Gamer.Site Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Code Red (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Code_Red_(computer_worm)

    Code Red. Technical name. CRv and CRvII. A website defaced by the worm. Type. Server Jamming Worm. Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server. It was the first large-scale, mixed-threat attack to successfully target enterprise networks.

  3. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China. September 18: The Nimda worm is discovered and spreads through a variety of means including vulnerabilities in Microsoft Windows and backdoors left by Code Red II and Sadmind worm .

  4. Nimda - Wikipedia

    en.wikipedia.org/wiki/Nimda

    Nimda. The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP and servers running Windows NT and 2000. [ 3]

  5. Code Red II - Wikipedia

    en.wikipedia.org/wiki/Code_Red_II

    Type. Server Jamming Worm. Code Red II is a computer worm similar to the Code Red worm. Released two weeks after Code Red on August 4, 2001, it is similar in behavior to the original, but analysis showed it to be a new worm instead of a variant. Unlike the first, the second has no function for attack; instead it has a backdoor that allows attacks.

  6. Eisenia fetida - Wikipedia

    en.wikipedia.org/wiki/Eisenia_fetida

    Eisenia foetida (older spelling) Eisenia fetida, known under various common names such as manure worm, [ 2] redworm, brandling worm, panfish worm, trout worm, tiger worm, red wiggler worm, etc., is a species of earthworm adapted to decaying organic material. These worms thrive in rotting vegetation, compost, and manure.

  7. List of security hacking incidents - Wikipedia

    en.wikipedia.org/wiki/List_of_security_hacking...

    The Morris Worm. Graduate student Robert T. Morris, Jr. of Cornell University launches a worm on the government's ARPAnet (precursor to the Internet). [30] [31] The worm spreads to 6,000 networked computers, clogging government and university systems. Robert Morris is dismissed from Cornell, sentenced to three years' probation, and fined $10,000.

  8. SQL Slammer - Wikipedia

    en.wikipedia.org/wiki/SQL_Slammer

    SQL Slammer[ a] is a 2003 computer worm that caused a denial of service on some Internet hosts and dramatically slowed general Internet traffic. It also crashed routers around the world, causing even more slowdowns. It spread rapidly, infecting most of its 75,000 victims within 10 minutes. The program exploited a buffer overflow bug in ...

  9. Computer worm - Wikipedia

    en.wikipedia.org/wiki/Computer_worm

    Anti-worms have been used to combat the effects of the Code Red, [34] Blaster, and Santy worms. Welchia is an example of a helpful worm. [35] Utilizing the same deficiencies exploited by the Blaster worm, Welchia infected computers and automatically began downloading Microsoft security updates for Windows without the users' consent. Welchia ...