|
|
but, what are they for real? Well, they are
harmful software that have as a goal to
double themselves, this is why they are
considered as true codes. At first, they do
not affect the
operative system they are
infecting, what they do is to consume
important system resources, such as the
virtual memory, this makes ordinary tasks
excessively slow because they use most of
the broadband, making the surf in the web
impossible.
The difference between most
viruses is that
Worms are able of spreading themselves
without having to camouflage or hide in
another program or software, however, Worms
do not destroy the information in our system
or erase any kind of file, although lately
some sort of hybrids have been found, and
apparently they are able of having
properties of other
common viruses.
|
|
The greatest problem caused by
viruses is
their capacity of flooding, even blocking
the normal traffic in the net, this happens
because they consume the resources of the
operative system. Their usual way of
spreading is through Mail, SMTP, IRC or P2P,
Worms are able in infiltrating without the
user�s intervention and using only the
Internet or any other storage method. |
|
 |
Many of these
Worms have particular
properties that involve their activation
when sending an e-mail to someone and
infecting the receptor, they can even infect
our whole address book through
e-mail,
spreading itself to more and more people,
which is why they are known as the
informatics flu.
|
|
Tricks for deleting computer worms:
To solve this, there are many
antivirus
software capable of eliminating them completely, that is the
case of avast
(http://www.avast.com/esp/download-avast-home.html), which
supplies every kind of solution for these little programs ;
there is also aVG (http://free.avg.com/), well known for been
implacable when scanning the PC; antivir
(http://www.free-av.com/), this antivirus software, besides
destroying any Worm, protects your PC against any other harmful
software.
another software, which is more specialized in Worm
attacks, is Coolwebsearch (http://www.coolwebsearch.com), which
is in charge of deleting Worms and unwanted advertisement.
|
|
The final advise I would recommend besides
installing any of the antivirus software listed above, is that
before you open any file with unknown attachments, from any
sender, Pendrive or downloaded from the web, be sure to scan it
with your antivirus software. You should also be careful with
the following extensions: 386, aCE, aCM, aCV, aRC, aRJ, aSD,
aSP, aVb, aX, baT, bIN, because they are usually some
web worm.
Last but not least, do not forget to keep your
antivirus
software updated and also remember to scan your PC as often as
possible, because been prevented before any possible threat is
better than suffer the damages.
Tags:
computer worm,how
computer worms work,free
computer worm removal programs,worm
history,free
computer worm software protecting,computer
infected with worm,computer
worms,how
computer worms work
|
|
|
|
|