A malicious piece of software
Published:
22 July 2001 y., Sunday
The CODE RED worm is a malicious piece of software that replicates
and propagates to unpatched Microsoft IIS webservers running on
Windows NT or 2000. Once the worm has infected a machine it begins
scanning random IP addresses looking for other IIS servers
to infect. The worm is currently estimated to have infected at
least 50,000 servers and is spreading fast. The scanning traffic
generated by the worm is now causing denial of service effects on
many networks. An analysis of the worm's programs indicates that
all infected machines will begin waging a flooding attack
against www.whitehouse.gov sometime tomorrow (July 20th). The
effect of this many machines operating in concert in a DDoS
attack could possibly be devastating to the Internet infrastructure.
Please visit the following URL for information and patches
from Microsoft.
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
Šaltinis:
incidents.org
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Windows users were warned today to be on their guard for a new Trojan that poses as a racy attachment to a saucy email
more »
Global ranking of communications technology puts U.S. at No. 11, while Sweden takes top spot
more »
search.lt presents newest links
more »
Credit card harvester 'MiMail I' spreading worldwide
more »
Microsoft Corp. on Monday will announce the release of its Virtual PC technology to manufacturing
more »
search.lt presents newest links
more »
European powerhouse Vodafone Group plc announced it will begin selling BlackBerry devices and servers from Research In Motion Ltd
more »
The automotive industry will drive online spending to a projected $1.3 billion by the end of 2003, according to data from Borrell Associates Inc., representing a 15 percent increase over 2002
more »
The U.S. government doesn't have the ability to crack some sophisticated types of encryption, putting investigators of terrorism threats at a disadvantage
more »
While critics in the United States grow more concerned each day about the insecurity of electronic voting machines, Australians designed a system two years ago that addressed and eased most of those concerns
more »