The Five Types of Malware

A combination of the words “malicious” and “software” describes “malware” quite succinctly. Malware,is software developed for the purpose of doing harm.The term “malware” derives it’s definition from the intention of the person creating it and not from the software itself. The software cannot be termed “malicious” or “evil” unless it is used for a purpose which the creator intends to hurt someone or someone’s computer. The purpose of software relies upon the person creating it.

Malware can be classified based on how they get executed, how they spread, and what they do. The classification is not perfect, however, in the sense that the groups often overlap and the difference is often not obvious.

There are five types of malware out there today:

(1) Contagious Software. This type of software is composed of computer viruses or so-called worms. This type of malware is the most common. A “virus” describes a computer virus rather than an actual physical virus which may infect us. Viruses are different than worms in their distribution and in the actual operation.

The first type of malware to evolve was the computer virus. Viruses work and spread within the infected system by attaching themselves to other software. In the case of macro viruses, to documents. During the execution of the program the viral code is executed. Viruses spread across computers when the software or document they attached themselves to is transferred from computer to computer.

Back in the day when I was a young man, just getting into computers and trading floppy disks back and forth, you could count on a virus being on a disk once in awhile. A virus copies itself into an executable file and will run whenever a certain program is activated or a certain hard disk is opened.

The computer worm, used to infect systems, began when the internet was first used.The worm scans different networks in the computer, testing for any vulnerable systems where it can copy itself. From this new base, inside your computer the worm begins scanning and copying itself to all vulnerable files or processes. Although worms and viruses had distinct meanings and uses, they now are used to indicate any type of contagious malware.

Computer worms are stand-alone software and thus do not require other pieces of software to attach themselves to. They are started as part of the boot process. Worms spread, either by exploiting some vulnerability of the target system, or by using some kind of social engineering to trick users into executing them.

(2) Hidden files. This type of malware is used to hide any type of activity within a user’s computer. There are various types of hidden files, such as:

(a) A Trojan. These are the familiar trojan horses. They serve the same purpose as the mythical trojan horse. You know, the one the Greeks used to take over Troy. Some trojans are registered on your computer in the form of utilities. When the user downloads the malware, a door opens for other types of malware to be introduced into the system.

Trojan horses are get executed by being part of an otherwise useful piece of software. Trojan horses are attached to the host software manually, they cannot infect other pieces of software the way viruses can, nor can they replicate themselves. Trojan horses rely on the useful features of the host software, which trick users to install them. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into your computer.

The devious mind that creates the virus and plants it successfully will see a massive computer outbreak of the virus. By introducing the virus into one network via a trojan horse, the creator sees the spread of the virus to other networks.

(b) A Backdoor. A Backdoor is a piece of software that allows access to the computer system, bypassing the normal authentication procedures. This virus creates an alternative doorway inside your structure. It creates a different pathway or route to the goodies. This virus circumvents any security system residing on your computer. Once inside the system via the backdoor, the hacker will be able to do anything they want to do.

There are two groups of backdoors. The first group works much like a Trojan. They are manually inserted into another piece of software, executed via their host software and spread by their host software being installed. The second group works more like a worm in that they get executed as part of the boot process and are usually spread by worms carrying them as their payload.

(3) For Profit Malware. There are some disreputable companies out there who will increase their profits any way they can. This malware comes in the form of a dialer. A dialter is the type of malware which goes through your internet connection, rerouting your net connections through an expensive phone line. This increases your bill that you have to pay.A computer that has this malware is forced to call the compliant phone line and run up a huge bill.

(4) An Exploit. A piece of software that attacks a particular security vulnerability. Exploits are not necessarily malicious in intent – they are often devised by security researchers as a way of demonstrating that a vulnerability exists. However, they are a common component of malicious programs such as network worms.

(5) Phony or Hoax Viruses. There are instances where hoax virus warning messages have been sent which suggest that the recipient may have a particular virus, together with helpful instructions about how to confirm and eliminate the virus. These messages almost invariably tell you to look for a particular file and if it is present, delete it. In most cases the file which they mention is a Windows system file which if deleted, will cause serious running problems. If in doubt, run an internet search on Google for the filename, and you will almost certainly find information about it, and any recent scam.

So there you have it. Five kinds of malware that will cause you headaches unless you have an anti-virus program that looks out for your computer.

Can DNA Based Nutrition Supplements Compensate For Nutritional Deficiencies?

With the importance of exercise and nutrition to maintain optimal health to keep the doctor away, many of us eat what is good to our taste buds but actually lack the proper nutrition we need for our bodies to perform at it’s fullest potential.

But what if there was a way to peek into your genetics and assess exactly what nutrients your body is deficient of? Then, after assessing your nutritional deficiencies what if there existed such a way to create nutritional supplements that compensate for your particular deficiencies through your very own DNA make up?

Well I have good news for you. Because for the first time in history scientists have completed the Genome Project and are now able to peek into our genetic makeup, generate a DNA report, then create a unique blend of whole food, organics, super fruit, plant based nutrition supplements that are scientifically proven to make a difference in health and nutrition based on your very own unique DNA.

