1.蠕虫:
蠕虫类似于病毒,但它不会修改程序。它越来越多地自我复制,从而导致计算机系统变慢。蠕虫可以通过遥控器进行控制。蠕虫的主要目标是吃掉系统资源。
2.特洛伊木马:
特洛伊木马(Trojan Horse)也是一种恶意软件,它使用虚假名称来从其真实意图误导用户并执行它们。特洛伊木马通常作为合法且有用的软件安装在系统上,该软件可以向黑客提供未经授权的访问和控制。后孔,Rootkit和Beast木马是一些更有害的常见木马。
蠕虫和特洛伊木马之间的区别:
WORMS | TROJAN HORSE |
---|---|
A Worm is a form of malware that replicates itself and can spread to different computers via Network. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. |
The main objective of worms to eat the system resources. | The main objective of the trojan horse is to control the activity of the system. |
Worms can be detected and removed by the Antivirus and firewall. | Trojan horses are detected by the antivirus software. |
It doesn’t need a host to replicate from one computer to another. | It require host is needed for spreading. |
It can give unauthorized access and control of the system to the hackers. | It also give unauthorized access and control of the system to the hackers. |
It is less harmful as compared. | It is more harmful as compared. |
Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. |
Worms are executed via weaknesses in system. | Trojan horse executes through a program and interprets as utility software. |