Adm worm of 1998 synonyms

Category:
Part of speech:
A collection of programs written to automatically exploit vulnerabilities in Linux systems to gain access, attack other systems from compromised hosts, and copy itself to vulnerable systems. This worm was seen in the period May 1, 1998, to late May 1998. When this worm hit, compromised systems were left with a “w0rm” backdoor account. The target’s Internet Protocol (IP) Address was then emailed to the worm’s developers. All logfiles in the targeted directory were deleted, and all index.html files on the file system were located and replaced with the words “The ADM Internet w0rm is here!” A collection of programs written to automatically exploit vulnerabilities in Linux systems to gain access, attack other systems from compromised hosts, and copy itself to vulnerable systems. This worm was seen in the period May 1, 1998, to late May 1998. When this worm hit, compromised systems were left with a “w0rm” backdoor account. The target’s Internet Protocol (IP) Address was then emailed to the worm’s developers. All logfiles in the targeted directory were deleted, and all index.html files on the file system were located and replaced with the words “The ADM Internet w0rm is here!” Nazario, J. Defense and Detection Strategies against Internet Worms. [Online, 2004.] VX Heavens Website. http://vx.netlux.org/lib/anj01.html#c421/.
0
0
A collection of programs written to automatically exploit vulnerabilities in Linux systems to gain access, attack other systems from compromised hosts, and copy itself to vulnerable systems. This worm was seen in the period May 1, 1998, to late May 1998. When this worm hit, compromised systems were left with a “w0rm” backdoor account. The target’s Internet Protocol (IP) Address was then emailed to the worm’s developers. All logfiles in the targeted directory were deleted, and all index.html files on the file system were located and replaced with the words “The ADM Internet w0rm is here!” A collection of programs written to automatically exploit vulnerabilities in Linux systems to gain access, attack other systems from compromised hosts, and copy itself to vulnerable systems. This worm was seen in the period May 1, 1998, to late May 1998. When this worm hit, compromised systems were left with a “w0rm” backdoor account. The target’s Internet Protocol (IP) Address was then emailed to the worm’s developers. All logfiles in the targeted directory were deleted, and all index.html files on the file system were located and replaced with the words “The ADM Internet w0rm is here!” Nazario, J. Defense and Detection Strategies against Internet Worms. [Online, 2004.] VX Heavens Website. http://vx.netlux.org/lib/anj01.html#c421/.
0
0
The numerical sequence that serves as an identifier for an Internet server. An IP address appears as a series of four groups of numbers separated by dots. The first group is a number between 1 and 255 and the other groups are a number between 0 and 255, such as 192.135.174.1. Every server has its own unique address.
0
0
A trademark for an open-source version of the UNIX operating system.
0
0
Plural form of logfile
0
0
Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet.
0
0
A collection of programs written to automatically exploit vulnerabilities in Linux systems to gain access, attack other systems from compromised hosts, and copy itself to vulnerable systems. This worm was seen in the period May 1, 1998, to late May 1998. When this worm hit, compromised systems were left with a “w0rm” backdoor account. The target’s Internet Protocol (IP) Address was then emailed to the worm’s developers. All logfiles in the targeted directory were deleted, and all index.html files on the file system were located and replaced with the words “The ADM Internet w0rm is here!” A collection of programs written to automatically exploit vulnerabilities in Linux systems to gain access, attack other systems from compromised hosts, and copy itself to vulnerable systems. This worm was seen in the period May 1, 1998, to late May 1998. When this worm hit, compromised systems were left with a “w0rm” backdoor account. The target’s Internet Protocol (IP) Address was then emailed to the worm’s developers. All logfiles in the targeted directory were deleted, and all index.html files on the file system were located and replaced with the words “The ADM Internet w0rm is here!” Nazario, J. Defense and Detection Strategies against Internet Worms. [Online, 2004.] VX Heavens Website. http://vx.netlux.org/lib/anj01.html#c421/.
0
0
A destructive computer program that copies itself over and over until it fills all of the storage space on a computer's hard drive or on a network.
0
0
Find another word for adm worm of 1998. In this page you can discover 8 synonyms, antonyms, idiomatic expressions, and related words for adm worm of 1998, like: electronic mail or email, internet protocol (ip), ip address, linux, logfiles, malware, vulnerabilities in computers and worm.