Different Kinds of Malware and Spyware and Viruses

Different Kinds of Malware and Spyware and Viruses

The high-tech world of computing presents multiple challenges such as how much RAM to purchase, what operating system to install, and how to avoid malware, spyware, and viruses. Herein we present a brief compendium of nasty software that hardly anyone wants on their computer. Read on to learn about several different kinds of programs causing mass problems in the universe of digital happenings.

Malware

Malware is a category of software programs that negatively impact the operation of your computer and are typically installed without your consent. Devious computer programmers create programs to do evil things such as:

  • Capture your keystrokes and relay them to a remote computer,
  • Monitor your Internet browsing activity and insert relevant advertising windows to sell you stuff,
  • Use your Internet connection to send spam email to unsuspecting recipients,
  • Store files on your computer for other people around the world to access, and
  • Steal your files for the purpose of obtaining personal information about you.

The simplest (and only) way to keep a computer 100% secure is to never connect it to the Internet. Short of that, knowledge is power. "Know your malware" should be the mantra of every computer user from Sacramento to Schenectady.

What kinds of Malware Threatens Your Computer?

Malware variants proliferate virtually every day, but a few obvious strains should be familiar to responsible computer users. Here are a few things to look for.

Foulware

Overview: Your computer becomes part of an Intranet connecting hen houses throughout Iowa and Indiana.

Symptoms:

Residue: Look for cLuCk.dll in in your Program Files folder.

Removal: Go outside and play. Wash your car. Introduce yourself to your neighbors.

=======================================

Palware

Overview: Your computer becomes part of an international social network interconnecting millions of user who otherwise would be able lead normal lives. Your twitter account fills up with messages from people you've never heard of who insist on telling the world how long the line might be at the local Starbucks.

Symptoms: Hundreds of new icons appear in your taskbar for each of the social networking apps installed on your computer. Everyone in the world seems to know what you're doing before you do.

Residue: Scan your My Documents folder for text files exactly 140 characters long.

Removal: Go outside and play. Buy a Frisbee, mow the lawn, take up fishing.

=======================================

Cowlware

Overview: Your computer becomes part of the Gotham City emergency response network.

Symptoms: When crime rears its' ugly head, your screen saver becomes a Bat Signal. Any attempt to play online poker results in nothing but jokers.

Residue: Look for registry entry [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\riddlerEnabled].

Removal: Go outside and play. Learn to play tennis. Borrow a kayak. Rake your leaves.

=======================================

Owlware

Overview: Your computer becomes a mouse server for raptor birds in your neighborhood.

Symptoms:Your Internet browser pops up ads for hamster accessories. You begin receiving unsolicited emails from the Sierra Club.

Residue: Mouse droppings in the power supply will no longer be a problem.

Removal: Go outside and play. Count the stars in the sky. Sweep your driveway.

=======================================

Conclusion

Be painfully aware of different kinds of malware and spyware and viruses and how they might infest your computer.

More by this Author

  • The Importance of Doing Laundry
    19

    We could nag, but this is better. It is less work for us to use the words of others to emphasize the importance of doing laundry. Besides, if you saw the way we dressed, you'd laugh your mouse off.

  • EDITOR'S CHOICE
    Data Hiding in Java
    12

    Data Hiding is an aspect of Object Oriented Programming (OOP) that allows developers to protect private data and hide implementation details. In this tutorial we examine basic data hiding techniques in Java.

  • EDITOR'S CHOICE
    Introduction to Windows Notepad
    5

    A useful text editor is an essential component of any personal computer. Every day we need to make notes, compose documents, and record vital pieces of information. We depend on our text editor. Microsoft provided...


Comments 9 comments

Apostle Jack profile image

Apostle Jack 6 years ago from Atlanta Ga

You said it well.I neesed to hear that.


Tom Whitworth profile image

Tom Whitworth 6 years ago from Moundsville, WV

nicomp,

Do you mean I can't just leave it to Norton?


nicomp profile image

nicomp 6 years ago from Ohio, USA Author

@Tom Whitworth: Peter Norton is my hero!


psychicdog.net profile image

psychicdog.net 6 years ago

Nicomp that horse looks a lot like a trojan - very unusual to see it's got into the potplant rather than your computer


nicomp profile image

nicomp 6 years ago from Ohio, USA Author

@psychicdog.net: I'm as surprised as you are.


nicomp profile image

nicomp 6 years ago from Ohio, USA Author

@ruminator aka susannajade: Hey! Can I have a free backlink?


dabeaner profile image

dabeaner 6 years ago from Nibiru

I would have liked to have seen a bit more detail, such as exactly which version of Windows we should use to best install and run all the malware we may be interested in hosting. In addition, how much disk space should we allot? And, should we set up a separate disk partition so that our malware apps will not be corrupted? How often should we back up our malware apps?

BTW, is there an app for going outside and playing?


nicomp profile image

nicomp 6 years ago from Ohio, USA Author

@dabeaner... Your going outside and playing app should be in firmware: it it's been swapped out to backing storage due to extended idle time, simply stepping out your front door and picking up a hula hoop should trigger a hardware interrupt to immediately reload it.


dallas93444 profile image

dallas93444 6 years ago from Bakersfield, CA

I trust Norton. Works for me... Thanks for the information...

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working