What are they, how do they act and what rolls do they play when infecting computers? PC or Computer Worms are designed to travel.
These programs make their way across networks and continuously make duplicate copies of themselves.
Like viruses these programs can reproduce and spread, but the way a worm spreads is different from that of a virus.
Worms work individually, alone, by them selves they will spread through out a PC and network.
Viruses are dependent, they require files to spread.
There are many different types of computer worms and each one spreads in its own unique way.
Some of these worms will spread themselves by means of files through file sharing networks.
These worms can spread very rapidly and infect every computer in a network in a very short period of time.
They lurk in files undetected and spread from file to file.
When these files are shared they continue to disguise themselves in more files that are shared and this is how they can spread so rapidly.
In 1988 a worm made its way across the internet, spreading like wildfire overnight and the effects that this worm had was certainly devastating to many.
This worm left many systems completely unstable by means of copying itself so many times on these systems that they were completely unmanageable and deemed useless.
Many sites completely disconnected from the internet to keep from being reinfected.
Worms can spread extremely fast and destructive.
Many of these worms will scan the internet for vulnerabilities and thus make their grand entry.
One of the most common are the e-mail worms.
These programs spread via e-mails and cloaks its threat by appearing to be a harmless message from some website that may be completely infected, thus spreading the effects when connecting.
These programs start the second you click on the attachment that has been sent with the message, this acts as an invitation and the infection begins to force its way into your system.
Links and attachments are ways of infection and clicking them can be devastating in some cases.
Do not fall victim to these nasty programs.
Developers of these kinds of programs are out to one thing and that is destroy.
Protect your computer and stop the chances of being infected.
Computer down time can be prevented and damage stopped before it occurs.
This mini article is to help inform those who may not be protect.
These programs make their way across networks and continuously make duplicate copies of themselves.
Like viruses these programs can reproduce and spread, but the way a worm spreads is different from that of a virus.
Worms work individually, alone, by them selves they will spread through out a PC and network.
Viruses are dependent, they require files to spread.
There are many different types of computer worms and each one spreads in its own unique way.
Some of these worms will spread themselves by means of files through file sharing networks.
These worms can spread very rapidly and infect every computer in a network in a very short period of time.
They lurk in files undetected and spread from file to file.
When these files are shared they continue to disguise themselves in more files that are shared and this is how they can spread so rapidly.
In 1988 a worm made its way across the internet, spreading like wildfire overnight and the effects that this worm had was certainly devastating to many.
This worm left many systems completely unstable by means of copying itself so many times on these systems that they were completely unmanageable and deemed useless.
Many sites completely disconnected from the internet to keep from being reinfected.
Worms can spread extremely fast and destructive.
Many of these worms will scan the internet for vulnerabilities and thus make their grand entry.
One of the most common are the e-mail worms.
These programs spread via e-mails and cloaks its threat by appearing to be a harmless message from some website that may be completely infected, thus spreading the effects when connecting.
These programs start the second you click on the attachment that has been sent with the message, this acts as an invitation and the infection begins to force its way into your system.
Links and attachments are ways of infection and clicking them can be devastating in some cases.
Do not fall victim to these nasty programs.
Developers of these kinds of programs are out to one thing and that is destroy.
Protect your computer and stop the chances of being infected.
Computer down time can be prevented and damage stopped before it occurs.
This mini article is to help inform those who may not be protect.
SHARE