[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Viruses, Trojan Horses, Worms, etc - differences

Posted on 2007-12-06
6
Medium Priority
?
308 Views
Last Modified: 2010-04-11
Friends,

I've always wondered what the differences are between all of the widely-talked about (and probably overhyped) computer "sicknesses"

I was hoping someone who knows could possibly compare and contrast between virus, trojan horse, worm, and whatever else is supposed to be out there!

Regards.
0
Comment
Question by:Koraxen
  • 4
5 Comments
 
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421606
0
 
LVL 17

Accepted Solution

by:
Shanmuga Sundaram earned 500 total points
ID: 20421625
if you are intrerested in knowing about Trojan Horse story then for more information about trojan horse and its story http://en.wikipedia.org/wiki/Trojan_War
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20615349
Forced accept.

Computer101
EE Admin
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Experts Exchange expands question security options for members.
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question