ARTICLES

urplus Computers and Discount Computers Are New...

  After the best sourced advice relating to...

 Digital Cameras Are Fun

 You may have found the best assistance with ref...

 COMPUTER BACKUPS

 Computer Accessories We All Want For Our New Co...

 Computer Hardware Preventive Maintenance Softwa...

 Advice about the best sourced advice relating t...

 Computer Rental: Worth Your Money?

 What is a refurbished computer?

  Advice about the most informative opinion...

 Computer Rentals: The Best Classroom Computer T...

 Are you in search of the most up-to-date assist...

 Have you been looking for the most up-to-date a...

 Finding Cheap Computer Deals to Upgrade Your Co...

 Looking for the latest opinion regarding comput...

  You may have found the latest advice pert...

 When To Rent A Laptop Computer

  If you are chasing the latest help in re...

  You may have found the best sourced opini...

 What You Should Know Before Buying Computer Equ...

 Seeking the most informative advice pertaining ...

  Seeking the best assistance in relation t...

  Looking for the best sourced help regardi...

 What Is Adware?

 Advice about the latest and accurate help conce...

 A Guide To Basic Computer Terminology

 Choosing the best computer model

 You may have found the latest and accurate help...

 Buying a computer

 Top 10 Ways To Protect Yourself From Computer V...

 Building Cheap Computers in 3 Easy Steps

  Have you been looking for the best assist...

 Why Do I Need Anti Virus Software For My Computer?

 Buying a Personal Computer

 Why You Need To Clean Your Windows Registry?

 3 Simple Ways To Save A Bunch Of Money When Buy...

 What are Rackmount Computers? -

 Searching for the latest and accurate help rela...

 Decide On A PC Monitor Before You Buy Your New ...

 Computer Components for Idiots

 5 Sure-Fire Tips for Buying a New Computer

 Advice about the most up-to-date advice with re...

 Three Things You Can Do to Keep Your Computer R...

 The Need for Rackmount Computer Cases -

 A Basic Introduction To Spyware

 Zone Labs vs. Windows XP Service Pack 2 Firewall

 Barebones Systems: Alternatives to Buying Disco...

 Hateful and annoying spywares. Have they infect...

 PC Maintenance and Improving Performance

 Rackmount Computer Keyboards -

 Use A Spyware Remover Now

 Computer Security - What Exactly Is It?

 Three Basic Types Of Computer Mouse

 How to Increase Your Computer Speed Fast

 So You've Never Used A Computer Mouse Before?

 Do The Media Spread Computer Viruses?

 Tips for Buying a First Computer

 The Difference Between Spyware and Viruses

 Do You Know How To Remove Spyware From Your Com...

 Keeping it Clean: Virus Removal Basics

 Notebook or Desktop Computer -- Which Should Yo...

 You Need a Spyware Remover!

 3 Summer Computer Tips

 Ever Used A Computer Mouse Before?

 Computers Are Not Scary

 Build Your Own Computer or Buy?

 Data-Recovery: What You Need

 Advancement in Computer Technology

 Network Security 101

Traditional Antivirus Programs Useless Against ...

 Computer Learning Center for Kids is Committed ...

 Looking after your Computer

 The ABCs Of Computer Memory

 Spyware Programs Are Out To Get You

 Access Your PC From The Road

 What kind of processor do you need on your new ...

 Registry Cleaners: Why do you need one?

 Are They Watching You Online?

 Crash Course In Getting A #1 Google Ranking

 Understanding the Components of a Home Network

 Eliminate computer viruses forever!

 Is Spyware Slowing Your Computer Down To A Crawl?

 Computer Network Installation

 Protect Your Computer And Your Personal Informa...

 Spyware and Adware – Are You Protected?

 How to Avoid Getting Ripped-Off Online

 Getting The Most Out Of A Tablet PC

 How To Remove Winfixer 2005 Plus Unwanted Spywa...

 Guide to buying the perfect PC

 Internet Security Basics 101

 Why Hide Your IP Address?

 Wireless Networks: How Do They Work?

 How Spyware Blaster Can Protect Your Computer F...

 All About Computer Viruses

 Do you need computer training?

 Malware Quiz


Malware Quiz
by: Joel Walsh
Most people who think they know all about spyware, Trojans, viruses, and other malware really don't. Take this quiz to make sure you know who your enemies are.

