Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 April 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

Premiums

TRUSTED VENDOR
Joined
Dec 5, 2020
Messages
1,351

A computer worm is a program which copies itself across a network.
A computer worm differs from a computer virus in that a computer worm can run itself. A virus needs a host program to run, and the virus code runs as part of the host program. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside.


Well known examples of the computer worm
The original computer worm was (perhaps accidentally) unleashed on the Internet by Robert Tappan Morris in 1988. TheInternet Worm used send mail, fingerd, and rsh/rexec to spread itself across the Internet.
The SQL Slammer Worm of 2003 used a vulnerability in Microsoft SQL Server 2000 to spread itself across the Internet. The Blaster Worm, also of 2003, used a vulnerability in Microsoft DCOM RPC to spread itself.
The Melissa worm of 1999, the Sobig worms of 2003 and the Mydoom worm of 2004 all spread through e-mail. These worms shared some features of a trojan horse , in that they spread by enticing a user to open an infected e-mail attachment.

Mydoom also attempted to spread itself through thepeer-to-peer file sharingapplication KaZaA. The Mydoom worms attempted aDenial of Service (DoS) attackagainst SCO and Microsoft.Protecting yourself against computer worms

Computer worms which spread through vulnerabilities in network services can best be protected against by keeping up-to-date in installing patches provided by operating system and application vendors. This includes worms like SQL Slammer and Blaster.
Computer worms which spread like trojan horses can best be defended against by not opening attachments in your e-mail. These infected attachments are not limited to .EXE files. Microsoft Word and Excel files can contain macros which spread infection.

Learn about other malicious softwares

 
Top Bottom