![]() ![]() These directly penetrate the computer memory, and the worm code is then activated.Ĭomputer worms can exploit network configuration errors (for example, to copy themselves onto a fully accessible disk) or exploit loopholes in operating system and application security. Some worms are spread as network packets.Via P2P (peer-to-peer) file sharing networks.Via a link sent in an ICQ or IRC message. ![]() Most known computer worms are spread in one of the following ways: The Viruses and Worms subclass of malicious software programs includes the following: Because each subsequent copy of a network worm can also self-replicate, infections can spread very rapidly via the internet and computer networks. Once a worm has made its way onto your system, usually via a network connection or as a downloaded file, it can then make multiple copies of itself and spread via the network or internet connection infecting any inadequately-protected computers and servers on the network. Worms, on the other hand, don't need a host program in order for them to run, self-replicate and propagate. Once a virus finds its way onto your system, it will remain dormant until the infected host file or program is activated, which in turn makes the virus active enabling it to run and replicate on your system. They often spread via P2P file sharing, infected websites, and email attachment downloads. Viruses are typically attached to an executable file or a word document. Morris (1991) court case resulted in the first conviction under the 1986 Computer Fraud and Abuse Act, with Morris receiving a sentence of three years in prison, 400 hours of community service and a $10,000 fine.An important distinction between computer viruses and worms is that viruses require an active host program or an already-infected and active operating system in order for viruses to run, cause damage and infect other executable files or documents, while worms are stand-alone malicious programs that can self-replicate and propagate via computer networks, without human help. It also, caused some users’ machines to be infected many times - once too many Morris Worm processes were running on a target machine it would run out of computing resources and begin to malfunction. This practice of “1-in-7 re-infection” ensured that a user could not completely avoid a Morris Worm infection by creating a fake Morris Worm process to pretend his or her machine was already infected. If a target machine had already been infected, the Morris Worm would re-infect it 1 in 7 times. The worm spread by exploiting vulnerabilities in UNIX send mail, finger, and rsh/rexec as well as by guessing weak passwords.īefore spreading to a new machine, the Morris Worm checked if the machine had already been infected and was running a Morris Worm process. ![]() According to Morris, the purpose of the worm was to gauge the size of the precursor “Internet” of the time - ARPANET - although it unintentionally caused denial-of-service (DoS) for around 10% of the 60,000 machines connected to ARPANET in 1988. ![]() The Morris Worm was a self-replicating computer program (worm) written by Robert Tappan Morris, a student at Cornell University, and released from MIT on November 2, 1988. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |