Wednesday, March 16, 2011

computer worms by Sabrin Aimour

     Computer worms are programs that reproduce, execute independently without the need for a host files to spread through it, the main objective of it is distracting and slow down the network devices, rather than the goal of destroying files that exist in the hardware. There are key differences between a virus and worm in which they reproduces and spreads, a virus is dependent upon the host file or boot sector, and the transfer of files between computers to spread, also he cant spreads as fast as worms and he always cause a damage in computer whereas a computer worm can execute completely independently and spread on its own accord through network connections, spared so fast and it not always cause a damage when it attack computer .


      Vulnerabilities in operating systems my get the computer infected by a worm such as shred computers with weak passwords or through removable devices you can protect your computer by keeping the antivirus up-to-date and installing patches provided by operating system and application vendors also avoiding opening of attachments in your e-mail that you don’t trust the source (sender). You also can protect your computer by using programs that getting rid of worms and viruses such as; Cyber Defender Internet Security, Quick Heal Total Security, ESA Total Security, USB Flash Drive Auto Run Antivirus, and Panda Antivirus for Netbook.

     There are Different types of Computer Worms: Email Worms which Spreading goes via infected email messages. Instant Messaging Worms which spreading used is via instant messaging applications by sending links to infected websites to everyone on the local contact list. Internet Worms These ones will scan all available network resources using local operating system services and/or scan the Internet for vulnerable machines. Attempt will be made to connect to these machines and gain full access to them. IRC Worms such as Chat channels are the main target and the same infection/spreading method is used as above - sending infected files or links to infected websites. File-sharing Networks Worms it Copies itself into a shared folder, most likely located on the local machine. The worm will place a copy of itself in a shared folder under a harmless name. Now the worm is ready for download via the P2P network and spreading of the infected file will continue.

        We have many Computer worms' examples such as: The SQL Slammer Worm, the Blaster Worm, the Melissa worm, the Sobig worms, and the Mydoom worm. All spread through e-mail. These worms shared some features of a Trojan horse(attractive attachments names), in that they spread by tempting a user to open an infected e-mail attachment.

No comments:

Post a Comment