This quiz tests your knowledge of five of the most common kinds of malware, the software you don't want on your computer: Trojan, worm, virus, spyware, and adware. Keep in mind that there are at least seven other kinds of malware we know about.

The answers are located at the end of the quiz.

1. Which of the following is most likely to make your computer stop working?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

2. Which of the following is not a stand-alone program?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

3. Which of the following is most likely to send spam emails from your computer?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

4. Which of the following is lest likely to be detected with standard antivirus software?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

5. Which of the following is most likely to come with other malware?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

6. Which of the following is bundled with the peer-to-peer file-sharing software, Kazaa?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

7. Which of the following is most likely to install a "backdoor" internet connection?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

8. Which of the following is most likely to be involved in a denial-of-service attack?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

9. Which of the following is the only malware publicly documented as having been employed by the FBI to bring a suspect to trial?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

10. Which of the following is most likely to steal your identity?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware

Answers:

1. c. virus. Trojans, worms, spyware, and adware all depend on your computer staying up and running. They use your computer's resources to accomplish whatever their designer intended, such as sending emails, displaying advertising, or stealing information from your computer. Viruses, however, are usually created by vandals who just want to damage as many computers as possible.

2. c. virus. Viruses are not stand-alone programs. Just as biological viruses must take over the cells of their host in order to function and reproduce; computer viruses must take over one or more files of the computer on which they are stored. Trojans, worms, spyware, and adware are all stand-alone programs that can run without the help of another application, though they often come bundled with other applications as a decoy, or with other malware.

3. b. worm. Worms are stand-alone programs that are often used to send spam emails, or emails containing viruses. Trojans often contain worms which are then installed for the purpose of sending spam emails, but the worms are what actually send the emails.

4. e. adware. In the strictest sense, adware is rarely patently illegal or destructive, and so antivirus software makers have traditionally avoided treating it as malware. Adware designers are usually large advertising companies with hundreds of millions of dollars, and they take care to insert end-user licensing agreements (EULA) that supposedly mean that the software is installed with permission. Also, adware will not usually do anything more destructive than show advertising. Nonetheless, adware can quickly multiply on a computer, hogging system resources and causing a computer to slow down or even malfunction. That's why most anti-spyware software makers target adware as well.

5. a. Trojan. By definition, Trojans bear other malware within them, just as the mythical wooden worse bore Greek warriors. The malware can be viruses, worms, spyware, or adware.

6. e. adware, though d. spyware, is also correct. Kazaa's developers, Sharman Networks, make most of their money from the advertising shown by the included adware. The adware typically runs even when the Kazaa software is not in use. Sharman Networks has adamantly denied that the adware that comes with Kazaa is spyware, since, like most adware, it comes with an end-user license agreement that says the user grants permission for the software to be installed. In reality, few Kazaa users, until recently, were aware of just how much adware was being installed on their machines (as much as a dozen or more). Plus, the adware does monitor your internet usage, and so is spyware in the strictest sense.

7. b. worm. Worms most commonly install a "backdoor" internet connection in order to send out data (for instance, spam emails or requests to remote servers) undetected.

8. b. worm. Worms, which most commonly install a "backdoor" internet connection on the host computer, are perfect for sending out the millions of server requests needed to achieve a denial-of-service attack. A denial-of-service attack is when a server is maliciously sent so many hits that it is overwhelmed and cannot continue to operate.

9. a. Trojan. The Trojan "Magic Lantern" was famously used to install monitoring software on the computer of a suspect who was later brought to trial partly on the strength of the evidence gathered.

10. e. Spyware. Spyware is malware that collects information from your computer and sends it to another remote machine, so by definition any software that steals your identity is spyware. However, spyware is often installed on your computer by a Trojan, or sent to you by another computer infected with a worm, so other kinds of malware pose an indirect threat of identity theft as well.

About the author:
Joel Walsh writes for spyware-refuge.com about spyware, viruses, Trojans, adware, worms, and other malware: http://www.spyware-refuge.com?Computer Viruses[Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "Computer Viruses" OR leave this bracketed message intact.]


Circulated by Article Emporium

 

Google

DISCLAIMER: The content of the site is not produced be me. These are articles i have got from the internet from the various websites. These articles are under GPL license. So I have used these articles without modification

. However, I am NOT responsible for any damages arising due to use of information from this website.
In case you find some incorrect information, then please report that immediately at pctipsntricks@gmail.com