People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.
Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.
What's a worm?
A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.
How do they spread?
When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).
If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.
After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.
Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.
Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.
What do they do?
Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.
But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.
The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.
The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.
The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.
How do I get rid of them?
The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.
Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)
Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.
Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.
As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.
Subscribe to:
Post Comments (Atom)
Counter
Labels
- About Domain Names (4)
- Android Hacks (2)
- Anti Yahoo booter (1)
- AOL hack (1)
- Broadband Hacking (5)
- Browser Tricks (1)
- Bsnl hack (1)
- Cell Phone Hacking (7)
- Computer hacks (24)
- Cracks/Serials (3)
- DataBase hacking (2)
- Defender (1)
- E-books for Hacking (4)
- Ethical hacking (15)
- Exciting Links.. (14)
- Facebook hack (2)
- FireFox hack (2)
- Free Downloadings (1)
- G-TALK Hacking (3)
- Gmail Hacking (2)
- Google Chrome (1)
- Google Hacking (2)
- Hack Airtel (5)
- Hack Vodafone (2)
- Hacking (62)
- Hotmail hack (3)
- Important Articles (16)
- Important Utility Softwares (35)
- Increase download speed (1)
- Innovations Articles (5)
- Intel Core i 7 (1)
- ip (2)
- ip hack (6)
- iPad (1)
- Key Logger (1)
- Lan Hacking (1)
- LInux (11)
- MegaUpload Hack (4)
- Mobile Hacks (14)
- Msn hacks (4)
- Nero (Linux) (1)
- Networking (6)
- Office (1)
- Operating Sysytems (24)
- Oracle 11g (2)
- Orkut goodies (3)
- Orkut Hacking (8)
- Password Hacking (6)
- phone unlocking (2)
- Programming softwares (3)
- Proxy (1)
- Proxy links (1)
- Rapid share hacks (10)
- Security (5)
- Skype hacking (1)
- Special Antiviruse (1)
- Theme for XP (3)
- Themes for Window 7 (1)
- Trojan (6)
- Usb Secuirty (3)
- Viruse (9)
- Website hacking (7)
- Windows 8 (2)
- Wireless Hacking (7)
- Xp Tweeks (5)
- Yahoo Hack (3)
- Yahoo messnger hack (6)
- You Tube Hack (1)
- Zapak hacking (4)
Followers
Blog Archive
-
▼
2009
(264)
-
▼
June
(61)
- New Airtel Hack for 100% free Sms
- Hack passwords with Cain and Abel
- How to find invisible users on Instant Messengers
- Rapidshare Premium link Generators (Unlimited down...
- Windows Vista Quattuor | 2.46 GBThis OS has been m...
- Windows Vista Black Eternity x86 (Genuine Version)
- 15 Tips to Improve your Linux Experience
- WEP Cracking, FBI Style( In Just 3 Minutes ) !
- Access Data of a Password Protected User in Window...
- How to safely uninstall Linux when Dual boot insta...
- How to convert Firefox into Fasterfox
- Gmail Account Hacking Tool
- Vodafone Hack for Free GPRS
- !!…Premium Accounts…!! { 16 Download Sites }
- DIY: Ripping off Windows XP using Backtrack Linux ...
- How do people boost download speed in LAN internet
- PicaSafe 2.0.207
- Nero (Linux)
- Virtual Plastic Surgery Software v.1.2
- SYMBIAN VIRUSES......
- Tools I Recommend -Must For All hackers
- The Viruse Make
- Latest Orkut hack(100% working)
- Samsung Mobile Service Center CODES
- Samsung D series hack
- Nokia All Codes
- MOTOROLLY CODES
- Mobile Secret Codes
- Mobile Cheat स्तुफ्फ NOKIA
- SAMSUNG SECRET CODES (NEW)
- BSNL hack for Internet
- Reliance Hack For free SMS
- Hack for Make FREE Calls.
- Hack Airtel Live to use Yahoo messenger for फ्री
- Mobile cheat codes fr all phones
- HowTo Use your mobile phone as a remote control fo...
- How to Make your own Linux
- Windows 7 Cheat Sheet
- Free Airtel GPRS using TeaShark Browser
- Connecting two buildings to one broadband service ...
- Build your own executable crypter
- Batch File To Disable Firewall-Windows Xp Sp2
- Tools to Automate rapid share Downloading
- Netcat Tips and Tricks
- Simple Batch Viruse explained
- How to create a backdoor using netcat
- Basics ARP Poison routing
- How does worm works
- WHAT IS CLICKJACKING
- Hack Airtel: Free Airtel Internet GPRS
- Airtel Hack for Broadband Internet- increase your ...
- Team Viewer
- Linux Mint 7 Gloria
- Why Is PCLinuxOS 2007 Better Than Ubuntu ?
- Invisible OS Boot Option - Hacking Grub
- Hacking an email
- How To Defend An Input Validation Attack
- For the Linux Novice
- Build your own network at home
- Autorun Viruse Killer!
- Make your USB drive free from virus
-
▼
June
(61)
Subscribe Via Email &Sms
Also Subscribe Via Sms Just click here to follow via
SMS
0 comments:
Post a Comment