Complete Technology Solutions LLC Canonsburg PA

Office (724) 914-1012
Fax (724) 743-0142

The Power Of Technology

Frequently Asked Questions

We will post relevant information as it becomes available

Q: [FAQ Question]
A: [FAQ Answer]

Q:

WHAT IS A VIRUS?

A:

A computer virus is a program – in the form of executable code – that has the unique ability to replicate. Similar to biological viruses, computer viruses can spread quickly and are often difficult to completely remove. They can attach themselves to almost any type of file and are spread as files that are copied and sent from individual to individual.

In addition to the ability to replicate, some computer viruses share another common trait: a harmful routine that delivers the virus payload. While payloads sometimes only display messages or images, they can also damage or destroy files, reformat your hard drive, or cause other damage. If the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer.

years ago viruses spread primarily through floppy disk, but the Internet has created some new virus distribution methods. With email now used as an essential business communication tool, viruses are spreading faster than ever. Viruses attached to email messages can infect an entire enterprise in a matter of minutes, costing companies millions of dollars annually in lost productivity and clean-up expenses.

Viruses aren't disappearing anytime soon: tens of thousands have been identified, and hundreds of new ones are created every month, according to the International Computer Security Association (ICSA). These numbers indicate that most organizations will regularly encounter virus outbreaks. No computer users are immune to viruses.

 

 

Q:

WHAT IS A WORM?

A:

A worm is a computer program which has the ability to copy itself from one machine to another machine. Worms normally migrate and infect other machines that are part of computer networks. Once inside a network, a worm can grow from a single copy very quickly. For example, the Code Red worm replicated itself over 250,000 times in approximately nine hours on July 19, 2001. A worm usually exploits some sort of security hole in a piece of software or the operating system. For example, the Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server.

Worms eat-up up computer time and negatively impact network bandwidth when they are replicating, and often have some sort of malicious purpose. A worm called Code Red made huge headlines in 2001. Experts predicted that this worm could clog the Internet so effectively that things would completely grind to a halt.

The Code Red worm slowed down Internet traffic once it began replicating itself, however not as great as experts had predicted. Every copy of the worm scanned the Internet for Windows NT or Windows 2000 servers that do not have the Microsoft security patch installed. Every time it found an unsecured server, the worm copied itself to that server. This new copy then scanned for other servers to infect. Depending on the number of unsecured servers, a worm could conceivably create hundreds of thousands of copies.

 

 

Q:

WHAT IS A TROJAN?

A:

A Trojan is a piece of code that performs unexpected or unauthorized, and usually malicious, actions. The main difference between a Trojan and a virus is it's inability to replicate. Trojans cause unexpected system behavior, damage, and compromise the systems security, they do not replicate. If the code replicates, then it is classified as a virus.

A Trojan, taken from Greek mythology's Trojan horse, usually comes in good packaging but has some hidden unwanted intent and malware within its code. When a Trojan is executed users will likely experience unwanted problems in functionality of their systems, and possible loss of valuable data.

 

 

Q:

HOW DO I KNOW IF I HAVE A VIRUS?

A:

You need to realize that there are many things that can go wrong with any computer and a virus or malware are not always to blame.

The best way for you to know if your computer is infected is by scanning your system with an up to date anti-virus program.

 

 

Q:

WHAT IS SPYWARE?

A:

Spyware applications can be deposited onto your system when you download many of the  file-sharing services, open infected e-mails, or click on questionable Internet pop-up ads. They often manipulate your system, and record your surfing habits or keystrokes, which can lead to stolen passwords and credit card numbers. Depending on the degree of severity, they may be used to steal your privacy or even your identity. And they may be very difficult to remove.