Ik heb een worm in mn pc...
Kan iemand mij even uitleggen wat ik daarmee moet doen ?
Klinkt misschien een beetje raar maar ik heb daar
echt geen verstand van
is een soort virus , even op www.symantec.nl een botje downloaden die um kan verwijderen.
dankjewel !
The anatomy of a worm attack is as follows:
1. The enabling vulnerability – A worm installs itself using an exploit vector on a vulnerable system.
2. Propagation mechanism – After gaining access to devices, a worm replicates and selects new targets.
3. Payload – Once the device is infected with a worm, the attacker has access to the host – often as a privileged user. Attackers could use a local exploit to escalate their privilege level to administrator.
Typically, worms are self-contained programs that attack a system and try to exploit a specific vulnerability in the target. Upon successful exploitation of the vulnerability, the worm copies its program from the attacking host to the newly exploited system to begin the cycle again. A virus normally requires a vector to carry the virus code from one system to another. The vector can be a word-processing document, an e-mail message, or an executable program. The key element that distinguishes a computer worm from a computer virus is that human interaction is required to facilitate the spread of a virus.
Worm attack mitigation requires diligence on the part of system and network administration staff. Coordination between system administration, network engineering, and security operations personnel is critical in responding effectively to a worm incident. The following are the recommended steps for worm attack mitigation: