1. the ability to copy itself. 2. the ability to work on your own without having to rely on another program. 3. the ability to move on the Internet. Most Internet worms themselves. It will not harm your computer, it is embedded with the code next to it is the worm manages to worm baits; The spread The Internet worked like a worm with your own brain. The first is the attempt to copy itself to other machine so people never have to end. The spread of the worm can be divided into two Internet: 1. via the Internet through the Internet. Owner, Internet worms can move themselves onto the Internet world. The Internet home of the sphere, it can go everywhere. Network system, or your machine may become a hotel owner, worms may visit or visits. If we don't have a good enough defense system. Internet worm does not need to rely on any carrier to sneak into our system, but the breakfast was to be used in a machine or system vulnerabilities; 2. pass the other carriers through other carriers, it is not true that the worm requires-to breed, but in the beginning to drop the worm to other programs, it's not considered to violate them, because when the worm was released, it was able to begin the life cycle by itself. Without the need to rely on those who transmit that whether hidden in other programs and then leave it to download by Internet or send an e-mail, you can use the program. The victim is asked to use. Damage. Affect the computer directly. Typically, the computer works as the owner of the intended machine. After the worm has been embedded into the Internet worm, the Internet will create a process itself. So that the worm runs on a Internet program. Your bridesmaids pull resources to working with the Internet worm. Thus, if you retrieve a resource to use, he may not only with serious damage to computer systems or damage your walls. The damage is divided into two:
การแปล กรุณารอสักครู่..
