This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
Introduction: The computer worms are programs that reproduce, duplicate independently and travel to spread across networks, it does not rely on the host file or boot sector and the transfer of files between computers to spread and this is the main key difference between the computer virus and the worm virus. Computer Worms are skilled to damage entire series of data as destroying crucial and important files, slowing it down or even stop the computer from working at all.
It keeps on spreading unless no more computers are left to be infected on the same network, such viruses are dangerous in businesses that use large number of networks.
Famous examples of the computer worm
The following are examples of famous computer worms and their specific descriptions:
Internet worm or Morris worm: TheÂ InternetÂ worm or Morris worm was the first worm to be launched through the InternetÂ and the first to achieve important mainstream media attention.
It was unleashed by accident on theÂ InternetÂ by Robert Tappan Morris in 1988. It was originally created not to cause damage but to figure the size of theÂ Internet. However, an unintended outcome of the code caused it to be more destroying and harmful.
A computer network can be harmed multiple times with each added process causing to slow down the computer. After all, it will make the computer unusable.
Sobig worm: It is a computer worm that first appeared in August 2003. Since then, it has infected millions of Microsoft Windows computers connected to theÂ Internet.
As a worm, it can DUPLICATE by itself. It also has some features similar to aÂ Trojan virusbecause it SPREADS itself as electronic mail.
It has six variants but the most widespread, well-known and famous is its Sobig.F variant.
Mydoom: mydoom is a computer worm affecting Microsoft Windows. It is also known as Novarg, Shimgapi, W32.MyDoom@mm, and Mimail.R.
It was considered the fastest-spreading e-mail worm as of January 2004, beating the record set by the Sobig worm. It was first viewed on January 26, 2004.
Mydoom worms all spread through e-mail containing the text message "Andy; I'm just doing my job, nothing personal, sorry". It was believed that the creator of the worm wasÂ paid to launch it. However the real creator is unknown.
It shares some similarities to aÂ Trojan virusÂ by attracting a computer user to open an infected e-mailÂ attachment.
Blaster Worm: It is a computer worm also known as Lovsan or Lovesan. It spreads on computer networks running the Windows 2000 andÂ Windows XPÂ Operating Systems. It was first developed in August 2003.
This worm contains two messages that acts as the virus. The first contains the message "I just want to sayÂ LoveÂ You San" thus giving the name Lovesan worm. The second message was intended for Bill Gates, the target of the worm. The message states "Billy Gates why do you make this possible? StopÂ making moneyÂ and fix your software".
How to avoid getting computer worm virus?
Email is the most common way of getting infected: To open an email or link safely u must know the source and never ever click unless you are positive about it. Here are two common ways that it is usually done by:
Â A good way to avoid this is to use Mozilla Firefox, since it is known to be more secure. An email that you receive from any source that you know or you don't but it contains a link for you to open and you click on it and here it goes the virus is allowed to your computer. It appears to be an email from some one you may know, don't fall for it! It was actually malicious code executed in your browser that allowed it to look like it is coming from an actual source.
You may receive an email from a friend you know but the email is not really sent by her it may be her infected computer and the worm that generated the email sent, it usually carries a message that would encourage you to open it but it is not a personal message from your friend as it is the virus that formed it like" Hey, check out this important site of yoursâ€¦."etc and here you go your computer is infected.
Don't click on pop-up windows that announce a sudden disaster in your city: A cracker( hackers that aim to confuse important information to make users angry, not to hack personal data or steel properties) used your Internet protocol address to determine the location you are in, and then sends you an email that makes you open it like "you would like to know the causes of earthquake or anything similar" you click and here the device is infected.
Be careful about using MS Outlook: It is the most acceptable application to the worms more than other e-mail programs. To avoid its spreading you can better use anti-virus or also try Outlook anti-spam addons freely available on Microsoft's Web site.
Do not use disks that other people gave you, even from work: you can use anti-virus programs to scan a disk or CD that maybe infected with the worm virus even if you have got this disk from work or important sources, but at times the AV programs are not 100% effective. The drive can be wiped using a bootable CD like DBAN then it will be safe.
Do not download software from just any old website: If it is a well- known site that you trust, you are probably safe. The threat is not only from software; don't download Word documents or other non-HTML files that have something other than one of the extensions listed above, either.
Set up your Windows Update to automatically download patches and upgrades: This will help you to get the latest updates done automatically and safely by your device instead of you doing such updates from un-trustable sites. This automatic updates also fix security holes in both pieces of software.
Use a software firewall: Read about the latest virus threats so you are aware of the potential danger that may affect your devices.
Avoid file sharing: Peer-to-peer file sharing is another source of viruses. Like some of the viruses above, these are viruses that you invite into your computer. If you use peer-to-peer file sharing to download music, videos, games, or other information you put yourself at legal risk for piracy, and you put your computer at serious risk to computer worm to infect your computer.
Keep Your Computers Patched:Â Worms most often rely on unpatched computers to spread. They use vulnerable network services to infect and gain access to the computer's resources. Patches fix the vulnerabilities.
Read more:Â http://www.brighthub.com/computing/smb-security/articles/42130.aspx#ixzz1J4DKiqKA
Harmful effects of computer worms
This can be used to create "hordes" of "zombie" computers, all controlled by a single remote user who can then use these computers to flood a website or service. Some worms have been designed to replicate on a system in order to "harvest" that computer and send back to a user all the information stored on that system. It seems difficult to ignore the psychological damage a computer worm may have on a system owner
Read more:Â Harmful Effects of Computer Worms | eHow.comÂ http://www.ehow.com/list_5956359_harmful-effects-computer-worms.html#ixzz1J4CHDpMB