Computer viruses

Malicious software - Viruses, worms and Trojan horses

Worms and viruses are malicious programs that have an ability to replicate themselves. Viruses are designed to add their code to executable files of third party software, while worms simply add their files into system folders to be executed on system startup.

Trojan horses – Allow computer to be controlled remotely; a hidden functionality user would not want.

Computer antivirus software is usually used to protect from possible threats. There are many commercial solutions available, however more expensive solution doesn't necessarily protect better.

Computer virus protection

Recommended protection

For home users we recommend Avast anti virus. It is free of charge for non commercial users. Those who don't earn from the internet should not pay for virus protection software.

For business users we would recommend Panda Antivirus, Avast Business Edition or any other well known commercial antivirus solution.

Post a comment

Here you can share your thoughts with us by posting a question/comment. Your e-mail will not be shown to protect your privacy. Required fields are marked with *

Anti-spam protection

Related Web pages

Check other Smooth Step articles related to software, system and security.

Internet security

Computer firewall is internet connection filtering hardware / software designed to block all traffic except through the ports that are needed for installed services.

More about internet security »

Real estate software

To cut design and development costs many property software providers and real estate web designers in general use prebuilt templates to make sites for their clients, however in many cases such websites are charged as if design would be unique.

SEO friendly real estate manager »

Web development

We can also develop custom web based software that is not mentioned in this page.

Web application development »

BunnikTours PDF app, Australia

The software features a secure login, client management, client profile with high definition logo upload and real time PDF rendering capabilities merging BunnikTours PDF brochures with client logo and contact details written in corporate TrueType font used by the company.

JSON based web app »


Apart of having insecure backend software websites are vulnerable to contact form spam, also sensitive data leakage due to insecure connectionWebsite contact, registration, comment and other forms are vulnerable to spam unless they are properly protected.

More about security »