Do you know there will be bugs in apples, but do you know there will be "bugs" in computers? Although these two types of insects are completely different, research has found that computer "worms" have many similarities with insects in nature in terms of derivation and destruction. Today, let’s take a deeper look at what the Internet “bug” is, and its hazards and prevention.
Old Pete sat in front of the computer writing an email, frowning, and even knocking on the car to enter the car made a loud noise.
"Damn bugs! I have used several pesticides to kill them! They always hide from this tree to that tree! These hateful bugs! The existing pesticides don't work! Come here quickly and bring new pesticides, hurry up! The cost is not a problem, what is important is my orchard! For the sake of the fruits being about to mature, hurry up! God!" It turned out that Old Pete's orchard was experiencing a worm crisis. He contacted the agricultural pest control personnel today and was sending an email to ask them to come right away.
The origin of the worm
When it comes to worms, everyone is familiar with them. These lower organisms in nature feed on crops and bring economic losses to humans. However, if there is such a thing called "worm" in computers, which also brings serious economic losses to humans, you may think this is a fantasy. How can insects crawl into computers?
On November 2, 1988, the world's first computer worm was officially born. In order to verify whether computer programs can be copied and spread among different computers, Morris, a first-year graduate student at Cornell University in the United States, wrote a test program. In order to successfully enter another computer, he wrote a code to crack the user's password. At 5 a.m. on November 2, the program called "Worm" began its journey (Figure 1), and it did not disappoint Morris' expectations: it crawled into thousands of computers, crashed them, causing a record of economic losses of up to $96 million. From then on, the term "worm" spread, and Morris may not know that while proving this conclusion, he also opened Pandora's box.
Figure 1 The initial model of the worm.
The bug crawling into the machine
After a while, Old Pete received two emails, one of which was a reply from the pest control personnel, who said they would come over immediately; the other was a bit strange, which was sent from a strange address, with even more strange content, with only one line of words: "Hey, is that your photo?" Maybe it was a prank by some kid, and Old Pete deleted the email casually. But Old Pete would never dream of an unwelcome "guest" coming to the computer he used to manage the orchard.
Since the first worm showed its power in 1988, more and more people have joined the worm production camp. They use this method to prove their abilities or achieve some special purpose, so a variety of worms were born. But no matter how many worms "behave" (the things they need to do after entering a computer), there are only a few "propagation methods": email, web code, social engineering, and system vulnerabilities.
Next, let’s take a look at several main ways worms enter computers.
Old Pete sat in front of the computer writing an email, frowning, and even knocking on the car to enter the car made a loud noise.
"Damn bugs! I have used several pesticides to kill them! They always hide from this tree to that tree! These hateful bugs! The existing pesticides don't work! Come here quickly and bring new pesticides, hurry up! The cost is not a problem, what is important is my orchard! For the sake of the fruits being about to mature, hurry up! God!" It turned out that Old Pete's orchard was experiencing a worm crisis. He contacted the agricultural pest control personnel today and was sending an email to ask them to come right away.
The origin of the worm
When it comes to worms, everyone is familiar with them. These lower organisms in nature feed on crops and bring economic losses to humans. However, if there is such a thing called "worm" in computers, which also brings serious economic losses to humans, you may think this is a fantasy. How can insects crawl into computers?
On November 2, 1988, the world's first computer worm was officially born. In order to verify whether computer programs can be copied and spread among different computers, Morris, a first-year graduate student at Cornell University in the United States, wrote a test program. In order to successfully enter another computer, he wrote a code to crack the user's password. At 5 a.m. on November 2, the program called "Worm" began its journey (Figure 1), and it did not disappoint Morris' expectations: it crawled into thousands of computers, crashed them, causing a record of economic losses of up to $96 million. From then on, the term "worm" spread, and Morris may not know that while proving this conclusion, he also opened Pandora's box.
Figure 1 The initial model of the worm.
The bug crawling into the machine
After a while, Old Pete received two emails, one of which was a reply from the pest control personnel, who said they would come over immediately; the other was a bit strange, which was sent from a strange address, with even more strange content, with only one line of words: "Hey, is that your photo?" Maybe it was a prank by some kid, and Old Pete deleted the email casually. But Old Pete would never dream of an unwelcome "guest" coming to the computer he used to manage the orchard.
Since the first worm showed its power in 1988, more and more people have joined the worm production camp. They use this method to prove their abilities or achieve some special purpose, so a variety of worms were born. But no matter how many worms "behave" (the things they need to do after entering a computer), there are only a few "propagation methods": email, web code, social engineering, and system vulnerabilities.
Next, let’s take a look at several main ways worms enter computers.