#1 By: Chris Hoffman, November 4th, 2013 06:40
Originally published at: http://www.howtogeek.com/174985/not-all-viruses-are-viruses-10-malware-terms-explained/
Most people seem to call every type of malware a “virus”, but that isn’t technically accurate. You’ve probably heard of many more terms beyond virus: malware, worm, Trojan, rootkit, keylogger, spyware, and more. But what do all these terms mean?
#2 By: Shirl, November 4th, 2013 20:46
Antivirus software doesn’t just protect against viruses, but against all types of malware.
ORLY? Care to name an AV that makes such an outrageous claim?
#3 By: FirstSpear, November 7th, 2013 16:25
Quote, "Most malware these days is produced for profit..."
Nope, profit is a legitimate capitalist outcome, and is legal, and necessary for R & D, wages, etc. Any income that any malware achieves is either blackmail (illegal) or theft (illegal). I only offer this because the use of such a legal term might seem to give these very nasty criminals some kind of legitimacy. Anything that infects a computer and is designed to claw money from a user without consent and by underhand means is evil, and I include "simple" browser hijackers and all adware, and those downloaders that hide toolbars and other evils under, "Automatic Installation (Recommended)", when a "Custom" installation subsequently reveals that other sneaky software would have been installed by default. Again, I include those that sneakily offer "Install Google Chrome and make it my preferred browser." Google are well aware of this. Shame on them. Bloody shame on them. (I am currently setting up alternatives and closing all my Google mailboxes, and am using other search engines and homepages.)
All producers, and endorsers - including Google, of all malware should be jailed for life when caught. They are damaging the internet. Do not ever give them the slightest credibility.
#4 By: Naman Sood, November 8th, 2013 10:02
I agree with the rest of your post, disagree with this line. Malware is also used for spying on companies, getting secret data, hijacking computers and removing all important data from them, etc. All illegal.