Malware

By Mulungi  Xavier 

The term "malware" means any malicious program on a computer or mobile device.
These programs are installed without the permission of users and can cause a number of unpleasant effects, such as slowing computer performance, getting your system for personal data, erasing data or even affecting the operation of computer.
These programs are kind of software developed by people called hackers. 

Common Kinds of Malware

Computer Viruses

These are programs that damage multiple files on a computer. They spread to other computers when carried by users on a physical media, such as flash disks. 

Worms

Worms don't require human help in order to spread and infect: they infect once and then use computer networks to spread to other machines. worms make many copies of themselves and consume system resources which makes the computer slow. 

Spyware

It spies on what you're doing on your computer and collects data such as keystrokes, browsing habits and even login information or passwords, which is then sent to third parties. It may also modify specific security settings on your computer.

Adware

Adware is the most common online nuisances. The programs automatically deliver advertisements to host computers on the internet. They include pop-up ads on webpages with advertisements that often comes with "free" downloads. 

Ransom-ware

Ransomware infects your computer, then hides your useful Information and then send you a message demanding a payment to decrypt your data. If you refuse to pay, the data is deleted permanently. Some ransomware hackers lock out all access to your computer. They might claim to be the work of legitimate law enforcement agencies and suggest that you've been caught doing something bad; that you pay a fine for wrong doing; or, just let you know that you’ve been hacked. 

Rootkits

Rootkits allow remote access or control of a computer by another person.
These programs are useful for IT professionals trying to troubleshoot client’s computers at a distance, but they can easily become misused: Once installed on your computer, rootkits allow attackers to take complete control of your computer to steal data or install other pieces of malware. Rootkits are designed to go unnoticed and actively hide their presence. 

Trojan Horses

These are commonly called "Trojans," these programs disguise as legitimate software. Once downloaded and installed, Trojans make changes to a computer and carry out malicious activities, without the knowledge of the victim.
Trojans are common on sites that give free software. 

Bots

Bots are programs designed to automatically carry out specific operations. They're useful for many legitimate purposes, but have also been reused as a type of malware. Once on a computer, bots can cause the machine to execute specific commands without the user's approval or knowledge.
Hackers may also try to infect multiple computers with the same bot to create a robot network, which can then be used to remotely manage compromised computers  to steal sensitive data, or to spy on the victim's activities. 

Misconceptions About Viruses

  • 01 Any computer error message indicates virus infection. 
    This are false error messages can also be caused by faulty hardware or software bugs.
  • 02 Viruses and Worms always require user-interaction. 
    False. This doesn't require user-interaction. For example, a network worm can infect automatically if user is not protected.
  • 03 Email attachments from known senders are safe. 
    False, because the sender himself may not know that he’s infected before uploading the attachment.
  • 04 Antivirus programs will stop all threats. 
    False. While antivirus vendors do their best to stay on top of malware developments, there's no such thing as 100 percent security. A good antivirus program only reduces chances of possible attacks; and it should be updated regularly.

Common Signs That Your Computer May Be Infected

The computer slows down. This Is because malware deletes system resources

More files show up that you didn’t create. Some of these files have same names your files and when clicked they don’t show anything.

Hidden files. Your files may become invisible. This often requires you to go to folder settings to unhide them.

Your files may change appearance with different icons and size in MBs or KBs  and do not work.

You may notice that you are running out of space but without having created more files on your computer. This is common with worms. 

 Whenever you connect to the internet you may notice a different home page.

What to do

  • If you suspect that your computer might be infected, scan your system immediately. If nothing is found, but you're still in doubt, get a second opinion — run an alternative antivirus scanner.
  • Install a good antivirus and update it regularly. Updating an antivirus is important because new viruses are created by hackers regularly. So, there is need for antivirus vendors to update their programs so that they can clean newer viruses.

Common antivirus include the following: 

Mobirise Website Builder
Avast
Mobirise Website Builder
Avg
McAfee
Kerspersky 
Avira
Smadav
Mulungi Xavier
Grand Maria School, Nabbingo

Hi! My name is Mulungi Xavier. I’m 11 years old. I am at GMS School in Nabbingo. I am in Primary Six, 2025. I made this website as part of my school project. It is my research on system security. I had a lot of fun working on it and learning new things along the way.

Thanks for visiting my site, I hope you liked it!

My School

At GMS, Nabbingo, goes beyond just academics to shape confident, responsible and well rounded learners ready for the future demands. 

Contact for more information on how to enroll your child

Follow Us

Stay connected with us to see how our learners grow, explore, and shine. Follow us for updates, events, and stories that celebrate learning beyond the classroom.

Grand Maria School - Nabbingo | +256776808070