Skip to main content

What is malware and how to remove it


What is Malware?


Many of us don't know the difference between viruses and malware and what the purpose of them. We think virus and malware are different than each other.  However malware is general term that includes viruses and we need to know which tool is beneficial for which malware. Malware not only includes viruses but further consist of worms, Trojans, adware and spyware. Any software which is used to damage the computer is called malware. It may be by exploiting some behavior of any software or by sending the information from a computer to any unauthorized person.

Viruses:

Viruses are malware that multiply themselves and make data corrupt or block user from taking particular actions that they otherwise would be allowed to take.

Spywares:

Spyware is software program that is used to collect data about the user of the system which may include sensitive information such as bank account, credit card or mobile number without the person’s knowledge and then send such information to the hacker. The hacker after getting these information might misuse them himself or sell these to others.

Adware:

Adware is software that collects advertising information and other marketing data without the person knowing it and sends the information to marketing websites. It also displays undesirable or unwanted advertisements.

Trojan:

Trojan is any malicious computer software which is used to hack into a computer by deceiving user of the computer. It deceives the user by representing itself as a non-harmful thing. They work by creating a backdoor for victim’s PC which gives hackers access to the system. This results in the sensitive information or data inside the victim’s computer being compromised.

How does malware enter your PC:


The malware may enter your PC by means of you downloading software from unauthorized or unsafe websites such as torrents or illegal or nulled software. It might also get downloaded from your browser through popups. Another way that you might get malware is through any spam email that has a link to malicious software as an attachment to that email. When you click the link the malware gets downloaded and installed on your system.

How can you remove and protect from it?



To protect your system from all those scenarios mentioned above and many others that result in installation of malware in your system, you need to always have antivirus installed on your system. Apart from antivirus which protects against viruses you need to have anti-malware installed as well. That protects you from threats such as adware, spyware, worms and Trojans. It is recommended that you use both antivirus and anti-malware to protect your PC from both viruses and malware

Comments

Popular posts from this blog

HCI: Research Topic Ideas

I was reading an interesting research paper (Personal Tasks at Work: An Exploration, ACM 2017) in which the writer talks about the personal tasks that we have to do at work such as scheduling appointments, paying electricity and other bills, etc. The problem at first seems to be a social science one which has nothing to do with computer science but when looked closely the problem highlights an important aspect of our daily life that has to be sorted out using technology. The paper basically discusses those tasks and categorizes them based on frequency of occurring based on a survey. So, for example out of the 93 people who participated in the survey presented in the paper, 51% reported a need for scheduling an appointment while 33% have to coordinate their personal activities. Some will say (specially management science guys) that few of the problems can be solved by proper time management but remember that the purpose of technology is to make life easier for humans. Also, not every …

Simplified DES Example: Step by Step

Simplified DES or S-DES is an encryption algorithm which follows feistal cipher structure. In this tutorial, we will take an example of S-DES. Let’s get started.
We need plaintext and key to start with. For this example, let’s consider 01001000 be the 8-bit plaintext and 1110001110 be the 10-bit key.
Key Generation: The first step in S-DES process is key generation. From the 10-bit key that we give as input, it generates 2 1-bit keys called k1 and k2. Following is the process:
1.Pass the 10-bit input key into the P10 table:
3 5 2 7 4 10 1 9 8 6
This gives: 1011001110. (For example, take the 3rd bit from input key which is 1. It becomes the first bit for our new key) 2.Divide the new key into two halves and left shift each half’s bits by one. So by dividing we get 10110 and 01110. We perform left shift so the left most bit becomes the right most bit and remaining each bit is shifted to its left. This gives: 01101 and 11100. Or you can think of it as the left most bit is taken to the righ…

Cyber Security Awareness: for Employees

The insecurity of data and information that exists on the internet and computer networks has been a major issue for a number of businesses, organizations, and institutions; which don't invest on network and internet security training and awareness programs for their employees. Ideally, most employers rush to invest in new and expensive technologies in the name of protecting their companies online, not knowing that in most cases, the safety of a company online largely depends on the cyber security awareness of the employees. Consequently, your company's protection online starts by ensuring that your employees are well equipped with basic network safety practices and policies, so that they can assist in keeping your computers and networks safe from cyber-attacks that come in form of a virus, malware, and cyber-crime.

Different Ways to Create Cyber Security Awareness to Your Employees:
1.Authentication
The most basic network security measure that your employees need to use is a pass…