Welchia worm synonyms

Category:
Part of speech:
First noticed on August 18, 2003. By February 26, 2004, Symantec Security Response downgraded this worm threat to a Category 2 from a Category 3. The Welchia worm exploited a number of vulnerabilities, including the DCOM RPC using TCP port 135 and the WebDav vulnerability using TCP port 80. The Welchia worm tried to retrieve the DCOM RPC patch from Microsoft’s patch and update server, install it, and then restart the computer. The worm also looked for active machines to infect by sending an ICMP echo request (Ping), resulting in increased ICMP traffic. After doing all this, the worm also tried to remove itself—thus giving it the affectionate handle of “do-gooder.” First noticed on August 18, 2003. By February 26, 2004, Symantec Security Response downgraded this worm threat to a Category 2 from a Category 3. The Welchia worm exploited a number of vulnerabilities, including the DCOM RPC using TCP port 135 and the WebDav vulnerability using TCP port 80. The Welchia worm tried to retrieve the DCOM RPC patch from Microsoft’s patch and update server, install it, and then restart the computer. The worm also looked for active machines to infect by sending an ICMP echo request (Ping), resulting in increased ICMP traffic. After doing all this, the worm also tried to remove itself—thus giving it the affectionate handle of “do-gooder.” Perriot, F. and Knowles, D. W32.Welchia.Worm. [Online, July 28, 2004.] Symantec Security Response Website. http://securityresponse.symantec.com/avcenter/venc/ data/w32.welchia.worm.html.
0
0
First noticed on August 18, 2003. By February 26, 2004, Symantec Security Response downgraded this worm threat to a Category 2 from a Category 3. The Welchia worm exploited a number of vulnerabilities, including the DCOM RPC using TCP port 135 and the WebDav vulnerability using TCP port 80. The Welchia worm tried to retrieve the DCOM RPC patch from Microsoft’s patch and update server, install it, and then restart the computer. The worm also looked for active machines to infect by sending an ICMP echo request (Ping), resulting in increased ICMP traffic. After doing all this, the worm also tried to remove itself—thus giving it the affectionate handle of “do-gooder.” First noticed on August 18, 2003. By February 26, 2004, Symantec Security Response downgraded this worm threat to a Category 2 from a Category 3. The Welchia worm exploited a number of vulnerabilities, including the DCOM RPC using TCP port 135 and the WebDav vulnerability using TCP port 80. The Welchia worm tried to retrieve the DCOM RPC patch from Microsoft’s patch and update server, install it, and then restart the computer. The worm also looked for active machines to infect by sending an ICMP echo request (Ping), resulting in increased ICMP traffic. After doing all this, the worm also tried to remove itself—thus giving it the affectionate handle of “do-gooder.” Perriot, F. and Knowles, D. W32.Welchia.Worm. [Online, July 28, 2004.] Symantec Security Response Website. http://securityresponse.symantec.com/avcenter/venc/ data/w32.welchia.worm.html.
0
0
(Nautical) Of or relating to port, the left-hand side of a vessel.
0
0
First noticed on August 18, 2003. By February 26, 2004, Symantec Security Response downgraded this worm threat to a Category 2 from a Category 3. The Welchia worm exploited a number of vulnerabilities, including the DCOM RPC using TCP port 135 and the WebDav vulnerability using TCP port 80. The Welchia worm tried to retrieve the DCOM RPC patch from Microsoft’s patch and update server, install it, and then restart the computer. The worm also looked for active machines to infect by sending an ICMP echo request (Ping), resulting in increased ICMP traffic. After doing all this, the worm also tried to remove itself—thus giving it the affectionate handle of “do-gooder.” First noticed on August 18, 2003. By February 26, 2004, Symantec Security Response downgraded this worm threat to a Category 2 from a Category 3. The Welchia worm exploited a number of vulnerabilities, including the DCOM RPC using TCP port 135 and the WebDav vulnerability using TCP port 80. The Welchia worm tried to retrieve the DCOM RPC patch from Microsoft’s patch and update server, install it, and then restart the computer. The worm also looked for active machines to infect by sending an ICMP echo request (Ping), resulting in increased ICMP traffic. After doing all this, the worm also tried to remove itself—thus giving it the affectionate handle of “do-gooder.” Perriot, F. and Knowles, D. W32.Welchia.Worm. [Online, July 28, 2004.] Symantec Security Response Website. http://securityresponse.symantec.com/avcenter/venc/ data/w32.welchia.worm.html.
0
0
A destructive computer program that copies itself over and over until it fills all of the storage space on a computer's hard drive or on a network.
0
0
Find another word for welchia worm. In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for welchia worm, like: internet control message protocol (icmp), ping or packet internet groper, port, tcp/ip or transmission control protocol/internet protocol and worm.