As of August 2008, Genewize Life Sciences brought to market the Lifemap Nutrition System as a breakthrough in Science and has taken the health and wellness industry by storm. Genewize Lifemap Nutrition System is reported by numerous proud consumers to provide more energy, endurance, concentration, better sleep, and also the relief of joint pain, headaches, lower blood pressure and a host of other health related dispositions. The days of guessing as to what works for your individual health needs are a thing of the past. “Why guess when you can be assessed?” That is a loud spoken quote pertaining to this all new DNA based nutrition system. Now, more than ever are consumers agreeing that One Size Doe’s Not Fit All when it comes to nutritional supplements.

Genewize Lifemap Nutrition System is uniquely formulated and genetically matched to be a customized nutrition system based from your very own DNA. Each formula is personally created from a potential of 120 ingredients and over 577,000 variations. It all starts with the customer receiving a self administered swab kit in the mail, then swabbing the inner cheek area, and placing the swabs into the prepaid postage envelope which is bar coded for your security, then mail back to Genewize Life Sciences Laboratory to be assessed. Within 4-6 weeks you will receive a copy of your DNA healthy aging report, a list of the ingredients in your personal formula, and a 1 month supply of your customized DNA based Nutritional supplements sent to your door step and every month thereafter on complete auto ship.

As with every new scientific breakthrough, there is always a fraction of those that are non believers. And this one is not an exception to the rule. Many disbelieve that science has come this far while others take the negative route without any investigation at all. On the other hand, many are turning to the Lifemap Nutrition System as an alternative to medicine and also as a prevention method from some health related diseases ever surfacing in the first place..

8 Tips To Increase Your E-Commerce Sales

As e-commerce continues to grow in Canada, and be a staple in the States, it’s important that you get the most out of your e-commerce site, especially if you’re a small business.

Here are 8 tips guaranteed to increase your e-commerce site. How do I know? They are best practices I’ve implemented with my clients and seen tremendous results.


This first tip connects to branding and making a first impression. An e-commerce site that isn’t cluttered, has a great home page and professional images, and a logical flow communicates quality and professionalism. This “halo effect” means customers will associate your product with quality and be more likely to purchase.

An easy way to determine how effective your home page is through Google Analytics’ Visitor Flow chart. If you see that customers are landing on your home page and then immediately leaving (shown by the ‘drop off’ %), then ‘Houston, we have a problem’.


A great user experience means easy navigation and easy navigation means more sales. Make sure your product categories are logical and comprehensive. Make your logo clickable and redirect to the home page. Top vs. side navigation is more common and more effective. Don’t get caught up in what’s easiest for you as the merchant and the backend, think about what makes sense for your customer.


This is something big retailers do really well. By simply featuring complementary items such as “You may also like these products” or suggesting pairings like “People that purchased this product also purchased these items”, you not only expose the customer to more products, but you make it easy for them to purchase. Remember, time is money for both you and your customer. The more time you save them, the more products they’re likely to buy.


This is one of the most important components of any e-commerce site but it’s often overlooked by small business owners. Position the shopping cart in plain view (normally in the upper right hand corner), ideally show a shopping cart icon and at the least visually show the number of items currently in the cart. A best practice is to show the actual items in the cart. And be sure to make checkout easy with a simple click of a button.


In reviewing one client’s e-commerce analytics and visitor flow, I noticed that customers were spending a lot of time between the shopping cart and help, ultimately abandoning the cart. It became obvious that they couldn’t figure out how to checkout. After a few minutes of frustration they simply left the site. Once a customer has a less than perfect user experience with your site, they are highly unlikely to come back.

Another sales killer is asking the customer to set up an account before they check out. Again, this goes back to “time is money”. By simply removing this one step from a client’s site, their sales went up by 55% within 3 weeks.


Making it mandatory for a customer to provide their e-mail address at checkout ensures three things (1) that you can easily contact them if there is a problem with their order; (2) if they abandon their cart you’ll have a way to possibly finish the sales and (3) your customer database grows. A lot of e-commerce platforms pre-populate the checkout fields, make sure that the e-mail address is a mandatory field.


The industry average cart abandonment rate is 65% but most e-commerce sites have a rate of 80% or higher. Think about it, that means that out of every 10 customers who start to purchase a product from your site, only 2 will complete the transaction. What does that mean in terms of sales? Calculate your average sales per transaction and multiply by 8 and then by the number of days your e-commerce is open and well, you get the picture. Most cart abandonment programs boast a 15% retrieval rate and it’s as simple as sending an e-mail to those lost customers asking if there was something wrong with their experience, if there is anything you can help with and providing a link to finish their order.


Most newer e-commerce platforms already have this function built-in. If you’re using an older platform you may have to buy the add-on, but it’s well worth the money. There’s a multitude of live chat programs out there, from the simple call-to-action (CTA) button to pop-ups after a customer’s been on the site for a specified amount of time. Live chat helps to humanize your site and the customer’s shopping experience, avoid any potential negative user experiences and close sales.

So if you want to increase your e-commerce sales easily and quickly, try implementing one, several or all of these tips.