A worm is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on PC, so rather than sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. Due to the replicating nature of a worm and its capability to travel across networks the end result in most cases is that it consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks "Blaster Worm" has been designed to penetrate into your system and allow hackers to control your computer remotely.
It is named after a mythological Trojan horse. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. The Trojan horse, at first instance appears to be useful software but will actually damage once installed or run on a computer. When a Trojan is activated on a computer, the results can vary. Some are not malicious but do silly tricks on the Desktop yet others delete important files thus destroying information or data stored in a PC. But Trojans are also known to create a backdoor on the computer that gives Malevolent users an access to the system, and hence allowing confidential or personal information to be compromised or trickled out.
How to remove a computer virus or a malware:
Removing a computer virus or a malware at times can be a difficult task without the help of computer malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after they had been removed. But one should regularly update its Anti Virus software and perform regular scanning of the system.
Removing Worm or malware visit and for the removal of Trojan horse go to.