Deep understanding of network Worm Vulnerability Research

Source: Internet
Author: User
You know there will be bugs in apples, but do you know there will be "bugs" in the computer? Although these two kinds of insects are very different, but the study found that computer "bugs" in the derivative, destructive and other aspects of the nature of the worms have a lot of similarities. Today, we will come to a deeper understanding of what is the network "bugs", and its harm and prevention.
Old Pete sat in front of the computer and wrote an e-mail, a frown, and made a great noise when he hit the carriage.
"Damn bugs!" cried the man. I can't kill them with a few pesticides! They always hide from this tree and climb to the tree! These nasty bugs! The existing pesticides don't work! Hurry up and bring the new insecticide. The cost is not the problem, the important thing is my orchard! Look at the fruit on the verge of maturity, hurry up! My God! ”。 It turns out that old Pete's orchard is going through a worm crisis, and he has contacted agricultural pest control personnel today and is e-mailing them to come right away.


Worm source from
When it comes to worms, we are not strangers, and these lower-living creatures in nature feed on crops and bring economic losses to mankind. But if there is such a thing as "worm" in the computer, it also causes serious economic loss to mankind, you may think this is the Arabian Nights, how can the worm crawl into the computer?
November 2, 1988, the world's first computer worm was officially born. The first-year graduate student at Cornell University in order to verify that the computer program can reproduce between different computers, he wrote a trial program, in order to get the program into another computer, he wrote a crack user password code. At 5 in the morning of November 2, this program, called Worm, began its journey (Figure 1), and it did not live up to Morris's expectations that it climbed into thousands of computers, causing them to crash, resulting in a record of economic losses of up to 96 million dollars. Since then, the term "worm" spread, Morris may not know: He proved this conclusion, but also opened the box Pandora.


Fig. 1 The initial model of the worm.



Bugs crawling into the machine
After a while, old Pete received two emails, one is the response of pest control personnel, they said that will come soon; another is a little strange, is a strange address sent, the content is more strange, only one line of words: "hey,is that your photo?". Maybe it was some kid's prank, and old Pete dropped the mail. But old Pete never dreamed that he had an unwelcome "guest" in the computer he used to manage the orchard.
Since 1988, when the first worm has shown its power, more and more people have joined the worm-making camp, using this approach to prove their abilities, or to achieve some special purpose, so that a variety of worms are born. But whatever the worm's "behavior" (the things they do when they get into the computer), there are only a handful of "ways to spread": email, Web code, social engineering, and system vulnerabilities.
Next, let's look at some of the main ways worms get into the computer.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.