User:Btb.hf/sandbox

Introduction
Malware has become one of the biggest threats to computer users to date. Malware can attack your computer in various ways, which includes, but is not limited to:


 * Hijacking your internet browser.
 * Tracking your online activity.
 * Bombard you with annoying pop-up ads.
 * Tweak your Internet Settings.
 * Corrupt your computer system files.

These attacks will inevitably slow down your computer system.

The most malicious relation in regards to these Malware programs is their ability to re-install themselves. A user may think that he/she has removed the Malware successfully, although the truth may be somewhat different. Malicious programs have the ability to hide themselves deep in the computers core, and bind themselves to system files, making them extremely difficult to delete.

A computer can get infected by malware programs in several ways. A majority of malicious files/programs are bundled with other software which is installed on any given computer. Other common sources are:


 * Un-trusted websites forcing a user to install a third party program.
 * Corrupted search engines getting installed and later forwarding a user to malicious pages on the internet.
 * Installing pirated software.
 * Through infected removable media like Pen Drives.
 * Malicious links in spam e-mails.

Types of Malware
Although there is no official categorization, we can broadly divide Malware into three categories, which are mentioned below:

Adware:
Adware is the most annoying type of Malware, and is blatantly obvious once installed. These are the programs that place advertisements on your computer screen. Even a pop-up blocker program may often fail at stopping these attacks. These ads can show up at any time, even if you are not connected to the internet and participating in offline work.

Spyware:
The most dangerous form of Malware is Spyware. Spyware can collect and send critical information from a computer without user permission or knowledge. Spyware runs in the background and is capable of tracking your online & offline activity. The collected information can range from key strokes, to denied webcam access. Some Spyware programs possess the ability to tweak your Internet connection settings, and cap your Internet speed.

Hijackers:
This variant of Malware attacks your Internet browser. The most common Hijacker attacks change the default home page & search engine in the Internet browser. They may also, at times, redirect you to malicious websites.

The worst part is that it’s very easy to install Malware than it is to get rid of it, or even notice it. The ability to multiply them makes them even more dangerous.

Therefore, users are always advised to only visit trusted websites, and use Internet security programs. Personal computers should have good anti-malware software installed, to fight against the above-mentioned variants of Malware.