Blaster worm synonyms

Category:
Part of speech:
Also known as W32/Lovs.an.worm.a, Win32.Poza.A, Lovsan, WORM-MSBLAST.A, W32/Blaster-A, W32/Blaster, and Worm.Win32.Lovesan. Discovered on August 11, 2003, the Blaster computer worm adversely affected Windows 2000, Windows NT, Windows Server 2003, and Windows XP. The worm attempted to download the msblast.exe file to the Windows Directory and then execute it. It also attempted to conduct a Denial of Service (DoS) attack on the Microsoft Windows Update Web server to stop the user from applying a patch on his or her computer against the DCOM RPC vulnerability. Within 24 hours of its detection, Blaster had infected more than 300,000 computers. Symantec Security Response downgraded the threat of the Blaster Worm to a Category 2 from a Category 3 severity rating as of February 26, 2004. Also known as W32/Lovs.an.worm.a, Win32.Poza.A, Lovsan, WORM-MSBLAST.A, W32/Blaster-A, W32/Blaster, and Worm.Win32.Lovesan. Discovered on August 11, 2003, the Blaster computer worm adversely affected Windows 2000, Windows NT, Windows Server 2003, and Windows XP. The worm attempted to download the msblast.exe file to the Windows Directory and then execute it. It also attempted to conduct a Denial of Service (DoS) attack on the Microsoft Windows Update Web server to stop the user from applying a patch on his or her computer against the DCOM RPC vulnerability. Within 24 hours of its detection, Blaster had infected more than 300,000 computers. Symantec Security Response downgraded the threat of the Blaster Worm to a Category 2 from a Category 3 severity rating as of February 26, 2004. Knowles, D., Perriot, F. and Szor, P. Symantec Security Response: W32.Blaster.Worm. [Online, July 15, 2004.] Symantec Security Response Website. http:// securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html.
0
0
A device used for computing and otherwise processing information; specif., an electronic machine which, by means of stored instructions and information, is used to perform rapid, often complex calculations, compile and correlate data, download and play audio and video communications, access the World Wide Web, send and receive e-mail, etc.; now, esp., digital computer
0
0
Also known as W32/Lovs.an.worm.a, Win32.Poza.A, Lovsan, WORM-MSBLAST.A, W32/Blaster-A, W32/Blaster, and Worm.Win32.Lovesan. Discovered on August 11, 2003, the Blaster computer worm adversely affected Windows 2000, Windows NT, Windows Server 2003, and Windows XP. The worm attempted to download the msblast.exe file to the Windows Directory and then execute it. It also attempted to conduct a Denial of Service (DoS) attack on the Microsoft Windows Update Web server to stop the user from applying a patch on his or her computer against the DCOM RPC vulnerability. Within 24 hours of its detection, Blaster had infected more than 300,000 computers. Symantec Security Response downgraded the threat of the Blaster Worm to a Category 2 from a Category 3 severity rating as of February 26, 2004. Also known as W32/Lovs.an.worm.a, Win32.Poza.A, Lovsan, WORM-MSBLAST.A, W32/Blaster-A, W32/Blaster, and Worm.Win32.Lovesan. Discovered on August 11, 2003, the Blaster computer worm adversely affected Windows 2000, Windows NT, Windows Server 2003, and Windows XP. The worm attempted to download the msblast.exe file to the Windows Directory and then execute it. It also attempted to conduct a Denial of Service (DoS) attack on the Microsoft Windows Update Web server to stop the user from applying a patch on his or her computer against the DCOM RPC vulnerability. Within 24 hours of its detection, Blaster had infected more than 300,000 computers. Symantec Security Response downgraded the threat of the Blaster Worm to a Category 2 from a Category 3 severity rating as of February 26, 2004. Knowles, D., Perriot, F. and Szor, P. Symantec Security Response: W32.Blaster.Worm. [Online, July 15, 2004.] Symantec Security Response Website. http:// securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html.
0
0
(Computing) A self-replicating program that propagates through a network.
0
0
Also known as W32/Lovs.an.worm.a, Win32.Poza.A, Lovsan, WORM-MSBLAST.A, W32/Blaster-A, W32/Blaster, and Worm.Win32.Lovesan. Discovered on August 11, 2003, the Blaster computer worm adversely affected Windows 2000, Windows NT, Windows Server 2003, and Windows XP. The worm attempted to download the msblast.exe file to the Windows Directory and then execute it. It also attempted to conduct a Denial of Service (DoS) attack on the Microsoft Windows Update Web server to stop the user from applying a patch on his or her computer against the DCOM RPC vulnerability. Within 24 hours of its detection, Blaster had infected more than 300,000 computers. Symantec Security Response downgraded the threat of the Blaster Worm to a Category 2 from a Category 3 severity rating as of February 26, 2004. Also known as W32/Lovs.an.worm.a, Win32.Poza.A, Lovsan, WORM-MSBLAST.A, W32/Blaster-A, W32/Blaster, and Worm.Win32.Lovesan. Discovered on August 11, 2003, the Blaster computer worm adversely affected Windows 2000, Windows NT, Windows Server 2003, and Windows XP. The worm attempted to download the msblast.exe file to the Windows Directory and then execute it. It also attempted to conduct a Denial of Service (DoS) attack on the Microsoft Windows Update Web server to stop the user from applying a patch on his or her computer against the DCOM RPC vulnerability. Within 24 hours of its detection, Blaster had infected more than 300,000 computers. Symantec Security Response downgraded the threat of the Blaster Worm to a Category 2 from a Category 3 severity rating as of February 26, 2004. Knowles, D., Perriot, F. and Szor, P. Symantec Security Response: W32.Blaster.Worm. [Online, July 15, 2004.] Symantec Security Response Website. http:// securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html.
0
0
Find another word for blaster worm. In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for blaster worm, like: blackout of 2003, computer, denial of service (dos), worm and vulnerabilities of computers.