- Computer Networking Basics
- Computer Networking Home
- Application of Networks
- Sharing through Network
- Access to Remote Database
- Communication Facilities
- Evolution of Networking
- Arpanet
- Internet
- Interspace
- Elementary Terminology
- Nodes (Workstations)
- Server
- Network Interface Unit
- Network Switch Technique
- Network Switch Technique
- Circuit Switching
- Message Switching
- Packet Switching
- Network Transmission Media
- Network Transmission Media
- Twisted Pair Cable
- Coaxial Cable
- Optical Fibers
- Guided Media Compared
- Microwave
- Radio Wave
- Satellite Microwave
- Infrared
- Laser
- Data Communication Terms
- Data Communication Terms
- Data Channel
- Baud
- Bits Per Second
- Bandwidth
- Data Transfer Rates
- Types of Networks
- Types of Networks
- LAN
- MAN
- WAN
- PAN
- Network Topologies
- Network Topologies
- Point-To-Point Link
- Star Topology
- Bus Topology
- Ring Topology
- Tree Topology
- Graph Topology
- Mesh Topology
- Fully Connected
- Network Devices
- Network Devices
- Modem
- RJ-45
- Ethernet Card
- Hub
- Switch
- Repeater
- Bridge
- Router
- Gateway
- LAN Design
- LAN Design
- Network Components Checklists
- Communication Protocols
- Communication Protocols
- Hypertext Transfer Protocol
- File Transfer Protocol
- TCP/IP
- SLIP/PPP
- Mobile Computing
- Mobile Computing
- GSM
- CDMA
- WLL
- GPRS
- 1G, 2G, 3G, 4G
- 3G and EDGE
- 4G and LTE
- SMS
- Chat
- Video Conferencing
- VoIP
- Wi-Fi
- Wi-Fi Hotspots
- WiMax
- Internetw Term & Concept
- Internetw Term & Concept
- World Wide Web
- Telnet
- Web Browser and Server
- Web Sites and Addresses
- URL and Domain Names
- Web Hosting
- Web 2.0
- WebScripting
- Open Source Software
- Open Source Software
- OSS and FLOSS
- GNU
- FSF
- OSI
- W3C
- Proprietary Software
- Freeware Software
- Shareware Software
- Network Security
- Network Security
- Cookies
- Hackers and Crackers
- CyberLaw
- Cyber Crimes
- Intellectual Property Rights
- Viruses
- Viruses
- How Computer Virus Spread ?
- Damage that Viruses Cause
- Trojan Horses
- Worms
- Spam
- Virus Prevention
- Give Online Test
- All Test List
- Networking Test
Worms
A worm is a program designed to replicate.
The worm program may perform any variety of additional tasks as well.
Worms are programs that run independently and travel from computer to computer across network connections.
Worms may have portions of themselves running on many different computers.
Worms don't change other programs, although they may carry other code that does.
Characteristics of Worms
The characteristics of a worm is listed here:
- Worm is able to replicate
- Worm is self-contained and doesn't require a host
- Worm is activated by creating process (Worms needs a multitasking system)
- If worm is a network worm, then it can replicate across the communication links
How Worms Spread ?
Worms are autonomous agents capable of propagating themselves without the use of another program or intervention or action by a user.
Worms are found primarily on computers that are capable of multitasking and are connected by a network.
Damage that Worms can cause
Most worms disrupt services and create system management problems.
Some worms scan for passwords and other loopholes and then send the information back to the attacker.
In some cases, worms can install Trojan horses or viruses that cause damage to the system.
« Previous Tutorial Next Tutorial »