Gain an in-depth understanding of Network Worms

Source: Internet
Author: User

You know there will be bugs in the apple, but do you know there will also be bugs in the computer? Although the two insects are completely different, research has found that computer "worms" are similar to natural worms in derivative and destructive aspects. Today, let's take a closer look at what is a network bug, as well as its hazards and prevention.
When Peter sat in front of the computer and wrote an email, He frowned and made a loud noise even when he knocked on the carriage return.
"Damn bugs! I have used several pesticides and can't kill them! They are always hiding. They climbed from this tree to that tree! These nasty bugs! Existing pesticides are useless! Hurry up and bring new pesticides. Hurry up! Cost is not a problem. What matters is my orchard! As the fruit is about to mature, hurry up! God !". It turns out that old Pete's orchard is experiencing a worm crisis. Today he contacted the agricultural pest control personnel and is sending an email asking them to come immediately.

Worm Source
When it comes to worms, everyone will be familiar with them. These low creatures in nature feed on crops and bring economic losses to humans. However, if such a worm exists in a computer, it will also cause serious economic losses to humans. You may think that this is a fantasy. How can worms crawl into a computer?
In November 2, 1988, the world's first computer worm was born. In order to verify computerProgramWhether the program can be self-replicated and transmitted between different computers, he wrote a test program, in order to allow the program to smoothly enter another computer, he wrote a piece of code to crack the User PasswordCode. At Am, November 2, the program called "worm" (worm) started its journey (figure 1) and it did not live up to Morris's expectations: it climbed into thousands of computers and crashed them, resulting in a recording of economic losses of up to $96 million. Since then, the term "worm" has been spread out, and Morris may not know: while proving this conclusion, he also opened Pandora's magic box.

Figure 1 Initial Worm Model.

worms crawling into the machine
after a while, old Pete received two emails, one of which was a reply from the pest control personnel. They said they would come soon; the other one is a bit strange. It is sent from a strange address, and the content is more strange. There is only one line: "Hey, is that your photo? ". Maybe it's a child prank. Old Pete just deleted the email. However, old Peter never dreamed that he had come to an undesirable "guest" on the computer used to manage the orchards ".
since the first worm showed its power in 1988, more and more people have joined the worm production camp. They have used this way to prove their capabilities or achieve some special purposes, so a variety of worms were born. However, no matter how many worm "behavior patterns" (what they need to do after entering the computer), there are only a handful of "propagation methods: email, Web code, social engineering, and system vulnerabilities.
let's take a look at the main ways in which worms enter the computer.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.