1. 蠕虫:
蠕虫类似于病毒,但它不会修改程序。它越来越多地自我复制,导致计算机系统变慢。蠕虫可以通过远程控制。蠕虫的主要目标是吃系统资源。
2. 特洛伊木马:
特洛伊木马也是一种恶意软件,它使用假名和假名来误导用户并执行其真实意图。特洛伊木马通常作为合法且有用的软件安装在系统上,这些软件可以让黑客未经授权访问和控制系统。 Back orifice、Rootkit 和 Beast Trojan 是一些常见的木马,危害性更大。
蠕虫和特洛伊木马的区别:
WORMS | TROJAN HORSE |
---|---|
A Worm is a form of malware that replicates itself and can spread to different computers via Network. | Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. |
The main objective of worms to eat the system resources. | The main objective of the trojan horse is to control the activity of the system. |
Worms can be detected and removed by the Antivirus and firewall. | Trojan horses are detected by the antivirus software. |
It doesn’t need a host to replicate from one computer to another. | It require host is needed for spreading. |
It can give unauthorized access and control of the system to the hackers. | It also give unauthorized access and control of the system to the hackers. |
It is less harmful as compared. | It is more harmful as compared. |
Morris Worm, Storm Worm and SQL Slammer are some of the examples of worms. | Back orifice, Rootkit and Beast Trojan are some of the common Trojan horses. |
Worms are executed via weaknesses in system. | Trojan horse executes through a program and interprets as utility software. |