Computer worms are hazardous to your health an
These worms on the computer are only one form of malware as are trojans and viruses.
The are software applications that are very malicious and intended to spread by way of computer networks.
Normally, a person installs this accidentally when opening a message or email attachment that contains scripts that are executable.
When these worms are installed on a computer they generate additional email messages that contain copies of the worm.
To learn more, go to computer safety for more protection tips.
Worms on computers have various purposes and forms such as;
The user has no idea when he opens the P2P network; the worm is downloaded and spreads across the network.
Emails with an attachment or link actually link to a website that’s infected with the worm’s code.
When the user clicks the attachment or clicks the emails link, the worm is activated and begins to work.
The methods of spreading include services of MS Outlook, Windows MAPI functions and if you directly connect to SMTP servers with the worms own SMTP API.
Learn more ways to protect yourself while using the computer at computer identity theft.
They will achieve full access by trying to connect with vulnerable systems.
These can send data packets which then install a worm downloader or the worm itself, or send requests very easily.
They spread and/or infect files infected with the worm’s code and by sending links to sites that are infected.
IM Worms better know as Instant Messaging Worms
These are different from the worm that infects your email, because they spread their worm through the use of the IM applications instead of the email applications.
In some cases anti-virus software and spyware scanners may not eliminate all signs of a particular malware, especially if you are not updating them on a regular basis.
Stay protected from these nasty computer worms and identity theft so you don’t have to stress every time you use your computer.