jdt07 - CGS2060 How to Eat Your Worms Justin Toruno...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Figure : Standard wireless mouse Figure : Frustration builds able 1: Top 10 Worst Computer Worms CGS2060 How to Eat Your Computer with Fried Worms Justin Toruno 1/24/2008
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How to Eat Your Computer with Fried Worms Justin Toruno Contents I certify that I started this assignment as a new blank document, and the work herein is all my own. I understand that if it is discovered that I copied another student's work, or made my work available to another student (knowingly or unknowingly), I will be charged with cheating and subject to the consequences as put forth in the class syllabus. What is a Worm? As each year goes by, our world is becoming smaller and smaller. Not by size, nor does it have anything to do with geography. Technology is as best as it has ever been in the past decade with more new and innovative ideas and creations. Unfortunately, as technology becomes better and better, the viruses and hackers get better at what they do. Holidays are times that are shared with family and friends, and of course everyone has heard the saying, “It’s better to give than receive.” Well, for computer hackers, they’re always willing to give. Hackers love to take advantage of the holidays by sending out viruses and worms through e-mails mostly. But how do you know what e-mails carry a worm and what is a worm for that matter? According to Wikipedia: “A computer worm is a self-replicating computer program . It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus , it does not need to attach itself to an existing program. Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.” 1 1 Wikipedia Web site, accessed January 2008, www.wikipedia.com 2
Background image of page 2
How to Eat Your Computer with Fried Worms Justin Toruno E-mails that carry a worm are usually sent by an unknown sender, but on occasion they can also be sent by acquaintances if their computer has been infected with a worm. The infected e-mails
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

jdt07 - CGS2060 How to Eat Your Worms Justin Toruno...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online