Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually, a worm releases a document that already has a macro containing a worm inside the document.
What are worms?
October 5, 2008
0 Comments
Explore More
Critical SQL Injection in Enjoy (http://www.enjoy.net.mm)
PlanetCreator reported another critical SQL injection (vulnerability) on several sites of Enjoy (http://www.enjoy.net.mm) SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer
Tracing a hacker
> Tracing a hacker > Written by: Paperghost [[email protected]] > 24/02/2005 Sometimes, it’s just not enough to simply know that there’s a Trojan or Virus onboard. Sometimes you need to
Make your own Hardend Internet Firewall
Make your own “Hardend Internet Firewall” using that forgotton PC in your basement. Yes.. You know the PC I am talking about. We all have them. Remember that $3000 Pentium