Search results
Results from the WOW.Com Content Network
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. [1] It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
The worm was most widespread in its "Sobig.F" variant. As of 2018 [update] , Sobig is the second fastest computer worm to have ever entered the wild, being surpassed only by Mydoom . Sobig was not only a computer worm in the sense that it replicates by itself, but also a Trojan horse in that it masquerades as something other than malware .
This is an accepted version of this page This is the latest accepted revision, reviewed on 7 December 2024. Computer program that modifies other programs to replicate itself and spread Hex dump of the Brain virus, generally regarded as the first computer virus for the IBM Personal Computer (IBM PC) and compatibles A computer virus is a type of malware that, when executed, replicates itself by ...
It provides a backdoor server and allows a remote intruder to gain access and control over the computer via an IRC channel. WANK: OILZ October 1989 Spread a pacifist, anti-nuclear political message. Welchia: Nachia, Nachi A helpful worm meant to install security patches and removes Blaster worm if the computer is infected by it. Witty: March 19 ...
Virus & worms: Attacks through the internet, emails or contaminated files, then automatically replicates itself. Viruses require human action to spread to other computers, whereas worms spread by ...
November 10: Agobot is a computer worm that can spread itself by exploiting vulnerabilities on Microsoft Windows. Some of the vulnerabilities are MS03-026 and MS05-039. [35] November 20: Bolgimo is a computer worm that spread itself by exploiting a buffer overflow vulnerability at Microsoft Windows DCOM RPC Interface. [36]
Other than propagating itself, the worm does no further damage to an infected computer. [25] [26] The worm typically uses port 25 to spread, but uses port 119 if port 25 is not available. [24] The executable of the worm is 10,000 bytes in size; a list of spammed newsgroups and mail addresses is stored on the infected hard drive.
The worm showed a vulnerability in software distributed with IIS, described in Microsoft Security Bulletin MS01-033, [5] for which a patch had become available a month earlier. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated letter 'N' to overflow a ...