Every computer owner heard about computer virusescomputer connected to the global Internet. If users with experience have at least some idea of ​​the possible danger emanating from such malicious programs, then among the newcomers there are two opposite beliefs. According to the first, "computer virus" can be picked up only by regulars of sites for adults and fans of hacked programs, so you can not really think about what network worms and other malicious codes are. Usually on computers such users do not have any anti-virus software (except for the system one). Others, frightened by stories of virus scavenging the contents of the BIOS chips, stealing passwords to bank accounts and so on, are afraid of once again connecting someone else's flash drive to their computer. Often such users have several antiviruses installed at once, with duplicating functions (protection is similar to cabbage). But the truth, as always, somewhere in the middle.

The effectiveness of any recommendations is much higher,if a person understands the meaning of their actions, and not thoughtlessly follows the written. Therefore, today we will consider what are computer viruses and, in particular, network worms.

A virus is a computer program capable ofindependent cloning of its code ("reproduction"). It spreads through communication channels or by means of information carriers. Carefully hides the fact of his presence. Performs various malicious actions - corrupts information, passes confidential data to its creator through the global Network, etc. The list of actions is huge. Infection of the computer occurs at the start (opening) of the file, in the structure of which the virus code is contained.

Among all varieties of viruses of a separateattention requires network worms. The peculiarity of such programs is that some of their types (batch) are capable of infecting a computer that is simply connected to the Internet - the user has nothing to start and do not need to open. Network worms are a type of malware, the feature of which is the active use of local and global networks.

For its distribution uses two methods:

  • the user runs the infected file independently. This can be an advertising email, a file with a modified extension, etc .;
  • using errors in operating systems and open ports, the network worm can get into the computer's RAM and hard disk.

Further actions after infection depend ontasks for which the worm was created. Surely everyone has heard the term "botnet". Its meaning lies in the fact that the creator of a malicious program through the Internet can manage network requests of infected computers. If necessary, he gives the control command to all copies of his network worm. As a result, traffic from infected computers is redirected to a particular network resource. Because of the huge number of one-time requests, the resource stops its work (DoS attack).

In addition, the constant scanning of otherscomputers in the network to infect them causes an increased load on computing power, takes away part of the Internet channel for their needs. Some versions of worms, hitting the computer, download the Trojan program. In this case, it is a complex infection.

Network worms are quiteit is always necessary to have antivirus protection with an effective proactive module. This protection does not involve the search for infected files on the storage medium, but the tracking of suspicious actions of all programs in RAM.