Comments: Worms are common computer viruses. It uses the network for replication and transmission, and the transmission path is through the network and email. A worm is a self-contained Program (or a set of programs) that can spread copies of its own functions or some part of it to its worm.In his computer system (usually through a network connection ). Note that
A worm is a self-contained program (or set of programs) that propagates copies of its own functionality or parts of it to its worm.
In his computer system (usually through a network connection). Note that unlike the general virus, worms do not have to attach themselves to the host program, and there are two types of worms: the host
Not much nonsense to go directly to the topic ~ ~ ~ (if it really is a worm virus)
1. Discontinuation of the process
Press the "Ctrl+alt+del" key combination, select the Processes tab in Windows Task Manager, look for "msblast.exe" (or "Teekids.exe", "Penis32.exe"), select it, and then click "End Process" below. Button.
Tip: If you cannot run Windows Task Manager, you can enter cmd in start → Run to open the Command Prompt window and enter the foll
According to rising global anti-virus monitoring network, there is a virus worth noting today, it is: "MSN photo Worm variant D (Worm. Win32.MSNPhoto. d)" virus. The virus will automatically send a compressed file named "“myphotos2007.zip" to the msnfriends. After the virus is run, the user will be poisoned.
Popular Viruses today:
"MSN photo Worm variant D (
QQ Sticky worm is a virus, is to use a false QQ landing page to deceive you, so that your QQ number stolen away! The danger is great! Small partners must pay attention, serious precautions!
QQ Sticky worm transmission way:
1, disguised as a QQ brush drilling tools, game plug,2, disguised as a variety of QQ friends to send documents, mainly Office documents mainly.
QQ Sticky Pest Hazard:
Specializing in
For the dynamic planning, I will not say more. Because not yet,Each question is different, but the general principle is the same. Catch test instructions,Subject: N tree, Caterpillar in M minutes from p to t route species, caterpillars can only go to the left and right adjacent positions.Center Code:For(I=1; I; I+ +) for (J = 1; j ; J+ +) DP[i][j] + = DP[i- 1][j-1] + DP[i-1][j+1];The number of species that traverse the locations of all possible points of time, and finally the number of M-minute
EndurerOriginal
2006-01Version
A friend of mine sent his mobile hard disk to a computer and used it normally in the morning. However, there was an error message about data protection in the afternoon.
This friend's computer uses Win XP SP2. Because it is not connected to the Internet, he cannot download software such as hijackthis from the Internet for analysis.
The task manager finds a process named wincfg
seed to generate the 128bit Botid
3. Randomly picking up the ip/udp Port of a static array that is carried by itself
4. Keeping a part of the bot information in the configuration file.
You can find these botid from the Peer-to-peer configuration file named "Glok+serv.config" which is dropped by this worm. The contents of this file were described earlier.
An example of how to translate the Botid this is saved in Glok+serv.config
Analysis of Botnet co
to the vast number of computer users to provide a huge amount of information, it is painful to find useful information in such a large ocean of information, and to solve this search problem on the web, a group of enthusiastic technicians began experimenting with the "worm" program, conceived in the classic science fiction "Radio Knight", The novel describes a program called "Tapeworm", which can be found i
Worm program worm. win32.autorun. DG Solution
Virus name
Worm. win32.autorun. DG
Capture Time
2007-10-14
Virus symptoms
The virus is a worm program written in Delphi. It is 25,600 bytes in length, the icon is a regular executable file icon, and the virus extension is exe.
Virus analysis
After the
Encounter worm. win32.viking. lm/worm. Viking. tc, Trojan. psw. win32.onlinegames, etc. 2
EndurerOriginal1Version
Seeing C:/Windows/richdll. dll and O4-HKLM/../run: [load] C:/Windows/uninstall/rundl132.exe reminds me of Viking ......
Stop and disable windowsdown (windows_systemdown)
Uninstall Baidu super souba
Download and install the rising star Kaka Security Assistant, select [advanced functions], and unm
Discuz X1.5 stores XSS in places where friends are added, where XSS interacts with the user to spread the worm exponentially.Location to add friendsThe effect after X finishesTrigger after clickOK with this storage XSS, we do worm propagation, DZ's session cookie is wounded http-only, but the effect of XSS is to get access to the user session under your current domain . This does not interfere with our worm
A website that publishes worm. win32.otwycal. c/worm. win32.infei.
Original endurerSupplement the reply from rising in version 2ndVersion 1st
This website homepage containsCode:/---Document. Write ("---/
#1 hxxp: // A **. 1 ** 58d ** m.com/b2.htm (Kaspersky has detected: TrojanProgramTrojan-Clicker.HTML.IFrame.mv) contains code:/------/
#1.1 hxxp: // B **. 1 ** 58d ** m.com/one/ OK .js
Download hxx
1. Virus labels:
Virus name: Worm. Win32.Skipi. B
Virus Type: Worm
File MD5: 9fc5fad65fb0dae7b5370607d103aa80
Public scope: full public
Hazard level: 5
File length: 188,416 bytes
Infected system: Windows 98 or later
Development tools: Microsoft Visual C ++ 7.0
Shelling type: no shell
2. Virus description:
The virus is a worm. an executable file with an extension
China Mobile Weibo storage XSS worm (with worm POC)
1. Forward Weibo2. Posting new Weibo posts3. Listen to me
The problem lies in the long Weibo post of China Mobile Weibo.
You can insert 30 characters of code without filtering the title.
Page with question: http://weibo.10086.cn/cwb/article.php? Id = 10404Once you log on to the China Mobile Weibo account to open this page, it will forward my weibo accoun
Wonderful!ArticleThis topic describes how Samy worm bypasses Myspace's security mechanism, successfully spreading this "interesting" worm, infected millions of people within 20 hours, and added the author to their my heroes list, eventually, many accounts are lost.Here is the story.Here is the technical details.Here is the author's interview.Well, we should talk to the security personnel in the Department.
EndurerOriginal
2006-10-08 th
1Version
The information automatically sent by QQ is:/--------Check out my recent photos ~~~ To scan the Q-zone space. Is it too explicit ....
Hxxp: // Q-zone. *** QQ. c0m. % 34% 76% 30 *** % 2e % 63% 6e/** Photo/cgi_bin 387 ** 381/--------/
Click the header of the webpage opened by this link to use the Javascript script code encrypted by the custom function psw. After decryption:/----------------/
MM ***. htmThe script program starting with htmlship encryption is
You know there will be bugs in apples, but do you know there will be "bugs" in the computer? Although these two kinds of insects are very different, but the study found that computer "bugs" in the derivative, destructive and other aspects of the nature of the worms have a lot of similarities. Today, we will come to a deeper understanding of what is the network "bugs", and its harm and prevention.
Old Pete s
: Worms This biological term in 1982 by Xerox PARC John F. Shoch and other people to introduce the computer field [30], and gives the two most basic features of the computer worm: "You can move from one computer to another" and "Copy yourself." Their purpose in compiling the worms is to do a model test of distributed c
Now the biggest threat to everyone's computer is the network worm virus! The damage of the network worm is simply astonishing, from the famous "Love Bug" to "Happy Time" to "Red Code", its destructive power is more and more strong, so we need to understand the network worm virus.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.