Jumat, 26 Juni 2009

Worm

Worm considered closely associated with the following programs that can mereplikasi himself and send a copy from computer to computer via a network connection. Once arrived, mereplikasi for the worm is activated and propagasi again. In addition propagasi, worms usually do not want that function.

Network worm uses to spread the relationship network of sitem to other systems. Once active on a system, network worms can apply as bacteria or viruses, or trojan horse program paste or a number of actions to annoy or destroy.

Mereplikasi for himself, the network worm uses a network service, such as:
- Electronic mail facilities,
- A remote execution capability,
- The ability to login remotely.

Response :
  1. Always do a Scan for disk into your PC. Although seemingly trivial, but that this will be a small help to protect your computer from viruses transmitted through exchange of floppy disks switch. If a PC infected by a virus, then inserted the disk to them, will most likely be infected as well. Therefore, do not carelessly open the floppy on the computer belonging to your friend, before the floppy disks that pass the selection scandisk.
  2. Scan the CD into your CD drive. Although it seems more exclusive and secure, but also a CD that has the potential are the same as floppy disks, transmit the virus. Therefore, do not dally! Stay do a scan on a CD that will be installed on your computer, even though the CD was recently purchased from the store.
  3. Make a scan of your hard drive, every time you will begin to work with it. As always checked the five health, your PC must also always be whether the healthy or have been infected by the virus. Moreover with the conduct of the hard disk scan before starting a job, you reduce the risk of disruption caused by the virus during the process of your work. In addition, there is the chance occurrence of damage to your files.
  4. Protect your disk, if you include them in your PC to other people. As mentioned above, if you are forced to enter the disk in your computer to other people, then you need to protected floppy first. Consequently, you can not make changes to files stored on floppy disks are.
  5. Do not indiscriminate downloading attachment. Nowadays many types of worm that sends copies of itself in e-mail attachment. For example, worm Miss world. Therefore you should not open any attachment if the sender address does not you know.
  6. Selective in opening e-mail. The same laws that apply to open in the e-mail. a number of viruses and worms duplicate itself and send copies to the entire e-mail address listed on the Microsoft Outlook address book computer diserangnya Express. Thus, the potential victim will not be put with suspicion and will soon open the e-mail is toxic.
  7. Install and to update the antivirus program on your computer. Sometimes, people are still common in the computer, the feel is secure if it is to install Norton or MacAffee program. You are wrong! Antivirus program has also expired the period such as food cans. Therefore, you should always be to update your antivirus program. because antivirus programs that have expired, will not have more teeth to keep out the virus attack on your computer.
  8. Always follow the news about the latest viruses. Period has expired addition, anti-virus program is also always an update with respect to virus-virus, which continues in the new-release. Experts continue to do development for rival who is also the creator of the virus-race competition to create a more vicious virus from day to day.
  9. Download Microsoft Outlook Security Patch into your computer system. As is known, does not have the perfect software program. That is, there are certain weak point or a bug in the software. as well as going to the Microsoft Outlook Express application. Therefore, with download Microsoft Outlook Security Patch into your computer system, means that you have overcome a bug in the program.
  10. Disabling Windows Scripting Host. As known, many new viruses and worms that developed with visual basic scripting system under windows. To minimize attacks, you should disable the program that works for mengotomatisasi a function. However, please note that not all speak vbs virus can disable the program on hold with this