Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually, a worm releases a document that already has a macro containing a worm inside the document.
What are worms?
October 5, 2008
0 Comments
Explore More
What are the various methods of passive OS fingerprinting?
In passive OS fingerprinting, an attacker installs a sniffer on any third party such as a router on which the victim communicates frequently. Now he studies the sniffer’s log and
Security Weakness of Emerge (Malaysia Web Hosting)
No man is infallible, Nobody safes @ online and There’s no complete secure protection in this Cyberwar! During these days I’m really busy with my own business! In my dream
Anonymous Myanmar Hacker Attacks Blink Hacker Group
This is a bit MM Hackers Complication. 🙂 Today, we got a new email from Anonymous Myanmar Hacker who is (are) attacking to Blink Hacker Group. You can check complete