Gamer.Site Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Code Red (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Code_Red_(computer_worm)

    Code Red. Technical name. CRv and CRvII. A website defaced by the worm. Type. Server Jamming Worm. Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server. It was the first large-scale, mixed-threat attack to successfully target enterprise networks.

  3. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    July 13: The Code Red worm attacking the Index Server ISAPI Extension in Microsoft Internet Information Services is released. August 4: A complete re-write of the Code Red worm, Code Red II begins aggressively spreading onto Microsoft systems, primarily in China.

  4. Code Red II - Wikipedia

    en.wikipedia.org/wiki/Code_Red_II

    Type. Server Jamming Worm. Code Red II is a computer worm similar to the Code Red worm. Released two weeks after Code Red on August 4, 2001, it is similar in behavior to the original, but analysis showed it to be a new worm instead of a variant. Unlike the first, the second has no function for attack; instead it has a backdoor that allows attacks.

  5. Nimda - Wikipedia

    en.wikipedia.org/wiki/Nimda

    Nimda. The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP and servers running Windows NT and 2000. [ 3]

  6. Eisenia fetida - Wikipedia

    en.wikipedia.org/wiki/Eisenia_fetida

    Eisenia foetida (older spelling) Eisenia fetida, known under various common names such as manure worm, [ 2] redworm, brandling worm, panfish worm, trout worm, tiger worm, red wiggler worm, etc., is a species of earthworm adapted to decaying organic material. These worms thrive in rotting vegetation, compost, and manure.

  7. Buffer overflow - Wikipedia

    en.wikipedia.org/wiki/Buffer_overflow

    Since then, at least two major internet worms have exploited buffer overflows to compromise a large number of systems. In 2001, the Code Red worm exploited a buffer overflow in Microsoft's Internet Information Services (IIS) 5.0 [45] and in 2003 the SQL Slammer worm compromised machines running Microsoft SQL Server 2000. [46]

  8. Computer worm - Wikipedia

    en.wikipedia.org/wiki/Computer_worm

    Anti-worms have been used to combat the effects of the Code Red, [34] Blaster, and Santy worms. Welchia is an example of a helpful worm. [35] Utilizing the same deficiencies exploited by the Blaster worm, Welchia infected computers and automatically began downloading Microsoft security updates for Windows without the users' consent. Welchia ...

  9. List of security hacking incidents - Wikipedia

    en.wikipedia.org/wiki/List_of_security_hacking...

    Graduate student Robert T. Morris, Jr. of Cornell University launches a worm on the government's ARPAnet (precursor to the Internet). [30] [31] The worm spreads to 6,000 networked computers, clogging government and university systems. Robert Morris is dismissed from Cornell, sentenced to three years' probation, and fined $10,000.