its all bout your stench

Wednesday, January 11, 2006

internet worms(ulod sa internet)

A big 'Thank you!' to everyone who donated in this fundraiser!Wikipedia founder Jimmy Wales's personal appeal for donations is still ongoing.
Tax-deductibility of donations - Budgets - Final daily report - Wikipedia merchandise
Computer worm
From Wikipedia, the free encyclopedia.
Jump to: navigation, search
A computer worm is a self-replicating computer program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. They are often designed to exploit the file transmission capabilities found on many computers. The main difference between a computer virus and a worm is that a virus can not propagate by itself whereas worms can. A worm uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, as their malicious activities are mostly confined within the target computer itself.
The name 'worm' was taken from The Shockwave Rider, a 1970s science fiction novel by John Brunner. Researchers writing an early paper on experiments in distributed computing noted the similarities between their software and the program described by Brunner and adopted the name.
The first implementation of a worm was by two researchers at Xerox PARC in 1978. [1] The authors, John Shoch and Jon Hupp, originally designed the worm to find idle processors on the network and assign them tasks, sharing the processing and so improving the whole network efficiency. [2]
The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University. It was released on November 2, 1988, and quickly infected a great number of computers on the Internet at the time. It propagated through a number of bugs in BSD Unix and its derivatives. Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.
In addition to replication, a worm may be designed to do any number of things, such as delete files on a host system or send documents via email. More recent worms may be multi-headed and carry other executables as a payload. However, even in the absence of such a payload, a worm can wreak havoc just with the network traffic generated by its reproduction. Mydoom, for example, caused a noticeable worldwide Internet slowdown at the peak of its spread.
A common payload is for a worm to install a backdoor in the infected computer, as was done by Sobig and Mydoom. These zombie computers are used by spam senders for sending junk email or to cloak their website's address.[3] Spammers are thought to pay for the creation of such worms [4] [5], and worm writers have been caught selling lists of IP addresses of infected machines.[6] Others try to blackmail companies with threatened DoS attacks.[7] The backdoors can also be exploited by other worms, such as Doomjuice, which spreads using the backdoor opened by Mydoom.
Whether worms can be useful is a common theoretical question in computer science and artificial intelligence. The Nachi family of worms, for example, tried to download then install patches from Microsoft's website to fix various vulnerabilities in the host system — the same vulnerabilities that they exploited. This eventually made the systems affected more secure, but generated considerable network traffic (often more than the worms they were protecting against), rebooted the machine in the course of patching it, and, maybe most importantly, did its work without the explicit consent of the computer's owner or user. As such, most security experts deprecate worms, whatever their payload.

In January 2002 programmer Simon Vallor was sentenced to two years in prison for releasing the "mass mailer" viruses Gokar, Admirer and RedesiB. [8] Vallor claimed he thought that the viruses were harmless. [9]
In February 2003, two people belonging to a group called "THr34t-Krew" were arrested in relation to the creation and release of the T-K Worm [10]. In May 2005 Andrew Harvey and Jordan Bradley admitted creating and releasing the T-K Worm which went on to infect 19,000 computers.[11]. In October 2005 Harvey received three months in prison and Bradley received six months. [12].

See also
Timeline of notable computer viruses and worms

External links
The Wildlist - List of viruses and worms 'in the wild' (i.e. regularly encountered by anti-virus companies)
Worm parasites - Listed worm descriptions and removal tools.
Jose Nazario discusses worms - Worms overview by a famous security researcher.
Computer worm suspect in court
Retrieved from ""
Category: Malware
Edit this page
Personal tools
Sign in / create account

if (window.isMSIE55) fixalpha();
Main Page
Community Portal
Current events
Recent changes
Random article
Contact us

What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Cite this article
In other languages
Tiếng Việt

This page was last modified 02:29, 7 January 2006.
All text is available under the terms of the GNU Free Documentation License (see Copyrights for details).
Privacy policy
About Wikipedia
if (window.runOnloadHook) runOnloadHook();


Post a Comment

<< Home