Gamer.Site Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Code Red (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Code_Red_(computer_worm)

    It did this by using a long string of the repeated letter 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine with the worm. Kenneth D. Eichman was the first to discover how to block it, and was invited to the White House for his discovery.

  3. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China. September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm.

  4. Morris worm - Wikipedia

    en.wikipedia.org/wiki/Morris_worm

    The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. [ 1] It was written by a graduate student at Cornell University ...

  5. Nimda - Wikipedia

    en.wikipedia.org/wiki/Nimda

    Nimda. The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP and servers running Windows NT and 2000. [ 3]

  6. Code Red II - Wikipedia

    en.wikipedia.org/wiki/Code_Red_II

    Code Red II. Code Red II is a computer worm similar to the Code Red worm. Released two weeks after Code Red on August 4, 2001, it is similar in behavior to the original, but analysis showed it to be a new worm instead of a variant. Unlike the first, the second has no function for attack; instead it has a backdoor that allows attacks.

  7. Computer worm - Wikipedia

    en.wikipedia.org/wiki/Computer_worm

    Anti-worms have been used to combat the effects of the Code Red, [34] Blaster, and Santy worms. Welchia is an example of a helpful worm. [35] Utilizing the same deficiencies exploited by the Blaster worm, Welchia infected computers and automatically began downloading Microsoft security updates for Windows without the users' consent. Welchia ...

  8. SQL Slammer - Wikipedia

    en.wikipedia.org/wiki/SQL_Slammer

    SQL Slammer[ a] is a 2003 computer worm that caused a denial of service on some Internet hosts and dramatically slowed general Internet traffic. It also crashed routers around the world, causing even more slowdowns. It spread rapidly, infecting most of its 75,000 victims within 10 minutes. The program exploited a buffer overflow bug in ...

  9. Blaster (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Blaster_(computer_worm)

    Blaster (also known as Lovsan, Lovesan, or MSBlast) was a computer worm that spread on computers running operating systems Windows XP and Windows 2000 during August 2003. [ 1] The worm was first noticed and started spreading on August 11, 2003. The rate that it spread increased until the number of infections peaked on August 13, 2003.