1-- VIRUS:
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus.
A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses.
A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files.
Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
2-- TROJANS:
In the context of computer software, a Trojan horse is a program that unlike a virus contains or installs a malicious program (sometimes called the payload or 'trojan'). The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. (See Social engineering.)
Often the term is shortened to simply trojan, even though this turns the adjective into a noun.
There are two common types of Trojan horses. One is otherwise useful software that has been corrupted by a hacker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program's objectives.
3-- SPYWARE:
Spyware is computer software that collects personal information about users without their informed consent. The term Spyware, which was coined in 1995 but wasn't widely used for another five years, is often used interchangeably with adware and malware (software designed to infiltrate and damage a computer respectively).
Personal information is secretly recorded with a variety of techniques, including logging keystrokes, recording Internet web browsing history, and scanning documents on the computer's hard disk. Purposes range from overtly criminal (theft of passwords and financial details) to the merely annoying (recording Internet search history for targeted advertising, while consuming computer resources).
Spyware may collect different types of information. Some variants attempt to track the websites a user visits and then send this information to an advertising agency. More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into a web form or other applications.
4-- ADWARE:
Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.
5-- SPAM:
Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are generally undesired. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, internet forum spam and junk fax transmissions.
6-- PHISHING:
Phishing is essentially an online con game and phishers are nothing more than tech-savvy con artists and identify thieves. They use SPAM, malicious Web sites, email messages and instant messages to trick people into divulging sensitive information, such as bank and credit card accounts.
------------------------------
ANTI-VIRUS SOLUTIONS
Using Internet Security Suites Is Always Better Than Using Just An Anti-Virus On Its Own---
1-- Kaspersky Internet Security 2009(RECOMMENDED)WEBSITE LINK- CLICK HEREFree Online Virus Scan - Kaspersky Online Virus ScannerAVAILABLE FOR MOBILE - Yes2-- Eset Smart SecurityWEBSITE LINK- CLICK HEREFree Online Virus Scan - ESET Online ScannerAVAILABLE FOR MOBILE - No (Under Development)3-- BitDefender Internet Security 2009WEBSITE LINK- CLICK HEREFree Version Available For Home Users - BitDefender 10 Free EditionAVAILABLE FOR MOBILE - Yes4-- Grisoft AVG Internet Security 8WEBSITE LINK- CLICK HEREFree Version Available For Home Users - AVG Anti-Virus Free EditionAVAILABLE FOR MOBILE - No5-- McAfee Internet Security 2009WEBSITE LINK- CLICK HEREFree Online Security & Virus Check - McAfee FreeScanAVAILABLE FOR MOBILE - Yes6-- Trend Micro Internet Security 2009WEBSITE LINK- CLICK HEREFree Online Security & Virus Check - TrendMicro HouseCallAVAILABLE FOR MOBILE - Yes7-- ZoneAlarm Internet Security Suite 2009WEBSITE LINK- CLICK HEREAVAILABLE FOR MOBILE - No8-- Avast! 4.8 Professional EditionWEBSITE LINK- CLICK HEREFree Version Available For Home Users - Avast! 4 Home EditionAVAILABLE FOR MOBILE - Yes9-- Norton Internet Security 2009WEBSITE LINK- CLICK HEREAVAILABLE FOR MOBILE - Yes10-- Panda Internet Security 2009WEBSITE LINK- CLICK HEREFree Online Security & Virus Check - Panda ActiveScan with TruePreventAVAILABLE FOR MOBILE - No11-- eTrust CA Internet Security Suite Plus 2009WEBSITE LINK- CLICK HEREFree Online Scanner - Free Virus ScanAVAILABLE FOR MOBILE - No12-- Avira Premium Security Suite 2009(RECOMMENDED)WEBSITE LINK- CLICK HEREFree Version Available For Home Users - Avira AntiVir PersonalEdition ClassicAVAILABLE FOR MOBILE - Yes13-- A-Squared Anti Malware 4WEBSITE LINK- CLICK HEREFree Online Virus Scan - A Squared Online Virus ScannerFree Version Available For Home Users - A-Squared FreeAVAILABLE FOR MOBILE - No14-- G Data Internet Security 2009(RECOMMENDED)WEBSITE LINK- CLICK HEREAVAILABLE FOR MOBILE - No15-- Agnitum Outpost Pro Security SuiteWEBSITE LINK- CLICK HEREAVAILABLE FOR MOBILE - No16-- F-Secure Internet Security 2009WEBSITE LINK- CLICK HEREAVAILABLE FOR MOBILE - Yes------------------------------
ANTI-SPYWARE SOLUTIONS
No Spyware Product Will Give You 100% Security So Its Always Best To Use A Recommended Product Along With 1 Or 2 Free Anti-Spywares
---
1-- Webroot SpySweeperWEBSITE LINK- CLICK HERE2-- PCTools Spyware Doctor 5.0 WEBSITE LINK- CLICK HERE(RECOMMENDED)3-- CA eTrust Pest Patrol 2008WEBSITE LINK- CLICK HERE4-- ZoneAlarm AntiSpywareWEBSITE LINK- CLICK HERE5-- Lavasoft Ad-Aware 2008 Pro WEBSITE LINK- CLICK HEREFree Personal Verion Available For Personal Use - Lavasoft Ad-Aware SE Personal Edition 1.066-- Spybot Search & Destroy 1.6WEBSITE LINK- CLICK HERE(FREE TO USE)7-- Javacool Software SpywareBlasterWEBSITE LINK- CLICK HERE(FREE TO USE)8-- Microsoft Windows DefenderWEBSITE LINK- CLICK HERE(FREE TO USE)9-- Bazooka™ Adware and Spyware Scanner v1.13.03WEBSITE LINK- CLICK HERE(FREE TO USE)10-- SUPERAntiSpyware 4.1WEBSITE LINK- CLICK HERE(FREE TO USE)(RECOMMENDED)11-- Malwarebytes Anti MalwareWEBSITE LINK- CLICK HERE(FREE TO USE)(RECOMMENDED)