ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web

Different Kinds of Malware and Spyware and Viruses

Updated on August 21, 2010

Different Kinds of Malware and Spyware and Viruses

The high-tech world of computing presents multiple challenges such as how much RAM to purchase, what operating system to install, and how to avoid malware, spyware, and viruses. Herein we present a brief compendium of nasty software that hardly anyone wants on their computer. Read on to learn about several different kinds of programs causing mass problems in the universe of digital happenings.


Malware is a category of software programs that negatively impact the operation of your computer and are typically installed without your consent. Devious computer programmers create programs to do evil things such as:

  • Capture your keystrokes and relay them to a remote computer,
  • Monitor your Internet browsing activity and insert relevant advertising windows to sell you stuff,
  • Use your Internet connection to send spam email to unsuspecting recipients,
  • Store files on your computer for other people around the world to access, and
  • Steal your files for the purpose of obtaining personal information about you.

The simplest (and only) way to keep a computer 100% secure is to never connect it to the Internet. Short of that, knowledge is power. "Know your malware" should be the mantra of every computer user from Sacramento to Schenectady.

What kinds of Malware Threatens Your Computer?

Malware variants proliferate virtually every day, but a few obvious strains should be familiar to responsible computer users. Here are a few things to look for.


Overview: Your computer becomes part of an Intranet connecting hen houses throughout Iowa and Indiana.


Residue: Look for cLuCk.dll in in your Program Files folder.

Removal: Go outside and play. Wash your car. Introduce yourself to your neighbors.



Overview: Your computer becomes part of an international social network interconnecting millions of user who otherwise would be able lead normal lives. Your twitter account fills up with messages from people you've never heard of who insist on telling the world how long the line might be at the local Starbucks.

Symptoms: Hundreds of new icons appear in your taskbar for each of the social networking apps installed on your computer. Everyone in the world seems to know what you're doing before you do.

Residue: Scan your My Documents folder for text files exactly 140 characters long.

Removal: Go outside and play. Buy a Frisbee, mow the lawn, take up fishing.



Overview: Your computer becomes part of the Gotham City emergency response network.

Symptoms: When crime rears its' ugly head, your screen saver becomes a Bat Signal. Any attempt to play online poker results in nothing but jokers.

Residue: Look for registry entry [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\riddlerEnabled].

Removal: Go outside and play. Learn to play tennis. Borrow a kayak. Rake your leaves.



Overview: Your computer becomes a mouse server for raptor birds in your neighborhood.

Symptoms:Your Internet browser pops up ads for hamster accessories. You begin receiving unsolicited emails from the Sierra Club.

Residue: Mouse droppings in the power supply will no longer be a problem.

Removal: Go outside and play. Count the stars in the sky. Sweep your driveway.



Be painfully aware of different kinds of malware and spyware and viruses and how they might infest your computer.


    0 of 8192 characters used
    Post Comment

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      I trust Norton. Works for me... Thanks for the information...

    • nicomp profile image

      nicomp really 7 years ago from Ohio, USA

      @dabeaner... Your going outside and playing app should be in firmware: it it's been swapped out to backing storage due to extended idle time, simply stepping out your front door and picking up a hula hoop should trigger a hardware interrupt to immediately reload it.

    • dabeaner profile image

      dabeaner 7 years ago from Nibiru

      I would have liked to have seen a bit more detail, such as exactly which version of Windows we should use to best install and run all the malware we may be interested in hosting. In addition, how much disk space should we allot? And, should we set up a separate disk partition so that our malware apps will not be corrupted? How often should we back up our malware apps?

      BTW, is there an app for going outside and playing?

    • nicomp profile image

      nicomp really 7 years ago from Ohio, USA

      @ruminator aka susannajade: Hey! Can I have a free backlink?

    • nicomp profile image

      nicomp really 7 years ago from Ohio, USA I'm as surprised as you are.

    • profile image 7 years ago

      Nicomp that horse looks a lot like a trojan - very unusual to see it's got into the potplant rather than your computer

    • nicomp profile image

      nicomp really 7 years ago from Ohio, USA

      @Tom Whitworth: Peter Norton is my hero!

    • Tom Whitworth profile image

      Tom Whitworth 7 years ago from Moundsville, WV


      Do you mean I can't just leave it to Norton?

    • Apostle Jack profile image

      Apostle Jack 7 years ago from Atlanta Ga

      You said it well.I neesed to hear that.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: ""

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)