Welcome to YLOAN.COM
yloan.com » Computers & Internet » Top Three Most Pernicious Computer Worms
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Top Three Most Pernicious Computer Worms

Top Three Most Pernicious Computer Worms

Top Three Most Pernicious Computer Worms

Computer viruses and worms are very dangerous to your computer. Once they infect your system, they cause you problems. A virus attaches itself to a program, and then it can also attach itself to your computer system by incorporating a small portion of data into other programs. A computer worm, on the other hand, is just a sub-classification of a virus. But even at this, it is also as dangerous to your system as a computer virus. Almost all antivirus firewall software programs today are able to catch not only viruses but also worms.

A worm contains a computer program that has the ability to replicate or copy itself. Also, it wiggles its way through the computer system or network, just like a real worm, until it is able to find its way to the Internet. In contrast with viruses, worms are not dependent on people's actions. Instead, they depend on the network that they are able to penetrate. These worms have become rampant since connecting to the Internet nowadays is very easy and a is common thing that many people do.

Of all the worms out there, there are worms known for the tremendous damage that they have done and caused to computer systems world wide.

The number one most pernicious worm in computer history is the Morris worm. It is not a recent worm, but its destructive capability was so great that it was also known as the Great Worm. This was made by a student in Cornell University who wanted to know how big the Internet was. It turned out that it was not made for malicious reasons, and that it just happened to cause such a big fiasco by increasing load averages on UNIX machines. It was also a very costly worm for causing around millions of dollars worth of damage.

The second most known and notorious worm is the ILOVEYOU worm, also known as the love bug worm. This worm became very famous in 2000. If you have been already initiated to email at that time, you might have received an email with the subject line "I LOVE YOU", thus explaining where the worm got its name. This worm was considered to be one of the most costly worms there is in computer history. Contacts found in the users' Microsoft Outlook contacts is used by the worm in spreading itself. It disguises itself as an attachment and sends itself to unsuspecting recipients.

Then, there was the Nimda worm. Nimda is the third most destructive worm there is, and its name is actually the word "admin" spelled backwards. This worm has infected many computers by exploiting through email. It finds email addresses located in the users' computers and spreads itself in this manner. Many drives of different users were shared without their consent because of this worm.

The top three worms above are not the only worms that you should be careful of. There are still a lot of worms circulating around networks and in the Internet, and all are dangerous and may cause great damage to your computer system. As a safety measure, always ensure that your your antivirus firewall software application is always running on your computer.
Are Free Antivirus Programs Reliable? Recondition Battery - Reconditioning Lead Acid Batteries Does Global Anti Virus USB Scanner Really Work? Global Anti Virus Review Antivirus Installation: The Only Way To Combat With Hazardous Computer Viruses Finding About The Usage Of USB Phone Adapter Not All Commercial Printers Are Created Equal What Makes You Think That Lead Programs Are Good For Cable Tv Deals? Avcware Ipod To Ipod Computer Itunes Transfer Laptops Help For Working Duracell Strengthens Usb Getting Models Buying Blue Ray DVD Players Iskysoft Dvd Ripper For Mac Serial Why a Memory Foam Contour Pillow is Great In your Sleep
print
www.yloan.com guest:  register | login | search IP(3.139.95.77) / Processed in 0.008662 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 15 , 3188, 55,
Top Three Most Pernicious Computer Worms