Computer worms

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Inserted introduction)
(Added History of Worms. No picture yet.)
Line 1: Line 1:
A '''[http://en.wikipedia.org/wiki/Computer_worm computer worm]''' is a self-replicating [http://en.wikipedia.org/wiki/Computer_program computer program].  Once on a host, it sends a copy of itself (through a network connection) to other systems, without any user intervention.  The worm then repeats this process on the new host.  Most security experts regard all worms as [http://en.wikipedia.org/wiki/Malware malware], because they generate network traffic, and perform functions without informing the user.
A '''[http://en.wikipedia.org/wiki/Computer_worm computer worm]''' is a self-replicating [http://en.wikipedia.org/wiki/Computer_program computer program].  Once on a host, it sends a copy of itself (through a network connection) to other systems, without any user intervention.  The worm then repeats this process on the new host.  Most security experts regard all worms as [http://en.wikipedia.org/wiki/Malware malware], because they generate network traffic, and perform functions without informing the user.
 +
 +
 +
 +
 +
== A Brief History of Everything Worms ==
 +
The first computer worm was created by John Shoch, at [http://en.wikipedia.org/wiki/Xerox_PARC Xeros PARC].  The program was named “tapeworm” after a program in a science fiction novel, [http://en.wikipedia.org/wiki/The_Shockwave_Rider “The Shockwave Rider”].  John’s research required him to install the same program on 100 different machines, on the same network.  So instead of manually installing the program on each machine, John created the first worm: it would seek out idle hosts on his network and install the program on them automatically.  Eventually, the worm became corrupt, which led it to crash the host.  There was a control worm, which would sense that it had lost a computer, and so it would send out another copy to another system, which would also crash.  This would keep happening until most of the computers on the network were not working.  Luckily, John had preloaded a failsafe against unpredictable circumstances, which he used to stop the worm.  [http://www.infosecwriters.com/text_resources/pdf/Computer_Worms_Past_Present_and_Future.pdf [1]]
 +
 +
<br>
 +
 +
One famous worm on the internet was the [http://en.wikipedia.org/wiki/Code_Red_worm Code Red Worm], which was put on the internet on July 13, 2001, and targeted [http://en.wikipedia.org/wiki/Microsoft Microsoft]’s [http://en.wikipedia.org/wiki/Internet_Information_Server IIS Web Server].  Code Red had instructions to do three things:
 +
<br>
 +
• Replicate itself for the first 20 days of each month
 +
<br>
 +
• Replace web pages on the infected server with a page containing the message “Hacked By Chinese”
 +
<br>
 +
• Launch a [http://en.wikipedia.org/wiki/Denial_of_service denial of service] attack on the IP address of the [http://en.wikipedia.org/wiki/White_House White House] web server.
 +
<br>
 +
It is one of the most famous worms because, at the time, it was believed that Code Red would bring the internet to a halt because it was replicating so quickly.  [http://computer.howstuffworks.com/virus5.htm [2]]

Revision as of 11:45, 9 April 2008

A computer worm is a self-replicating computer program. Once on a host, it sends a copy of itself (through a network connection) to other systems, without any user intervention. The worm then repeats this process on the new host. Most security experts regard all worms as malware, because they generate network traffic, and perform functions without informing the user.



A Brief History of Everything Worms

The first computer worm was created by John Shoch, at Xeros PARC. The program was named “tapeworm” after a program in a science fiction novel, “The Shockwave Rider”. John’s research required him to install the same program on 100 different machines, on the same network. So instead of manually installing the program on each machine, John created the first worm: it would seek out idle hosts on his network and install the program on them automatically. Eventually, the worm became corrupt, which led it to crash the host. There was a control worm, which would sense that it had lost a computer, and so it would send out another copy to another system, which would also crash. This would keep happening until most of the computers on the network were not working. Luckily, John had preloaded a failsafe against unpredictable circumstances, which he used to stop the worm. [1]


One famous worm on the internet was the Code Red Worm, which was put on the internet on July 13, 2001, and targeted Microsoft’s IIS Web Server. Code Red had instructions to do three things:
• Replicate itself for the first 20 days of each month
• Replace web pages on the infected server with a page containing the message “Hacked By Chinese”
• Launch a denial of service attack on the IP address of the White House web server.
It is one of the most famous worms because, at the time, it was believed that Code Red would bring the internet to a halt because it was replicating so quickly. [2]

Personal tools