Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Computer worm

Index Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. [1]

48 relations: ACL (software company), Antivirus software, Backdoor (computing), Bandwidth (computing), Botnet, CERT Coordination Center, Code Shikara, Computer and network surveillance, Computer Fraud and Abuse Act, Computer network, Computer program, Computer virus, Cornell University, Daemon (computing), Data theft, Denial-of-service attack, Email spam, Ethernet, ExploreZip, Firewall (computing), ILOVEYOU, Institute of Electrical and Electronics Engineers, John Brunner (novelist), John Shoch, Malware, Master status, Morris worm, Mydoom, Network switch, Null route, PARC (company), Patch Tuesday, Payload (computing), Phishing, Ransomware, Robert Tappan Morris, Router (computing), Self-replicating machine, Spyware, TCP Wrappers, The Shockwave Rider, Timeline of computer viruses and worms, Trojan horse (computing), Welchia, Xerox Alto, XSS worm, Zero-day (computing), Zombie (computer science).

ACL (software company)

ACL Services Ltd.

New!!: Computer worm and ACL (software company) · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Computer worm and Antivirus software · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Computer worm and Backdoor (computing) · See more »

Bandwidth (computing)

In computing, bandwidth is the maximum rate of data transfer across a given path.

New!!: Computer worm and Bandwidth (computing) · See more »

Botnet

A botnet is a number of Internet-connected devices, each of which is running one or more bots.

New!!: Computer worm and Botnet · See more »

CERT Coordination Center

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.

New!!: Computer worm and CERT Coordination Center · See more »

Code Shikara

Code Shikara is a computer worm, related to the Dorkbot family, that attacks through social engineering.

New!!: Computer worm and Code Shikara · See more »

Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

New!!: Computer worm and Computer and network surveillance · See more »

Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984.

New!!: Computer worm and Computer Fraud and Abuse Act · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Computer worm and Computer network · See more »

Computer program

A computer program is a collection of instructions for performing a specific task that is designed to solve a specific class of problems.

New!!: Computer worm and Computer program · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Computer worm and Computer virus · See more »

Cornell University

Cornell University is a private and statutory Ivy League research university located in Ithaca, New York.

New!!: Computer worm and Cornell University · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Computer worm and Daemon (computing) · See more »

Data theft

Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, such as USB flash drives, iPods and even digital cameras.

New!!: Computer worm and Data theft · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Computer worm and Denial-of-service attack · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Computer worm and Email spam · See more »

Ethernet

Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).

New!!: Computer worm and Ethernet · See more »

ExploreZip

ExploreZip, also known as I-Worm.ZippedFiles, is a destructive computer worm which attacks machines running Microsoft Windows.

New!!: Computer worm and ExploreZip · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Computer worm and Firewall (computing) · See more »

ILOVEYOU

ILOVEYOU, sometimes referred to as Love Bug or Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs".

New!!: Computer worm and ILOVEYOU · See more »

Institute of Electrical and Electronics Engineers

The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.

New!!: Computer worm and Institute of Electrical and Electronics Engineers · See more »

John Brunner (novelist)

John Kilian Houston Brunner (24 September 1934 – 25 August 1995) was a British author of science fiction novels and stories.

New!!: Computer worm and John Brunner (novelist) · See more »

John Shoch

John F. Shoch is an American computer scientist and venture capitalist who made significant contributions to the development of computer networking while at Xerox PARC, in particular to the development of the PARC Universal Protocol (PUP), an important predecessor of TCP/IP.

New!!: Computer worm and John Shoch · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Computer worm and Malware · See more »

Master status

In sociology, the master status is the social position that is the primary identifying characteristic of an individual.

New!!: Computer worm and Master status · See more »

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet.

New!!: Computer worm and Morris worm · See more »

Mydoom

Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and "'Shimgapi'", is a computer worm affecting Microsoft Windows.

New!!: Computer worm and Mydoom · See more »

Network switch

A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device.

New!!: Computer worm and Network switch · See more »

Null route

In computer networking, a null route (blackhole route) is a network route (routing table entry) that goes nowhere.

New!!: Computer worm and Null route · See more »

PARC (company)

PARC (Palo Alto Research Center; formerly Xerox PARC) is a research and development company in Palo Alto, California, with a distinguished reputation for its contributions to information technology and hardware systems.

New!!: Computer worm and PARC (company) · See more »

Patch Tuesday

Patch Tuesday (also known as Update Tuesday) is an unofficial term used to refer to when Microsoft regularly releases security patches for its software products.

New!!: Computer worm and Patch Tuesday · See more »

Payload (computing)

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message.

New!!: Computer worm and Payload (computing) · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Computer worm and Phishing · See more »

Ransomware

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

New!!: Computer worm and Ransomware · See more »

Robert Tappan Morris

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet. Morris was prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act. He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y Combinator—both with Paul Graham. He later joined the faculty in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, where he received tenure in 2006.

New!!: Computer worm and Robert Tappan Morris · See more »

Router (computing)

A router is a networking device that forwards data packets between computer networks.

New!!: Computer worm and Router (computing) · See more »

Self-replicating machine

A self-replicating machine is a type of autonomous robot that is capable of reproducing itself autonomously using raw materials found in the environment, thus exhibiting self-replication in a way analogous to that found in nature.

New!!: Computer worm and Self-replicating machine · See more »

Spyware

Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Computer worm and Spyware · See more »

TCP Wrappers

TCP Wrappers (also known as tcp_wrappers) is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD.

New!!: Computer worm and TCP Wrappers · See more »

The Shockwave Rider

The Shockwave Rider is a science fiction novel by John Brunner, originally published in 1975.

New!!: Computer worm and The Shockwave Rider · See more »

Timeline of computer viruses and worms

This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.

New!!: Computer worm and Timeline of computer viruses and worms · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Computer worm and Trojan horse (computing) · See more »

Welchia

The Welchia worm, also known as the "Nachi worm", is a computer worm that exploits a vulnerability in the Microsoft remote procedure call (RPC) service similar to the Blaster worm.

New!!: Computer worm and Welchia · See more »

Xerox Alto

The Xerox Alto is the first computer designed from its inception to support an operating system based on a graphical user interface (GUI), later using the desktop metaphor.

New!!: Computer worm and Xerox Alto · See more »

XSS worm

An XSS worm, sometimes referred to as a cross site scripting virus, is a malicious (or sometimes non-malicious) payload, usually written in JavaScript, that breaches browser security to propagate among visitors of a website in the attempt to progressively infect other visitors.

New!!: Computer worm and XSS worm · See more »

Zero-day (computing)

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).

New!!: Computer worm and Zero-day (computing) · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Computer worm and Zombie (computer science) · See more »

Redirects here:

Computer worm payload, Computer worms, E-mail worm, Internet Worm, Internet worm, Payload (computer worm), Worm (computer virus), Worm (computing), Worm (software), Worm program, Worm.Win32.

References

[1] https://en.wikipedia.org/wiki/Computer_worm

OutgoingIncoming
Hey! We are on Facebook now! »