What is a Virus? No, it’s not the kind we as humans are apt to acquire. According to Quinn, a virus is a piece of self-replicating code embedded within another program called the host. A virus can be on any device that has an executable program such as a flash drive, your hard disk, a CD or DVD, email attachments, but the biggest culprit is in your downloads. When you execute the program the virus also executes and does what ever it is programmed to do.
These days most viruses are programmed to replicate occupying disk space and consuming your computers CPU time. Others are programmed to do damage to your file system or uses your email’s address book to spread the virus ridden message to your contacts.
Don’t look a gift horse in the mouth.
We’re not talking about those fat juicy night crawlers you bait your hook with in order to catch a trout; no, we are talking about those sneaky programs that squirm into your computer from the network through security holes in your software. According to Quinn, A worm is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. This could be hard wire or WiFi. Is your computer hooked up to a network? Then your computer is vulnerable.
Worms are different from viruses in the way that they replicate. Worms do not need a host program to execute itself. It comes through the network by way of holes in your operating system security. It’s replication of itself may slow your computer and any network traffic. Some are designed to open a back door to your computer in order for other malware to access your information. Worms have been used to delete subscribers from web hosts and cause denial-of-service attacks.
If you are hooked up to a network, or use storage devices to load things to your computer, use protection.
What’s in your computer
Viruses, Worms, and Trojan Horses By: Laurie Madison
“Computer Gremlin 2” by Larry Wentzel
A virus is a piece of self-
replicating code embedded
within another program
called the host.
How does my computer
catch a virus?
A Trojan horse is a program
with a benign capability
that conceals another,
How does my computer get a
What kind of malicious tasks
will a Trojan horse do?
Some examples of malicious tasks Trojan horse
programs have done are:
opening an Internet connection that allows an
outsider to gain access to files
logging the keystrokes of the user and storing
them in a file that the attacker can see
looking for passwords stored on the computer
and emailing them to the attacker
launching a denial-of-service attack on a
turning the computer into a proxy server that
can be used to launch spam or stash
information from illegal activities.
How does my computer get
A worm is a self-contained
program that spreads through
a computer network by
exploiting security holes in the
computers connected to the
network. Oh no, a Worm Hole!
• Infiltrate networks spreading all by
itself through holes in your operating
• Use up your bandwidth
• Slow computer processing down
• Open a “back door” to infiltrate your
• Can cause denial-of-service attacks
interrupting web services
• Deleting subscribers from Web hosts
• May be used to control your
computer or steal information
There’s an overwhelming
list of products available.
• Trend Micro
• And on and on…
• Quinn, M. (2011). Ethics for the information age (4th ed.). Boston, MA: Pearson
• Wentzel, L. Computer Gremlin 2. Retrieved from
Microsoft Office Clip Art,
pixabay.com for the free audio and clip art
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.