Wednesday, June 27, 2007

Internet Worms

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.
Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

History
The first incarnations of internet worms weren't the malevolent threat they are today. These early worms (developed in 1982 at Xerox's Palo Alto Research Center by John Shock and Jon Hepps) were in fact, designed to perform useful tasks within a network.
Despite the evident usefulness of these programs it was also clear that, in the wrong hands they could quite easily be turned to malevolent uses.
The first true Internet worm (and probably the most famous) was released on 2nd November 1988 by Robert T. Morris. It attacked Sun and DEC UNIX systems attached to the Internet and within 24 hours had invaded 4,000-6,000 machines.
The Melissa Worm was first recognized on 26th March 1999, it was the first major mail worm - a form of worm which was to become hugely prevalent. Melissa was written by David L. Smith and named after a lap dancer he met in Florida.
Melissa contained a Word macro virus but unlike previous viruses of this type it could spread in a semi-active manner. It attacked Microsoft's Outlook and Word programs (Any time an infected user attached a Word document to an email, this email sent to the first 50 addresses in the recipients' address book if they use Outlook as the mail client).
In 2001 active worms made a return to prominence. The first of these worms to be noticed was called Code Red. Code Red was a relatively simple worm which affected computers running Microsoft's Internet Information Server (IIS) web server. It infected over 350,000 servers in just over 12 hours. Once it infected a system Code Red waited for 20-27 days to launch denial of service attacks on several fixed IP addresses. (Including the IP address of the White House).

How do they spread?
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip.
If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.
Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading. According to Computer Economics, the associated damage from Code Red and Nimda came to $3.72 billion.

How to protect your computer?
  • Make sure you visit Windows Update site frequently.
  • Most antivirus programs also provide a feature that allows you to update their definitions automatically – make sure you enable that as well.
  • Remove Spyware and Adware.
  • Prevent Spam.
  • Basically there is no one absolute defense from anything – use a combination of software and hardware protection.
  • Don’t run files from unknown sources, and confirm with the sender the authenticity of any unexpected attachment, especially an executable file (*.exe, *.scr, *.bat, *.com, *.vbs, *.cmd, etc).

4 Comments:

At 7:50 AM, October 15, 2007, Anonymous Anonymous said...

top spywares antispyware reviews compare antispywares top spywares best antispywares compare anti-spywares best spywares best spywares best spywares top spywares top spywares top spywares best spywares best spywares top spywares top spywares compare antispywares best antispywares anti spyware programmes best spywares best spywares anti spyware anti spyware programs anti-spyware anti-spyware programs anti-spyware reviews spyware removal anti spyware programs anti spywares antispywares anti-spywares free anti spywares antispyware antispyware programs anti-spyware reviews best anti spywares best anti-spywares free anti-spywares free spyware scanners spyware removers xoftspy xoftspy se xoftspy-se anti spyware anti-spyware anti-spyware programs spyware removal compare anti-spywares antispyware programmes anti-spyware programmes top anti-spywares anti spyware reviews antispyware programs free spyware scans spyware softwares antispyware programmes top anti spywares anti spyware reviews anti spywares antispyware antispyware programmes antispywares anti-spywares best anti spywares free anti spywares free spyware scanners spyware removers top antispywares top anti-spywares anti spyware programmes anti-spyware programmes antispyware reviews free spyware scans top anti-spywares anti spyware programmes free antispywares best spywares best spywares best spywares top spywares top spywares top spywares compare antispywares antispyware programmes compare antispywares compare antispywares compare antispywares compare antispywares compare antispywares compare antispywares compare antispywares anti spyware programmes anti-spyware programmes top anti-spywares top anti spywares top antispywares compare anti-spywares free antispywares spyware softwares best anti spywares best anti-spywares best antispywares free anti-spywares free anti spywares free spyware scanners free spyware scans antispyware reviews xoftspy se xoftspy-se anti spyware reviews anti-spyware reviews antispywares anti-spywares anti spywares antispyware programs xoftspy antispyware anti-spyware programs anti spyware programs spyware removers anti spyware anti-spyware spyware removal

 
At 9:40 PM, December 10, 2007, Anonymous Anonymous said...

http://daninreallife.tripod.com
http://playgame100.tripod.com
http://websiteslinks1.tripod.com
http://aritnepaltrekking.tripod.com
http://aritnepal.tripod.com
http://wrestlingnews-wwe.blogspot.com
http://personalloans-rachana.blogspot.com
http://paris-hiltonactress.blogspot.com
http://celebrityinworld.tripod.com
http://katiecassidy1.tripod.com
http://sexandthecity.150m.com
http://websiteslinks.tripod.com
http://websiteslinks1.tripod.com
http://websiteslinks2.tripod.com
http://websiteslinks3.tripod.com
http://websiteslinks4.tripod.com
http://websiteslinks5.tripod.com

 
At 9:58 PM, December 30, 2007, Anonymous Anonymous said...

top spywares best spywares
top antispywares top antispywares
top spywares compare antispywares
anti spyware programmes antispyware programmes anti spywareprogrammes
best spywares best spywares
top spywares top spywares
best spywares antispyware programmes
antispyware programmes anti-spyware programmes
top anti-spywares top ant spywares
anti spyware programmes antispyware programmes3
antispyware programmes anti spywares
anti-spyware programmes
http://www.xanga.com/antispywares/632148857/best-spywares-2.html
http://www.xanga.com/antispywares/632148669/best-spywares-1.html
http://www.xanga.com/antispywares/632148594/best-spywares.html
http://www.xanga.com/antispywares/632148328/top-spywares-3.html
http://www.xanga.com/antispywares/632148216/top-spywares-2.html
http://www.xanga.com/antispywares/632149532/top-spywares-4.html
http://www.xanga.com/antispywares/632147976/top-spywares.html
anti spyware programmes
anti spyware programmes
anti-spyware programmes
anti-spyware programmes
antispyware programmes
antispyware programmes
antispyware programmes
antispyware programmes
antispyware programmes
free spyware scanners
free spyware scans
Antispywares
Best Antispywares
Best Anti Spywares
Top Anti Spywares
Top Antispywares


spyware softwares
free spyware scanners.html
xoftspy
xoftspy se
compare anti spywares
anti spyware programmes
anti spywares
free antispywares
free anti spywares
best anti spywares
best anti-spywares

 
At 8:29 PM, July 12, 2020, Blogger Unknown said...

Hello everyone on here my name is Fumo Sadiku living in Malindi City Kenyan I want to tell a little more about a good hearten man called Benjamin Breil Lee working with funding service as loan officer, Mr Benjamin Breil Lee helped me get a loan of 37,115,225.00 Shillings on my trying time trying to get back on my feet to raise my business I know there are some of you here who are in financial difficulties to talk to Mr Benjamin on what's app +1-989-394-3740 Or  also with his personal E-mail on lfdsloans@outlook.com I'm so glad for what he did for me and for his Bank accountant as well Accountant Hernandez Lucas Thank you very much for your work well done.

 

Post a Comment

<< Home