Provide a detailed description of what worms and trojan horses are

For news about the antivirus industry, see the SecurityFocus virus page.

Because of their similarity to viruses, worms also are often referred to as viruses. Once created and released, however, their spread is not directly under human control. A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it.

Once installed, this program modifies the system and attempts to contact other systems. Eventually, they sent an anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection.

Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program. Virus creators often use Trojan horses to trick users into installing viruses. Trojan Horse Example Trojan horses usually rely on email to spread. The worm scans the network for another computer that has a specific security hole.

A logic bomb is a specific type of Trojan horse that executes when specific conditions occur. Resources and more information about viruses For details on avoiding viruses, see Tips for staying safe online.

He chose to release it from MIT, to disguise the fact that the worm came from Cornell. Trojan horse programs are named for the famous wooden horse used by the Greeks to sneak soldiers into the ancient city of Troy.

Trojan horses often appear as e-mail attachments with enticing names that induce people to open them. The term, Trojan horse, is usually used to refer to a non-replicating malicious program which is the main characteristic that distinguishes it from a virus. The email message contains an executable attachment called Ie Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves usually to other computer systems via network connections and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.

Last modified on A macro is a piece of code that can be embedded in a data file. About viruses, worms, and Trojan horses On this page: One recent example is an email message that purports to be a free upgrade to Internet explorer from Microsoft.

About viruses, worms, and Trojan horses

A worm is a small piece of software that uses security holes within networks to replicate itself. Morris soon discovered that the program was replicating and reinfecting machines at a much faster rate than he had anticipated — there was a bug.

Trojan horses are also often used to gain access to a computer system to run monitoring or shadowing software. The email will claim to do something that most users would find beneficial but in reality it will do harm to the system if run.

Using a network in this manner, worms expand extremely quickly. When Morris realized what was happening, he contacted a friend at Harvard to discuss a solution.

Computers were affected at many sites, including universities, military sites and medical research facilities. Triggers for logic bombs can include a change in a file, by a particular series of keystrokes, or at a specific time or date.Part 1: Provide a detailed description of what worms and Trojan horses are.

A worm, like a virus, is designed to copy itself from one computer to another, but it does so automatically. First, it takes control of features on the computer that can. Worms and Trojan Horses. Write a short essay for each of the following topics.

Part 1: Provide a detailed description of what worms and Trojan horses are. Part 1: Provide a detailed description of what worms and Trojan horses are. Part 2: The example of releasing a worm given in the text is the situation where Morris stated his goal was to see how many Internet computers he could infect with the worm.

He was not thinking about the computers he would crash and that data that would be lost. 1. Worms and Trojan horses (or Trojans) are malicious computer programs that seek to damage your computer or network or steal information.

They are different from computer viruses, although people generally make the mistake of clubbing all of these together. Part 1: Provide a detailed description of what worms and Trojan horses are.

Part 2: The example of releasing a worm given in the text is the situation where Morris stated his goal was to see how many Internet computers he could infect with the worm.

Provide A Detailed Description Of What Worms And Trojan Horses Are Part 1: Provide a detailed description of what worms and Trojan horses are.

Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, and privacies leak to your computer.

Download
Provide a detailed description of what worms and trojan horses are
Rated 4/5 based on 86 review