Safe computing is akin to safe sex. Don't open e-mail messages from unknown senders. I installed a spam-killer (Qurb) that quarantines every e-mail message from a sender not in my Outlook address book. I can approve or block any quarantined message; approved messages are moved to the In Box and blocked messages are returned to the sender. Sometimes it's tedious, but better safe than sorry. I installed a router and my computer showed up as invisible on a number of tests on Web site that check IP addresses. Finally, I run spyware and virus checks at least once a week. If this is (fair & balanced) paranoia, so be it.
[x Lockergnome]
What's the difference between a "Trojan Horse," a "Worm," and a "Virus?"
by Leo A. Notenboom
Seems like there’s no shortage of confusing terminology in the computer biz. With the advent of computer viruses over recent years, we’ve spawned even more terminology that often seems only to make things less clear.
And then recently it looks like we can’t even spell! I mean, really… “phishing?” What’s that all about?
The good news is that it’s not really that difficult. Let’s run down the terms.
Virus: we've all heard this one too often lately. In a sense, "virus" is the root definition of the things we'll talk about here.
A virus in the human body is an organism that replicates (makes copies of) itself and overwhelms the body's own defenses, making it sick. Human-borne viruses can spread in several ways from person to person. Depending on the type of virus, catching it could be as simple as breathing the same air as an infected person. It might require direct contact, or it might require an even more direct transfer of, say, blood.
The term "virus," when applied to computers, sounds very similar. A computer virus...
...is a program - really, that's all any of this is. A virus is just a computer program. It's written by some individual or individuals, presumably with the intent of spreading and causing grief.
...makes the infected computer "sick" - in the computer sense, "sick" can mean poor performance, crashes, lost files and data, or more.
...replicates itself - just like you can copy a file from one disk to another and now have copies on both disks, a computer virus is, in part, defined by its ability to make copies of itself. Typically the copies aren't on the infected computer, but rather on other computers, which leads us to the last characteristic...
...infects other computers - exactly how depends on the virus, of course, but another key defining point for a computer virus is that it can spread on its own.
Worm: technically, a worm is a virus that does no direct damage to the computer it's infected. In reality, worms can cause a great deal of trouble merely by getting passed from one computer to many others, and can clog up a network very quickly.
Unfortunately, there isn't necessarily agreement on that definition. At least one other resource I've seen states that a) A Worm does cause damage to the infected system, and b) Worms and viruses differ from how they are transmitted: a worm is a stand-alone program, while a virus propagates by attaching itself to another program.
Trojan Horse: a program that claims to be one thing, but is, in fact, another. A trojan horse is not a virus, per se, but may carry them. For example, many people consider Kazaa, the music sharing software, a trojan horse because it carries with it a bunch of spyware. There are trojans that claim to be patches for a problem, often arriving in e-mail, that are in fact spyware and virus installers.
Phishing: I think of phishing as a kind of e-mail trojan horse. It's e-mail that looks like it comes from some official site such as your bank, PayPal, or eBay, but in fact it comes from someone pretending to be them. They'll ask you to go visit a site, or provide some information, looking very official and proper, except that the site is not what you think and the information you give them allows them to steal your credit card or identity.
The bottom line, of course, is that we all need to keep aware of these issues and act accordingly. We shouldn't have to, of course; hackers shouldn't exist and operating systems and other software should simply protect us. But the pragmatic reality of the situation is that we do need to keep our guard up.
What does that mean? How should you protect yourself? It boils down to common sense, a firewall, and running up-to-date anti-virus, anti-spyware tools regularly.
Copyright © 2004 Lockgnome
Saturday, October 23, 2004
The Devil's Lexicon
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
☛ STOP!!! Read the following BEFORE posting a Comment!
Include your e-mail address with your comment or your comment will be deleted by default. Your e-mail address will be DELETED before the comment is posted to this blog. Comments to entries in this blog are moderated by the blogger. Violators of this rule can KMA (Kiss My A-Double-Crooked-Letter) as this blogger's late maternal grandmother would say. No e-mail address (to be verified AND then deleted by the blogger) within the comment, no posting. That is the (fair & balanced) rule for comments to this blog.