Monday, September 21, 2009
Worm Infection
Here are my thoughts about worm infection.
A worm is a program that can pass through the network using the network distribution equipment, without any support from hardware or software. Therefore, a worm known as network virus.
The worms can be distributed primarily to customers by e-mail attachments. These emails contain a number of instructions for the collection of all e-mail contained in the contacts and copies are sent to all senders.
Usually, these lines will form executable files or scripts (usually to be VBScript). This worm is activated when the recipient opens the attachment. You must give up the opening files that blindly attachments in e-mails from unknown senders to protect your computer contains Worms.
If you run a file that can be decoded by the operating system or applications that run your computer may be infected by the worm. The files with extensions doc, vbs, exe, xls, bats, MSI, EML, pif, scr, com and may infect your computer, especially if combined with a worm. The files with rm, txt, RAM, jpg, mid, poison, AVI, MPG, ASF, MP3, to, wav, mpg can be decrypted by the OS. Therefore, the risk of infection occurring on your computer is negligible. Usually files with a JPG or poison is bounded by Worms.
In some cases, any file type in the code that is Worms, but another computer virus should contain code that is stored in files to decode. You must make sure that antivirus software is installed on your computer and complete analysis of any attachment before opening it to prevent infection by worms.
There are many removal tools available that the worm can be used to eliminate worms. It is recommended to use these tools to protect against worms dangerous to keep.
A worm is a program that can pass through the network using the network distribution equipment, without any support from hardware or software. Therefore, a worm known as network virus.
The worms can be distributed primarily to customers by e-mail attachments. These emails contain a number of instructions for the collection of all e-mail contained in the contacts and copies are sent to all senders.
Usually, these lines will form executable files or scripts (usually to be VBScript). This worm is activated when the recipient opens the attachment. You must give up the opening files that blindly attachments in e-mails from unknown senders to protect your computer contains Worms.
If you run a file that can be decoded by the operating system or applications that run your computer may be infected by the worm. The files with extensions doc, vbs, exe, xls, bats, MSI, EML, pif, scr, com and may infect your computer, especially if combined with a worm. The files with rm, txt, RAM, jpg, mid, poison, AVI, MPG, ASF, MP3, to, wav, mpg can be decrypted by the OS. Therefore, the risk of infection occurring on your computer is negligible. Usually files with a JPG or poison is bounded by Worms.
In some cases, any file type in the code that is Worms, but another computer virus should contain code that is stored in files to decode. You must make sure that antivirus software is installed on your computer and complete analysis of any attachment before opening it to prevent infection by worms.
There are many removal tools available that the worm can be used to eliminate worms. It is recommended to use these tools to protect against worms dangerous to keep.
Subscribe to:
Posts (Atom)
Sponsor Links