To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

List of computer worms

From Wikipedia, the free encyclopedia

Name Alias(es) Type Subtype Isolation date Origin Author Functions and notes
Badtrans Badtrans.29020, Badtrans.B, Badtrans.A,

I-Worm.BadtransII, Badtrans.gen

Mass mailer Trojan November 24, 2001[1] Poland[2] Unknown Installed a keylogger; distributed logged information (such as passwords, usernames, etc.) to one of 22 emails.
Bagle Beagle, Mitglieder, Lodeight, Trojan.DL.Bagle Mass mailer Trojan January 18, 2004 Unknown Unknown Spread by email; certain variants had no subject and no text.[3] Allowed attacker to access computers that were infected.
Blaster Lovesan, MSBLAST Mass DoS attacks Logic bomb (payload set to activate August 15) August 11, 2003 Hopkins, Minnesota Jeffrey Lee Parson[4] Widespread DDoS attacks targeted toward Bill Gates; contained message "billy gates why do you make this

possible ? Stop making money and fix your software!!"[sic]. Caused over US$300,000,000 in damages, mostly to American infrastructure.[5]

Brontok W32.Rontokbro@mm, BackDoor.Generic.1138, Worm.Mytob.GH October 3, 2005 Indonesia Spread through an Indonesian e-mail headed with "stop the collapse in this country"; destroys firewalls.
BuluBebek W32/VBWorm.QXE October 10, 2008
Code Red DoS payload, Defacement payload July 2001 Exploited Microsoft Internet Information Services to deface web pages and DOS a few set IPs.
Daprosy Worm Worm.Win32.VB.arz, W32.Autorun.worm.h, W32/Autorun-AMS, Worm:Win32/Autorun.UD Trojan Mass mailer July 15, 2009 Replaces folders with .EXE's, key logger, slow mass mailer.
Code Red II August 4, 2001 Exploited Microsoft Internet Information Server security holes..
Dabber W32/Dabber-C, W32/Dabber.A May 14, 2004
Doomjuice February 11, 2004 Attack computers that had previously been infected by the Mydoom worm.
ExploreZip I-Worm.ZippedFiles June 6, 1999 Spread through zipped documents in a spam e-mail.
Father Christmas HI.COM December 1988
Hybris Snow White, Full Moon, Vecna.22528 December 11, 2000 Brazil Vecna Spread through an e-mail from "[email protected]".
ILOVEYOU Loveletter, LoveBug Worm May 4, 2000 Manila, Philippines
Kak worm October 22, 1999 On the first day of any month, if the time was after 5 pm, Kak displayed a popup message box that read: "Driver Memory Error - Kagou-Anti-Kro$oft says not today !" Dismissing it would reboot the computer and then display the message again.
Klez October 2001
Koobface December 2008 Targeted MySpace and Facebook users with a heading of "Happy Holidays".
Leap-A Oompa-Loompa Trojan worm February 14, 2006 Most known for being the first virus targeting Mac computers.
Morris November 2, 1988 Robert Tappan Morris Widely considered to be the first computer worm. Although created for academic purposes, the negligence of the author unintentionally caused the worm to act as a denial of service attack. It spread by exploiting known vulnerabilities in UNIX-based systems, cracked weak passwords, and periodically altered its process ID to avoid detection by system operators.
Mydoom W32.MyDoom@mm, Novarg, Mimail.R, Shimgapi January 26, 2004 Fastest-spreading e-mail worm known; used to attack SCO Group
Mylife W32.MyLife.C@mm Mass mailer Trojan (some variants) April 2, 2002 Mass deletes files on infected computers. Certain variants show a caricature of U.S. President Bill Clinton.[6]
Navidad[7] Emmanuel, W32.Wachit Mass mailer Trojan December 1, 2000[8] South America Unknown Email appears to be in reply to someone the target has messages prior.[7] Messages created by the virus are written entirely in Spanish. [9]
Netsky February 18, 2004 Germany Sven Jaschan
Nimda September 2001 Originally suspected to be connected to Al Qaeda because of release date; uses multiple infection vectors.
Sadmind May 8, 2001
Sasser Big One April 30, 2004 Sven Jaschan Network worm. At startup, it kills the process lsass.exe, a windows process which handles file permissions. Killing lsass causes the computer to reboot one minute later, which would cause sasser to run again. This would continue in an infinite loop until the computer is shut down manually.
Sircam Spread through e-mail with text like "I send you this file in order to have your advice."
Sober CME-681, WORM_SOBER.AG October 24, 2003 Germany, possibly from National Democratic Party of Germany Was disguised as e-mail from United States government.
Sobig August 2003
SQL Slammer DDOS.SQLP1434.A, the Sapphire Worm, SQL_HEL, W32/SQLSlammer Caused global Internet slowdown.
Stuxnet Win32/Stuxnet June 2010 First malware to attack SCADA systems.
Swen September 18, 2003
Toxbot 2005 The Netherlands Opened up a backdoor to allow command and control over the IRC network.
Upering Annoyer.B, Sany July 22, 2003
Voyager  Voyager Worm October 31, 2005 Targets Operating System running Oracle Databases.
W32.Alcra.F Win32/Alcan.I Worm February 17, 2006 Propagated through file-share networks.[10]
W32/Bolgimo.worm
W32/IRCbot.worm W32/Checkout, W32.Mubla, W32/IRCBot-WB, and Backdoor.Win32.IRCBot.aaq Trojan Worm Backdoor June 1, 2007 It provides a backdoor server and allows a remote intruder to gain access and control over the computer via an IRC channel.
WANK OILZ October 1989 Spread a pacifist, anti-nuclear political message.
Welchia Nachia, Nachi A helpful worm meant to install security patches and removes Blaster worm if the computer is infected by it.
Witty March 19, 2004 Appeared very rapidly after announcement of Internet Security Systems vulnerability
Zotob Farid Essebar and Atilla Ekici

