ANSWERS: 11
  • http://www.geocities.com/johnniemccoy/virusinfo.html http://www.geocities.com/johnniemccoy/danger.html I hope this helps.
  • A virus is what you might get if you don't wear a trojan. ;-) Just kidding, Trouble's articles explain it well.
  • well a trojan lived in rome, and a virus lives everywhere!! lol
  • A Trojan is a program that may appear to be legitimate, but in fact does something malicious. Trojans are often used to gain backdoor access - that is to say remote, surreptitious access, to a user's system. Trojans do not replicate as viruses do, nor make copies of themselves as worms do. These are sometimes referred to as Remote Access Trojans, or RATs. >> A parasitic program written intentionally to enter a computer without the users permission or knowledge. The word parasite is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some virus's do little but replicate others can cause serious damage or effect program and system performance. A virus should never be assumed harmless and left on a system." -Symantec A functional definition of a computer virus must include the fact that it creates damage to the computer system "infected"; either inadvertently or deliberately. This definition is somewhat simplified and does not cover all virus types, but is sufficient to show the major differences between viruses and so-called "Trojan" programs, which is that the virus replicates, but the Trojan program does not.
  • Tojan is a type of virus its risk impact is high there is no difference in trojan & virus
  • i virus infects you're computer, stops it from working properly. a trojan is used to gain backdoor access to a user's system.
  • One protects against desease, one IS one.
  • Trojan are impostors—files that claim to be something desirable but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojan horses contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must invite these programs onto your computers; for example, by opening an email attachment or downloading and running a file from the Internet. Trojan.Vundo is a Trojan horse. A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria: It must execute itself. It often places its own code in the path of execution of another program. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike. Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.
  • Hello. Hope you are fine. A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail. What Is a Trojan horse? A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Thank you.
  • A Trojan is a program that is usually thought to be something good and then you run it and it installs malicious programs on your computer, usually back door capabilities, add pop ups, and other nasty programs. A virus by definition is a program that gets on your machine that injects its code into other files, so when you run one of the infected files on a non infected system it is now on that system as well.
  • One is for the prevention of the other.

Copyright 2023, Wired Ivy, LLC

Answerbag | Terms of Service | Privacy Policy