Viruses, Trojan Horses, Worms, etc - differences

Posted on 2007-12-06
Last Modified: 2010-04-11

I've always wondered what the differences are between all of the widely-talked about (and probably overhyped) computer "sicknesses"

I was hoping someone who knows could possibly compare and contrast between virus, trojan horse, worm, and whatever else is supposed to be out there!

Question by:Koraxen
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421566
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421572
LVL 17

Expert Comment

by:Shanmuga Sundaram
ID: 20421606
LVL 17

Accepted Solution

Shanmuga Sundaram earned 125 total points
ID: 20421625
if you are intrerested in knowing about Trojan Horse story then for more information about trojan horse and its story

Expert Comment

ID: 20615349
Forced accept.

EE Admin

Featured Post

Scamming the Scammers!

Have you ever heard of Scam Baiting?
It's a highly entertaining sport that you can participate in.
Introduction to beating scammers at their own game and how you can help
Share your thoughts, ideas and experiences on the topic.
Links to top Anti-Scam resources provided.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question