojan horse, by nature, does not propogate. It is joined to a program, file or email attachment to allow some type of access to a target system from a remote system.

All three can mix and match, meaning a worm or virus can be programmed to download or drop a trojan horse (backdoor) into a system and a trojan horse can have a virus or worm dropper. An example of this was Blaster, a worm/virus which instructed systems to contact the writer's website in order to become available for access at a later time.

A payload can be a specific action the mal-ware may take at any given time. It can be initiated by a date, an action by the victim, whatever. EXAMPLE: CIH, or Chernobyl, would infect a system, attempt to propogate, delete hard drive contents and then attempt to flash the system BIOS after a period of time, making the system inoperable. It, and it's cousin Kriz, had a neat trick-they would infect files as they were being scanned by an antivirus. The only way to stop them was to download a neutralizing tool to stop the infection, then use the antivirus to remove them.

The next generation of worms/viruses (superworms) will have the ability to tailor themselves to a variety of tasks without intervention from the originating point, meaning they can actively interchange as many different parts to accomplish a variety of different tasks. They will be able to remove parts from themselves and download different and new additions at random. In fact, they will have the ability of changing themselves to the point that they no longer carry a recognized footprint and thus, become a new variant or the original. The potential is only limited by the writer's imagination and number of available downloads. This has been accomplished to some degree, but has not been initiated on a more complicated scale.

0
 

Author Comment

by:she1
ID: 9822920
what is  

"backdoor programs" ,?
 "distraction"?
  payload(program) ?
0
 

Author Comment

by:she1
ID: 9822921
what is  

"backdoor programs" ,?
 "distraction"?
  payload(program) ?
0
 

Author Comment

by:she1
ID: 9822929
thaks lot for all the help!
0
 
LVL 6

Expert Comment

by:akboss
ID: 9825988
backdoor programs are also known as trojan horses, and this is really simplified, they are just programs that let another user(aka scum) into your machine while your on the internet. Back orifice is one such program. It started out as a useful tool to allow a tech to look into your computer while you were using it. The tech could then see what problems you have been complaining about first hand without having to stand over your shoulder. Once the program was taken over by the forces of no good it turned into something that allowed another to scan your files,change what you were doing at the moment(such as typing a letter), or just delete things.

a distraction would be where you get an email that has a large picture file attached to it. Usually it is a picture of a naked woman or some such(hench the distraction part). While you sloooowly downloaded this picture it also ran another executable placing a worm/virus/trojan on your machine.

payload is the code that is being loaded onto your computer(worm/virus/trojan).
0
 

Author Comment

by:she1
ID: 9829229
akboss:

thanks lot , it is really helpful.

but I could not break the point now , I don't know why.
I have to give all the point to  jvuz

thanks for all of for great help to make this site a great place
to post
0

Featured Post

Create Professional Looking Email Signatures

Create "Professional HTML Email Signatures" with ease.
7 Day Money Back Guarantee if not 100% Satisfied.
Affordable - Try it out for 7 Days Totally Risk Free.
Installers provided for over 45 Email clients.
Both Windows & MAC Supported.
Highly Recommended!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question