Thursday, August 9, 2012

Categories of Computer Problems

Nowadays, computer has become a part of our life. We use it for work, schools and entertainment. But there are also many problems that prevent you from using computer properly. By saying that, I specially refer to computer virus. Just like people getting viruses and becoming sick, computer can also be infected with lots of viruses. These viruses are from the Internet. In this passage, I am going to discuss three main categories of computer viruses.

Category No. 1 - Malware, Spyware and Ransomware

Viruses under this category usually show up on your computer as programs. They often sneak into your computer without permission and then show up as legitimate programs to make you believe what they say. The most common ones are fake antivirus software and fake blocking alerts. Antivirus program is what we have to protect us from all the possible threats from the Internet. Some of us may have installed more than one. Hackers take advantages of this phenomenon to create the malware, i.e. fake antivirus programs. Take Windows Ultimate Safeguard for example. This malware is known to be a member of the famous Windows serial fake antivirus family. It appears on your computer as a legit virus protection tool. But it's unusually aggressive. It can detect many problems inside your computer while others can't. And when you try to remove all the detected viruses and errors, you will be asked to pay for the registered version first. (More information about Windows Ultimate Safeguard virus) In this way, hackers can collect as much money as possible from innocent PC users. The other most common virus would be the fake locking alerts. This kind of ransomware normally locks your computer in the names of laws or countries. By boasting that your online activities have violated related laws, you have to pay certain amount of fines within the limited time in order to unlock your computer. This kind of virus is somehow much more authorized and threatened than fake antivirus software. So many computer users have been tricked by it and paid worthless money.

Category No. 2 - Browser Hijackers

A browser hijacker or browser redirect virus, usually targets at browsers. There are two types of browser hijackers. One is in the forms of websites and the other is add-on tool bars. When a browser hijacker pretends as a search engine, it tries to deceive you by its legitimate appearance that it can provide a lot of interesting contents. But if you use it for your online researches, you will be redirected to unwanted sites where contain numerous viruses. Instead of providing you the real results, a fake search engine gives you fake and hacked websites and links. Other than that, it also forcibly changes your homepage. Rechanging or reinstall browsers do not help to get rid of this unwanted page. (Click here for a browser hijacker especially fake search engine) Add-on tool bars can be seen on almost every browser. They are like shortcuts on your browsers. You can also find wanted contents from the Internet via them. But an add-on tool bar can also redirect you to more viruses and malware. Sometimes when you land on those places, malicious programs can be allowed to auto download and install in your computer to collect valuable information.

Category No. 3 - Trojan Horses

Unlike the above two viruses, a Trojan horse cannot be seen as a program or website. You can only notice its existing from a pop up message or scanning result by antivirus software. Even though it's invisible in form, it's highly dangerous as well! It is believed that a Trojan virus can help other viruses and spyware get into your computer. It normally is quite active in backdoor activities. If you cannot manage to get rid of it in time, it will continue to bring more problems to your computer. It's like the original spring of all kinds of problems. The above two types of viruses can also be brought inside your computer with the help of a Trojan. What's worse, as soon as a Trojan virus injects malicious codes inside your computer, remote hackers can take all over control of the infected computer. They may create a fake system for you to do all the daily activities. Then before you know it, your personal information will be viewed and stolen by them to make illegal benefits.

No comments:

Post a Comment