Solved

Viruses, Trojan Horses, Worms, etc - differences

Posted on 2007-12-06
6
302 Views
Last Modified: 2010-04-11
Friends,

I've always wondered what the differences are between all of the widely-talked about (and probably overhyped) computer "sicknesses"

I was hoping someone who knows could possibly compare and contrast between virus, trojan horse, worm, and whatever else is supposed to be out there!

Regards.
0
Comment
Question by:Koraxen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
6 Comments
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421566
0
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421572
0
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421606
0
 
LVL 17

Accepted Solution

by:
Shanmuga Sundaram earned 125 total points
ID: 20421625
if you are intrerested in knowing about Trojan Horse story then for more information about trojan horse and its story http://en.wikipedia.org/wiki/Trojan_War
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20615349
Forced accept.

Computer101
EE Admin
0

Featured Post

Scamming the Scammers!

Have you ever heard of Scam Baiting?
It's a highly entertaining sport that you can participate in.
Introduction to beating scammers at their own game and how you can help
Share your thoughts, ideas and experiences on the topic.
Links to top Anti-Scam resources provided.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question