What Are The 4 Ways In Which My Computer Can Be Infected?

Computer security has come a long way in the short amount of time that the Internet has been in wide usage. Computer security was less of an importance back in the dawn of the computer age since most attacks had to take place while the person was at the terminal. In the age of the Internet though, most of the attacks now are done through the network, and with these attacks people have found several different ways to deliver them.

What Are The 4 Ways In Which My Computer Can Be Infected?

We will list them for you and tell you the best way to avoid them –

The Computer Virus

The first and most common vector of attack is the widely known computer virus.

A computer virus is a highly reproducible executable that will cause damage to your computer by infecting your files and other items on your computer.

Viruses have gotten pretty sophisticated over the years with the ability to hide their signature as well as hiding themselves by capturing signals that are sent by the OS that would identify them.

People mistakenly call all different types of infections a virus but even without that it is still the number one way to have your computer become infected.

The Trojan Horse

The second vector of attack is a Trojan attack.

A Trojan program is a program that looks like a normal innocent file, such as an mp3 or pdf file, but in actuality is a file that was sent to run an undesirable code on your computer.

This code will sit in the background of your computer and you will never know.

At the same time that it is sitting back there it will run either a bot net on your computer or pick up information from your computer and send it to a server.

Trojans are less destructive on your computer and more destructive to your real life information.

The Computer Worm

A third vector of attack is a computer worm.

A worm will find a way to get through different types of network security that you may have and then spread itself to the computers on your network.

Worms can be destructive and destroy your network but most likely it will sit in your network and try to discover valuable information.


The fourth and final vector of attack that a program can use to cause damage on your computer is known as spyware.

Spyware will monitor you as your surf the Internet and pick up trends and information about you.

The information is then used to send you advertising on your computer through the use of pop ups.

Spyware is more annoying than it is destructive.

Some legitimate companies will also track your Internet movements but they will not send unwanted advertisement to you.


Each of these attacks that we have discussed are well known and there are good counter measures that are out there.

For viruses and Trojans on your system a good antivirus / internet security suite will do the job of getting rid of them.

For Worms attacking your network, there are several programs that will provide you a reliable firewall on your system and will do a good job of protecting both your network and your computer.

Windows comes with a default Firewall built in but it is better to go out and get a reputable third party firewall.

And for the spyware on your system there are several programs out there that will help you get rid of that.

One of the more popular is a program that is called AdAware.

This will scan your system and get rid of spyware that is residing within it.

Hopefully this run down of the different infections that can cause damage to your computer will help you out.

If you know what you are fighting then it is easier for you to be able to avoid it.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.


  1. […] They just think that the virus is done in several different ways. But that simply is not the case. There are different types of attacks all together that you have to worry about. And when you are looking for a security solution you […]

  2. […] party software vendors that are coming to the party, trying to protect your computer from devious spyware […]

Speak Your Mind