ComputersSoftware

What are network worms?

Every computer owner connected to the Internet has heard of computer viruses. If users with experience have at least some idea of the possible danger emanating from such malicious programs, then among the newcomers there are two opposite beliefs. According to the first, "computer virus" can be picked up only by regulars of sites for adults and fans of hacked programs, so you can not really think about what network worms and other malicious codes are. Usually on computers such users do not have any anti-virus software (except for system). Others, frightened by stories of virus scavenging the contents of microcircuits BIOS, the theft of passwords to bank accounts and other, are afraid to once again connect someone else's flash drive to their computer. Often such users have several antiviruses installed at once, with duplicating functions (protection is similar to cabbage). But the truth, as always, somewhere in the middle.

The effectiveness of any recommendations is much higher if a person understands the meaning of their actions, rather than thoughtlessly follows the written. Therefore, today we will consider what are computer viruses and, in particular, network worms.

A virus is a computer program capable of independently cloning its code ("multiplication"). It spreads through communication channels or by means of information carriers. Carefully hides the fact of his presence. Performs various malicious actions - corrupts information, passes confidential data to its creator through the global Network, etc. The list of actions is huge. Infection of the computer occurs when you start (open) a file, in the structure of which the virus code is contained.

Among all types of viruses, worms require special attention. The peculiarity of such programs is that some of their types (batch) are capable of infecting a computer that is simply connected to the Internet - the user has nothing to start and do not need to open. Network worms are a type of malware, the feature of which is the active use of local and global networks.

For its distribution uses two methods:

  • The user runs the infected file independently. This can be an advertising email, a file with a modified extension, etc .;
  • Using errors in operating systems and open ports, the network worm can get into the computer's RAM and hard disk.

Further actions after infection depend on the tasks for which the worm was created. Surely everyone has heard the term "botnet". Its meaning lies in the fact that the creator of a malicious program through the Internet can manage network requests of infected computers. If necessary, he gives the control command to all copies of his network worm. As a result, traffic from infected computers is redirected to a particular network resource. Due to the huge number of one-time requests, the resource stops its work (DoS attack).

In addition, the constant scanning of other computers on the network to infect them causes an increased load on computing power, takes away part of the Internet channel for their needs. Some types of worms, hitting the computer, download the Trojan program. In this case, it is a complex infection.

Network worms are a very significant threat, so it is always necessary to have antivirus protection with an effective proactive module. This protection does not involve searching for infected files on the storage medium, but monitoring the suspicious actions of all programs in RAM.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.delachieve.com. Theme powered by WordPress.