Computer Virus A hidden program that sticks to a real file or app. When you open that file, the hidden program wakes up and can spread to other files. Worm A secret helper that moves from device to device on its own. It looks for weak spots in a network and copies itself without you having to open anything. Trojan Horse A fake program that looks useful or fun. Once you install it, it lets others into your device to take information or add more bad software. Ransomware A program that locks up your files or device and won’t give them back until you pay money. Spyware A hidden watcher that records what you do on your device—like which websites you visit—and sends that information to someone else. Adware A program that shows you ads you didn’t ask for. It often follows what you do online to pick ads it thinks you might click. Rootkit A secret tool that buries itself deep in your device so you can’t see it. It lets someone control your device without you knowing. Botnet A group of devices secretly taken over by the same bad actor. The bad actor can make them all do things at once, like overload a website or send spam. Logic Bomb A hidden timer or trigger inside a program that waits for a certain date or action, then suddenly does something harmful—like erasing files. Fileless Malware A hidden attacker that lives only in your device’s memory. It doesn’t leave files behind, so it’s harder to spot and remove. Explain these viruses in a simple word.

视频信息