A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
Designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
(often called key logging) Is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based to electromagnetic and acoustic analysis.
A software system that consists of one or more programs designed to obscure the fact that a system has been compromised. Contrary to what its name may imply, a rootkit does not grant a user administrator privileges, as it requires prior access to execute and tamper with system files and processes. An attacker may use a rootkit to replace vital system executables, which may then be used to hide processes and files the attacker has installed, along with the presence of the rootkit. Access to the hardware, e.g., the reset switch, is rarely required, as a rootkit is intended to seize control of the operating system. Typically, rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security scan and surveillance mechanisms such as anti-virus or anti-spyware scan. Often, they are Trojans as well, thus fooling users into believing they are safe to run on their systems. Techniques used to accomplish this can include concealing running processes from monitoring programs, or hiding files or system data from the operating system.Rootkits may also install a "back door" in a system by replacing the login mechanism (such as /bin/login) with an executable that accepts a secret login combination, which, in turn, allows an attacker to access the system, regardless of the changes to the actual accounts on the system.
Rootkits may have originated as regular applications, intended to take control of a failing or unresponsive system, but in recent years have been largely malware to help intruders gain access to systems while avoiding detection. Rootkits exist for a variety of operating systems, such as Microsoft Windows, Linux, Mac OS, and Solaris. Rootkits often modify parts of the operating system or install themselves as drivers or kernel modules, depending on the internal details of an operating system's mechanisms.
A type of malware that is installed on computers and collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs.
malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
A self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to the poor security the computers infected have. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
A form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software, in recent years, has become a growing and serious security threat in desktop computing.
A software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.
A Macro Virus is a virus that is written in a macro language: That is to say, a language built into a software application such as a word processor. Since some applications allow macro programs to be embedded in documents so that the program may be run automatically when the document is opened, this provides a distinct mechanism by which the virus can be spread. This is why it may be dangerous to open unexpected attachments in E-mails.
How to dispose of a PC
HP TRADE-IN PROGRAM : http://www.hp.com/united-states/tradein/howitworks1.html This program enables U.S. federal, state and local government, health care and K-12 or higher education customers to take advantage of equipment market values to purchase new hardware through HP.
HP DONATION PROGRAM: http://www.hp.com/united-states/tradein/donate_howitworks.html If your equipment doesn't have market value, or you just want to support a charity, you can donate your unused or end-of-life equipment to another organization.
HARDWARE RECYCLING PROGRAM: This program enables organizations to deprovision and dispose of hardware that doesn't qualify for trade-in or donation by helping you recycle your hardware.
Data scrubbing (DATA ERASING) Anderson Elite Solutionz provides data wipe services using Department of Defense (DoD)-compliant software that ensures no data can be leaked from your deprovisioned storage devices.
|Criteria/Name||Spyware Doctor||Malwarebytes Antimalware||Spybot S&D||SuperAntiSpyware|
|Download Link||Spyware Doctor||Malwarebytes Antimalware||Spybot S&D||SuperAntiSpyware|
|Initial price *|
|Pricing for household (multiple PCs)||Cheap||Cheap||Free||Cheap|
|Free trial available||Yes, scanner||Yes, no protection||Free product||Yes, no protection|
|Guarantees||Full 30 days||Not found||Free||Full 30 days|
|Protection price||Free, Limited||Paid||Free, Limited||Paid|
|Full protection level||Very good||Limited||Limited||Good|
|Scan speed (items/sec)||1258||467||NA||15|
|Default scan time||~6 min||~5 min||~16 min||~30 min|
|OS integration||Seemless||Minor problems||Good||Poor|
|False Positives||Not noticed||Not noticed||Some||Some|
|For home users||Best||Limited use||Legacy systems||Good|
|For tech repair shops||Limited||Good||Good||Good|
Some third party toolbars that can be added to your browser and / or Window explorer that are known to enhance and personalize your internet & email applications are Adware. These third party toolbars also track all your site visits and reports them back to the toolbar Marketing. This information is then used to 'tailor' a marketing plan targeting you based on your surfing habits, which leads to more popups and more junk email.
If so, then the toolbar that you installed in your computer might contain Adware.