posted on Aug, 3 2003 @ 11:37 PM
Dear m-t-e
Not quite -it's arguably worse: if you think of the Fall of Troy you get the idea: it looks harmless and it is a hidden nightmare.
It doesn't replicate or copy: essentially it lets someone else, an invisible hacker, control your computer whil;e making it look as though you're
in control: a few symptoms
Your CD-ROM drawer opens and closes by itself
Your computer screen flips upside down or inverts
Your wall paper or background settings change by themselves
Documents or messages print on your printer by themselves
Your right and left mouse buttons reverse
Your computer plays recordings of things recorded in your computer room
Programs load or unload by themselves
Strange chat boxes appear on your computer and you are forced to chat with some stranger
A quick glossary (not original in any way) that might help.
Virus
A virus is a program that propagates itself by infecting other programs on the same computer. Viruses can do serious damage, such as erasing your
files or your whole disk, or they may just do silly/annoying things like pop up a window that says "Ha ha you are infected!" True viruses cannot
spread to a new computer without human assistance, such as if you trade files with a friend and give him an infected file (such as on a floppy or by
an email attachment).
Worm
Like a virus, a worm is also a program that propagates itself. Unlike a virus, however, a worm can spread itself automatically over the network from
one computer to the next. Worms are not clever or evil, they just take advantage of automatic file sending and receiving features found on many
computers.
Trojan horse
This is a very general term, referring to programs that appear desirable, but actually contain something harmful. The harmful contents could be
something simple, for example you may download what looks like a free game, but when you run it, it erases every file in that directory. The trojan's
contents could also be a virus or worm, which then spread the damage.
Cracker
Crackers are often mistakenly called "hackers". Crackers are the "bad guys" who seek to "crack" or gain unauthorized access to computers,
typically to do malicious things e.g. to steal credit card information or crash the computer. Crackers might do this by writing a virus, worm, or
Trojan horse. Alternatively, they may just exploit weaknesses in the computer's operating system in order to gain entry. Many crackers will install a
"backdoor" which allows the cracker to "remote control" your computer over the internet, such as to distribute child porn or perform a denial of
service attack against somebody else. Most crackers are just bored, anti-social kids who aren't particularly smart and just take advantage of
well-known, existing exploits or the gullibility of the typical internet user.
Hacker
When used properly, this term refers to 0good guys" who are talented computer programmers. They enjoy solving challenging problems or exploring the
capabilities of computers. True hackers subscribe to a code of ethics and look down upon the illegal and immoral activity of crackers. When the press
uses "hackers" to describe virus authors or computer criminals who commit theft or vandalism, it is not only incorrect but also insulting to true
hackers.
[Edited on 4-8-2003 by Estragon]