Malware is the abbreviated word for "malware software." It includes many types of malware that cause many problems, such as blocking the operation of the device, gathering sensitive information, or accessing specific operating systems. And is the biggest factor in the loss of companies data, and to escape from individuals as well

They are installed on your device normally without your prior consent and this malware can be installed in several ways

There are different types of malware, these malware include viruses, worms, trojans, rootkits, spyware, keyloggers keyloggers and many other types. To get a general idea of ​​the difference between all these types of threats and their methods of operation, it makes sense to divide them into groups

 What are Virus Viruses

It is common for viruses to be used as a comprehensive term to denote different types of malware. However, these species in fact differ in their programming, methods of deployment and work.
Viruses are small programs designed to change the properties of files that infect them, and are controlled remotely. This shows the professional programmers of these viruses, to perform some commands such as removal, modification or sabotage and control the device or steal data, and similar operations. Viruses have the ability to replicate and spread themselves to another program called Host

Viruses are affected by executables that extend to Exe and operating system files, and can destroy or erase parts of data and files on the device and transfer them from your device to other devices.
One of the most prominent methods of transmission so far Internet, so that it is an easy gateway for the transfer of viruses from one device to another

They come in e-mail messages and often send viruses as attachments such as images, cards, or audio and video files that attach to e-mail messages or instant messages. That is why it is important not to open attachments that come from an unknown destination, unless you know the sender of this message

 On the other hand, storage media such as flash memory, optical disks, and files are stored on disks, disks, or Rar-Zip files.
It can also spread through downloads over the Internet.

 Because they can be hidden within illegal programs or other files or programs such as Keygen -Crack. The hacker can make the virus move from file to file and from Partition to another while trying to wipe it.
2 - What is the Trojan horse

 The term is derived from the story of a Trojan Horse in Greek mythology, a program that is used as a way to insert malicious programs into the machine.
A third program to connect the carrier means the paddle and the payload payload in one file, the latter is called the Binder. This is used to connect the first two, as well as to dismantle and release the load, according to Dropper, the program responsible for providing and unloading the load and overload

There are two properties that are characterized by a Trojan horse. First, it appears to be a program that is innocent or useful to the user, but carries functions within it to achieve the purposes of the controller. However, it is the carrier or the carrier of the malicious program. And usually sneaks into the device by convincing the ignorant user to run it himself to sow himself and control completely or partially on the device

 His hidden behavior is to disguise a Trojans in the form of software quizzes, mail, music, videos, or shows such as pirated software ... especially in all crackers and hackers - crack-keygen without extention

 Trojan horses
- A Trojan horse that keeps its load on it, in addition to its malicious activity. The name of the malware is called a keylogger-backdoor.
- Trojan immunity that releases its load while continuing its activity separately. If it is detected and identified, the load continues to work, or vice versa. In this case it is classified as the malicious category that it carries

- Trojans who have no other activity, or any obvious activity, only leave or install the malicious software they carry. This type is classified as a Dropper. The payload is classified as a malicious category, usually a virus