Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually, a worm releases a document that already has a macro containing a worm inside the document.
What are worms?
October 5, 2008
0 Comments
Explore More
Critical SQL Injection in Perfect Magazine
PlanetCreator has reported another critical SQL Injection (vulnerability) on Perfect Magazine : Myanmar Fashion, Entertainment, News, Wrtitings and Asrology for all myanmar people http://www.perfectmagazineonline.com This vulnerability has been alerted to
Critical SQL Injection in singforyou.net
Security Researcher $@T0R! has reported another Critical SQL Injection in singforyou.net SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an
Send Email with telnet
Well….. Go to Start, then Run…You have to Telnet (Xserver) on port 25Well, (In this Xserver) you have to put the name of a server without the ( ) of
