Our computer is constantly being attacked by viruses. These viruses goal is to just demolish our computers. Viruses can be acquired by our computer through corrupt files.
One of the ways we can be able to be infected with corrupt files is through the internet. The internet is a world where we all share lots and lots of information. However, these things come at a price sometimes. There are viruses that come and go as we share information, files and data.
One of those things that can corrupt our computer online is worms. These worms reproduce independently and travel across the network connections. A worm differs from a virus in how they reproduce and spread.
Viruses are dependent on host files or boot sectors and the virus will spread due to the sharing of files between tow machines.
Kinds of Computer Worms:
The spread of the virus is due to infected emails. There will be an attachment or a link that is infected. The worm will be activated when you either click on the attachment or the link.
The known methods of the email worm to spread are the following: MS outlook servers, direct connection of SMTP servers that use their very own SMTP API and the Windows MAPI functions.
This worm will then harvest an infected computerís email addresses to send out the worm. It will harvest it from the following: WAB or windows address book database, MS outlook address book and files that also have appropriate extensions will be scanned to serve as strings via the email.
During the sending period, some worms will construct new sender addresses. It will be based on possible names combined with domain names that are common. So the sender doesnít necessarily need to be the originator.
Instant Message Worms:
A person will be sent an infected link via instant messaging mediums such as Yahoo Messenger or MSN. The only difference it has from email worms is how they are sent.
These worms will scan all available network resources. It will then use the local operating system services and scan the Internet for machines that are vulnerable. It will then attempt to connect with these machines and try to gain full access.
Another way these worms work is that they scan the Internet for machines that are vulnerable to be exploited. It will then send data packets that will install the worm or a form of worm downloader.
The worms here work the same as email worms. The only difference is that the medium is the chat channels. A person you are chatting with will send files or links that are infected.
It copies itself on a shared folder of the local machine. It will place a copy of itself in a folder disguised in a harmless name. The worm will then become ready to be downloaded via P2P and the infected file will then spread.