Worm


Computer worm in computer security, is a computer program that can reproduce themselves independently in the computer system. A worm can multiply itself by utilizing a network (LAN / WAN / Internet) without the need of user intervention itself. Worm does not like the usual computer viruses, which reproduce themselves by inserting the program itself to existing programs in computer, but the worms take advantage of the gap that was open keamanaan or better known as vulnerability. Some worms also spent the available bandwidth. Worm is an evolution of computer viruses. Only one way to overcome the worm is to close the security hole open, with how to update a patch or service pack from the operating system used with the patch or Service Pack of the most recent.

A computer virus can indeed infect files in a computer system, but the worm can do it better. In addition to being spread in a system, the worm can also spread to many systems over a network connected to the infected system. Some worms, may also include the virus code that can destroy files, steal documents, e-mail, or do other destructive things, or just make an infected system is not useful.

Some examples of the worm are as follows:

* ADMw0rm: Worm that can perform exploitation of network services Berkeley Internet Name Domain (BIND), by making buffer-overflow attacks.
* Code Red: Worm that can exploit the services of Internet Information Services (IIS) version 4 and version 5, by making buffer-overflow attacks.
* LoveLetter: worm that spreads by sending itself via e-mail to all accounts listed in the Address Book Microsoft Outlook Express contact list within Microsoft Outlook by using Visual Basic Script code (VBScript).
* Nimda
* SQL-Slammer

also visit our other blogs at http://askingsolution.blogspot.com/ find the best tricks and tips for your computer

Advertisements

Leave a comment

No comments yet.

Comments RSS TrackBack Identifier URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s