Virus
Back Door Attacks
A back door attack is where it targets the weaknesses in the server software that is running on your computer.
Whitehat Computer Hackers
Whitehat computer hackers look for flaws in the software and try to fix them or attempt to break into their computer to destroy their security.
World Wide Damage
Damages from just one virus (The I Love You Virus) are estimated at $10 billion dollars
Defence Against Attacks
Even if you are not Whitehat hacker there is a lot you can do to defend your computer against attack. Defending against front door attacks means being careful about what programs you run and what attachments and links you open. Defending against back door attacks means knowing what services are running on your machine and keeping them patched.
Computer Virus
A software is capable of causing great harm to files or other programs on the same computer.
Anti-Virus
Anti-Virus is used to keep viruses from accessing your files and damaging them and even corrupting your data.
Blackhat Computer Hackers
Blackhat computer hackers secrets in the software to exploit them or hack into the computer for malicious reasons.
Worm Virus
It is a computer virus that makes many copies of itself resulting in consumption of system resources which slows down or actually halts tasks. A worm virus often uses a computer network to spread itself. It relies on security failures on the target computer to access it. It doesn't need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Recovering from attacks
No matter how careful you are it is still a good idea to prepare to recover from an attack if one does occur. Back up personal data and keep track of software installed.
Antivirus Software
Norton AVG Avast
Self-Replicating
Self-replicating software is a type of software that will copy itself throughout a computer system.
Server Software
Server software is a software that listens for requests and arrives over the network.
Malware
Software designed to infiltrate or damage a computer system without the user's informed consent. Software that is intended to damage or disable computers and computer systems. Malware, short for malicious software, its software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.
Spyware
Spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user. Software that self-installs on a computer, enabling information to be gathered covertly about a person's Internet use, passwords, etc. "Spyware" is mostly classified into four types: system monitors, trojans, adware, and tracking cookies. Spyware is mostly used for the purposes such as; tracking and storing internet users' movements on the web; serving up pop-up ads to internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect.
Trojan Virus
The Trojan virus hides inside other software, usually as an attachment or a downloadable file. Also a Trojan virus is something that usually hides in a file or in some downloadable files.Trojans do not attempt to inject themselves into other files like a computer virus. Trojan viruses may steal information, or harm their host computer systems.
Front Door Attacks
The user is tricked into opening the front door for the attack for their action.