The is the third article in our series: "To Protect Or Not To Protect". In this particular article, we would be exploring computer worms.
The first question we need to answer though, is what is a computer worm?
A computer worm is a program that has the capacity to multiply itself by penetrating operating systems with the intent of causing harm. Often, their symptoms are not difficult to spot.
When you detect strange operating system error codes, slow or even crushing computer plus weird desktop icons or files, you can be sure your system is infected. That is not all because worms also have the capacity to exploit weak passwords on networks.
Hiding in the active areas of an operating system, these malicious malware are often discovered only after causing harm. They can delete or encrypt files, they can steal data and provide access to other computer systems to cause havoc through a process called back door.
What makes a worm dangerous, malicious and different from other malware is the ability to replicate itself. What this means is that worms do not need prompting or human interaction to act. On a network for instance, they can just multiply themselves by distributing harmful programs to other nodes. A worm can attach itself to an address in an address book and affect the destination computer by emailing itself.
Their potential is deadly so people are often advised not to open suspicious emails, attachment or links. They exploit vulnerability and can sometimes be difficult to eradicate. In severe circumstances however, users are often advised to reinstall operating systems.
With such an incredible potential to not only disrupt but destroy sensitive information, what are the preventative methods and remedies for curing a worm infected computer system? You will be glad to know that there are a number of techniques in place to safe guard your system, and below are some tips.
7 Tips for preventing and curing computer worms
So now, I guess the question is not have your computer system been affected by malware before? But how have you dealt with malware infection? Did you employ any of the above methodologies?