Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually, a worm releases a document that already has a macro containing a worm inside the document.
What are worms?
October 5, 2008
0 Comments
Explore More
DDoS Attack on Myanmar Takes the Country Offline
The main Internet provider for Myanmar, the southeast Asian nation formerly known as Burma, has been under severe denial of service attack since at least October 25, according to the
XSS Stealing Cookies
This method (XSS attacks) is for get the cookies users, so, for get information of users… and then, login into the account of the victim user…u will have to give
Blind SQL Injection
Blind injection: you dont actually see anything, you just see how the server responds.Blind injection is a little more complicated/time consuming, but when your injection is multi-select and union isn’t
