The combination of "malicious" and "software" describes the "malicious programs" rather concisely. Malicious programs are software that causes damage. The term "malware" comes from the intent of the determining person rather than the software. The software can not be called "malicious" or "malicious" unless it is used for purposes intended by a creator to hurt someone or someone else's computer. The purpose of the software is to rely on the creator
Malicious programs can be categorized by execution, propagation, and actions. However, classification is not perfect in the sense that groups often overlap, and the difference is often unclear.
There are currently five types of malware:
(1) Infectious software. This kind of software consists of computer viruses or so-called worms. This type of malware is the most common. The "virus" describes a computer virus, not an actual physical virus that would infect us. Viruses are different in worm distribution and actual functioning.
The first type of pest was the development of a computer virus. Viruses work and spread within the infected system when connected to other software. Macro viruses for documents. A virus code is executed when the program is executed. Viruses propagate on computers when the software or the document attached to it comes from a computer to a computer.
In young boys, entering the computer and trading floppy disks, they could count on a virus once on a disk. The virus copies itself to an executable file and will run when a particular program is activated or a particular hard drive is open.
The computer worm that infected the system started with the first use of the Internet. The worm tests different networks on your computer to test every vulnerable system where you can copy yourself. From this new base within the computer, the worm scans the scanning and copies itself to any vulnerable file or process. Although using distinct meanings and uses of worms and viruses, they report all kinds of infectious malware.
Computer worms are standalone software, so they do not require other software to capture themselves. These are started as part of the boot process. Worms are exploited to exploit some of the vulnerabilities in the target system or to apply a kind of social construction to their users.
(2) Hidden files. This kind of malicious program can hide any type of activity on the user's computer. There are different types of hidden files, for example:
(a) Trojans. These are known as Trojan horses. They serve the same purpose as the mythical Trojan Horse. You know, the one the Greeks took Troy. Some trojans are registered on your computer as a utility. When a user downloads a malicious program, a door will open to allow other types of malicious programs to access the system.
Trojan viruses are performed as part of a useful software. Trojans are manually connected to host software, unable to infect other software as viruses are able or unable to replicate themselves. Trojans rely on the useful features of the host computer, which makes it difficult for users to install. One of the most secret types of Trojan is a program that prevents virus scans, but displays viruses in your computer.
The evil mind that creates the virus and successfully cures the computer is a virus. By introducing the virus via a Trojan horse, the creator sees the spread of the virus into other networks.
(b) Backdoor. Backdoor is a software that allows access to a computer system, bypassing standard authentication procedures. This virus creates an alternative door within the structure. It creates a different route or route to flavors. This virus is bypassing any security system on your computer. After the system has entered through the back door, the hacker will be able to do everything he wants.
There are two backgroups. The first group is much like a trojan program. These are manually inserted into another software that is run through the host computer and spreads over the installation of the incoming software. The second group works better than a worm, as it is carried out as part of the boot process and is usually distributed by worms that carry their loads.
(3) Profit Malware. There are some reputable companies who increase their profits in any way. This malicious program is created as a dialer. Dialer is a malicious program type that is through its Internet connection and redirects network connections over expensive phone lines. This will increase the bill you have to pay. The computer that has this malicious program is forced to call the appropriate phone line and run a huge bill.
(4) Exploit. Software that attacks a particular security vulnerability. Exploitation is not necessarily deliberately malicious – often security researchers are planning to prove they are vulnerable. However, they are a common component of malicious programs, such as network worms.  Sagittarius or viral viruses. There are times when they report fraudulent virus alerts that indicate that the recipient may have a particular virus and provide useful guidance on how to confirm and eliminate the virus. These messages almost always say that you are looking for a particular file and if it is present, delete it. In most cases, the file they mentioned is a Windows system file that can cause severe running problems when deleting it. If you have any doubts, run an internet search at Google for filename and you will almost certainly find the information and any recent scam
So there. There are five malicious programs that can cause headaches, unless you have an anti-virus program that looks at your computer.