YouTube Encyclopedic

  • 1/3
    Views:
    281 766
    239 156
    3 489 689
  • Difference Between Viruses, Worms and Trojans
  • 15 Worst Computer Viruses in History
  • 5 of the Worst Computer Viruses Ever

Transcription

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three. What Is a Virus? A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) What is a worm? A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. What is a trojan horse? The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. Some Trojans are designed to be more annoying (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

See also

References

  1. ^ "Virus'". ecsis.ecsis.net. CTRL+F search term "Badtrans". Retrieved 2024-02-02.
  2. ^ "Badtrans - The Virus Encyclopedia". virus.wikidot.com. Retrieved 2024-02-02.
  3. ^ admin-ectnews (2004-03-26). "Bagle.U Worm Spreads Despite Simplicity". TechNewsWorld. Retrieved 2024-02-02.
  4. ^ "Minnesota Man Sentenced to 18 Months in Prison for Creating and Unleashing a Variant of the MS Blaster Computer Worm (January 28, 2005)". www.justice.gov. Retrieved 2024-02-03.
  5. ^ "Blaster - The Virus Encyclopedia". virus.wikidot.com. Retrieved 2024-02-03.
  6. ^ Leyden, John. "Clinton worm variant makes fun of Sharon". www.theregister.com. Retrieved 2024-02-04.
  7. ^ a b "Navidad - The Virus Encyclopedia". virus.wikidot.com. Retrieved 2024-02-02.
  8. ^ Stan, Michael (December 1, 2000). "The "W32.Navidad@M" Worm". giac.org. Archived from the original on February 2, 2024. Retrieved February 2, 2024. Alt URL
  9. ^ staff, CBSNews com staff CBSNews com (2000-11-10). "A Not-So-Feliz 'Navidad' - CBS News". www.cbsnews.com. Retrieved 2024-02-04.
  10. ^ "W32.Alcra.F". Symantec. Archived from the original on August 26, 2006. Retrieved 20 October 2016.
This page was last edited on 29 April 2024, at 22:41
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.