Share this question

Welcome to Teachnovice Q&A, where you can ask questions and receive answers from other members of the community.

This is a collaboratively edited question and answer site for computer enthusiasts and power users. It's 100% free, no registration required.

What is different between Worm, Virus and Trojan horse?

0 like 0 dislike
19 views
Can someone please let me know what is different between each of these Worm, Virus and Trojan horse
asked Dec 17, 2017 by anonymous  

1 Answer

0 like 0 dislike
 
Best answer

Worm

Warms are program that runs independently and can replicate them from system to system without the use of host file and it designed to spread itself through network connection.

Warm is different from a virus in that a warm can run itself. Worms generally exist in other files e.g. Word or Excel documents. Worms and viruses use the host file differently.

Different types of Computer Worms.

  • Email Worms
  • Instant Messaging Worms
  • Internet Worms
  • IRC Worms
  • File-sharing Networks Worms

Virus

Virus is a small program which alters the way computer operates without the permission of the user or user knowledge. It could be a program or piece of code which loads on to your computer. Virus can replicate itself over and over again. Viruses are man made. Some viruses are programmed to damage or corrupt data, change data. Others are not designed to damage but to replicate themselves to degrade the performance of your system by utilising resources such as memory or disk space.

Five recognized types of viruses

  • File infector viruses
  • Boot sector viruses
  • Master boot record viruses
  • Multipartite viruses
  • Macro viruses

Trojan horse

Trojan horses are impostors files which are claiming to be something desirable but in fact they are malicious. Normally Trojan horse is an email virus which is release by an email attachment.

A very important difference between Trojan horse and virus is that they do not replicate themselves. Trojan horse must be invited onto your computer by opening email attachment or downloading and running a file from the internet. If opened it will clean your hard drive or steal personal information.

answered Dec 17, 2017 by alikhan  
...