Basic Computer Terms Defined | Computer Accessories - The Basic Necessities | Computer Operating Systems - The Basics| Computers - Build Your Own or Buy?
Computer Scams and Fraud - How To Avoid Being A Victim
Tips For Keeping Your Kids Safe On The Computer
The Least You Should Know About Email Attachments And Computer
Tips On Buying A New Computer

Advertising

Your Computer - Is A Firewall Necessary?
Basic Principles In Web Site Design
Choosing The Best Web Hosting
What Your Customers Want From Your Web Site

Hardware: What Makes Computers Work
Bugging Their Way: Computer Worms
Memory Madness
Installing the CPU

It's Never Too Late To Upgrade Your Computer
Basic Hardware Components of Computers
Video Cards: Gaming or Working?
Shopping Guide For Computer Hardware

The Quality Of Monitors
Be Smart About Search Engine Optimization
CD / DVD Roms
The Learning Process of Web Development

 
Bugging Their Way: Computer Worms
Our computer is constantly being attacked by viruses. These viruses goal is to just demolish our computers. Viruses can be acquired by our computer through corrupt files.

One of the ways we can be able to be infected with corrupt files is through the internet. The internet is a world where we all share lots and lots of information. However, these things come at a price sometimes. There are viruses that come and go as we share information, files and data.

One of those things that can corrupt our computer online is worms. These worms reproduce independently and travel across the network connections. A worm differs from a virus in how they reproduce and spread.

Viruses are dependent on host files or boot sectors and the virus will spread due to the sharing of files between tow machines.

Kinds of Computer Worms:

E-mail worms:
The spread of the virus is due to infected emails. There will be an attachment or a link that is infected. The worm will be activated when you either click on the attachment or the link.

The known methods of the email worm to spread are the following: MS outlook servers, direct connection of SMTP servers that use their very own SMTP API and the Windows MAPI functions.

This worm will then harvest an infected computerís email addresses to send out the worm. It will harvest it from the following: WAB or windows address book database, MS outlook address book and files that also have appropriate extensions will be scanned to serve as strings via the email.

During the sending period, some worms will construct new sender addresses. It will be based on possible names combined with domain names that are common. So the sender doesnít necessarily need to be the originator.

Instant Message Worms:
A person will be sent an infected link via instant messaging mediums such as Yahoo Messenger or MSN. The only difference it has from email worms is how they are sent.

Internet Worms:
These worms will scan all available network resources. It will then use the local operating system services and scan the Internet for machines that are vulnerable. It will then attempt to connect with these machines and try to gain full access.

Another way these worms work is that they scan the Internet for machines that are vulnerable to be exploited. It will then send data packets that will install the worm or a form of worm downloader.

IRC worms:
The worms here work the same as email worms. The only difference is that the medium is the chat channels. A person you are chatting with will send files or links that are infected.

File-sharing Worms:
It copies itself on a shared folder of the local machine. It will place a copy of itself in a folder disguised in a harmless name. The worm will then become ready to be downloaded via P2P and the infected file will then spread.

Copyright © 2014-2021