Write Articles A community of people who love to write

The easiest domain name (Note the .ORG) - Absolutely Free!

Home | Submit Articles | Login   

Most common sources of sources of Malware (Computer Virus and Spyware)

BY: Deena David | Category: Technology and Computers | Post Date: 2009-11-23

•    Read Comments

•    Print This Article

   Deena David
Help others find this article:

Show All Social Bookmarks

Malware is a term that causes every internet user and the proud owners of computers to shudder. This is because of the fact that these malware which can also be considered to be viruses have made life very difficult for many people. Almost all the computers that are connected to the internet are at a very high risk f getting infected with malware. This is because the virus can get downloaded from the various applications on the internet. The various common sources of malware are:

1. Internet games:

Internet games are one of the main sources of malware. This is because of the malicious work of the creator of the game. The person may want to get the virus to spread and realizes that the best method of doing this is to get the virus attached to a game. The people who play the games will also be loading the virus into their computer when they install the game. Slowly the virus starts its own actions on the various files on the computer and corrupts them too.

2. Free ware:

Other than the games, there are a lot of freeware on the internet that are used by millions of internet users. These people get the free wares loaded onto the computer and along with the freeware, the malware also gets into the system. This is another important source of malware.

3. Programs downloaded from the internet:

Many people use programs that are downloaded from the internet. This may be because these programs may seem essential and they may be offered at a discount or free. This will make the various programs that are having malware in them to get loaded on to the computer. This is another important source of viruses and malware.

4. Connection to an infected system:

There are many companies and organizations where all the computers that are in the company are all attached through LAN. When the computers are attached to each other, there is a high chance that if one computer is infected then all the other computers in the network will also get infected with the virus. This is the reason for most LAN connected networks asking the users to avoid using various removable discs in their computer. Instead, a master computer is present where the users can download and use various removable drives and discs. This reduces the chance of having the malware spread to all the computers.

5. Portable drives:

This is another important source of malware. There are many people who use various kinds of portable devices including pen drives, compact discs and even removable hard discs. There is a risk of the malware from one computer spreading to other computers through these devices. This should be avoided because they can infect all the computers in which they are used. Even these portable devices should be screened for virus as frequently as possible to prevent the chance of spreading the virus and malware.

These are the most common sources of malware and adequate protection and care should be taken before installing or downloading various programs from these sources.

Article Source: http://www.saching.com

About Author / Additional Info: I have completed my Masters Degree in Paediatric Nursing. I am a writer with a passion for writing. I have been writing for some blogs and other sites. Comments are welcome at the following e mail address: deenaanddavid@gmail.com

Additional Articles:
* Jealousy in Relationship
* Impact of Modernization and Westernization on Indian society
* Enjoy cooking food - How to get into a good mood to cook food
* What is Acne - Types of Skin Acne
* How to clean the teeth of babies.

Does this article violate or infringe on your copyright ?
It is a violation of our terms for authors to submit content which they did not write and claim it as their own. If this article infringes on your copyrights, then use our Contact us form with the detailed proof of infringement along with the offending article's title, URL and writer name. If you do not hear back from us then contact us again in another 10 days. Thank you.

Comments on this article: (0 comments so far)

* Additional comments are now closed for this article *
Comment Comment By Comment Date

Article Views: 8158

Page copy protected against web site content infringement by Copyscape
Copyright 2010 saching.com - Do not copy articles from this website.

Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.

| Home | Disclaimer | Xhtml |