Saturday, March 27, 2010

Rootkits, Trojans and Worms Made Simple

Almost every computer user is aware of these terminologies. In fact, most of the people have fear in their mind about these terminologies. Not only this, but even the IT personal speak very loosely about rootkits, worms, viruses and Trojans. Most people will take hold of and recognize it in a better way, if they get basic knowledge about the simple concepts. Furthermore, another area confused is the difference between spy-ware and viruses. The easiest and simplest difference between the two is viruses are intended for damage whereas the spy-ware is out with the purpose of commercial gain.

A computer virus is malicious code that replicates itself and tries to damage your machine devoid of your consent. On the other hand spy-ware makes use of your machine for manipulating and code watching. Actually, in technical terms, a worm is not a Trojan neither a virus. It is usually seen that people always get tangled between worms, Trojans and viruses. They actually differ in the way they enter your PC.


We will see one example to make this concept clearer. Take your USB. If you use it for some time in internet café then chances are there that someone will get the access to it. Also someone can try to leave some type of auto-start programs in it. Afterwards, when you come to know that your USB is lost and if you go to the café to check it and take it your home. When you check it on your machine, then it is like a Trojan and not a spy-ware or virus. The problem actually lies in what is in it.  

Actually a worm tries to make use of an access technology on your system generally remote procedural Call (RPC). The worm finds your system if it is searching for your IP address. It searches your system by means of a unique id of your computer. If your system is vulnerable to its search then your system is at high risk from worms. However you should keep in mind that this is not the spy-ware or virus. The actual problem is there if it knows that your system is vulnerable. If so it will drop or send the exploit code to your system. Actually few worms can be termed as Trojans.

As the name implies the root-kits simply access the roots of your system with kits or multiple codes. The root-kit is intended for manipulating your operating system to accept a virus of spy-ware. Therefore, Anti-Viruses cannot find them as they appear to be a part of the operating system. Install and use anti-virus programs. These programs look at the content of the file, searching for specific patterns that match a profile, called a virus signature, something known to be harmful. For each file that matches a signature, the anti-virus program typically provides several options on how to respond, such as removing the offending patterns or destroying the file. Update anti-virus program regularly.

It is actually necessary for handling Trojans, viruses, worms and spy-ware, to have basic knowledge about all of them. If you are facing any problems regarding any of the malicious code, then Save My System can be best solution for you. We provide services for data recovery, computer repair and wireless network. For further details visit our London IT security services site.