Internet Worm


Also found in: Acronyms.

Internet Worm

(networking, security)
The November 1988 worm perpetrated by Robert T. Morris. The worm was a program which took advantage of bugs in the Sun Unix sendmail program, Vax programs, and other security loopholes to distribute itself to over 6000 computers on the Internet. The worm itself had a bug which made it create many copies of itself on machines it infected, which quickly used up all available processor time on those systems.

Some call it "The Great Worm" in a play on Tolkien (compare elvish, elder days). In the fantasy history of his Middle Earth books, there were dragons powerful enough to lay waste to entire regions; two of these (Scatha and Glaurung) were known as "the Great Worms". This usage expresses the connotation that the RTM hack was a sort of devastating watershed event in hackish history; certainly it did more to make non-hackers nervous about the Internet than anything before or since.
References in periodicals archive ?
GR_POL (IP_POL) (Average IP pollution level of IPs in the group): If the hosts in the same group have many characteristics of a zombie PC, this group is likely to be a botnet or internet worm.
The technology of internet worm detection is to check the way of the control message, such as ICMP destination unreachable message and RESET in TCP.
September 2003 was the month of the Internet worm Swen.
Carnegie Mellon's CERT/CC was formed in November 1988 within the Software Engineering Institute (SEI) by the Defense Advanced Research Projects Agency (DARPA) after an Internet worm brought 10 percent of Internet-connected systems to a halt.
Police in Romania on Wednesday arrested a 24-year-old former student in connection with a computer-crippling Internet worm, according to a computer security company that aided police.
Code Red is not the only Internet worm on the loose.
Kaspersky Lab, the Russian anti-virus specialist, has warned about a new Internet worm that attacks Linux-based computers.
And finally, raising the specter of Robert Tappan Morris' infamous Internet worm that shut down most of the Net in 1988, Gates invokes the psychology of fear to separate PC isolates from Net connectives.
Popularized cases of computer misuse include attacks by the Wily West German Hackers, various computer-based credit-card and telephone frauds, increasingly many types and instances of so-called "viruses" in personal computers, and the Internet Worm.
Authentium, the leading developer of security software-as-a-service technologies, rejected claims made by Virginia-based iDefense earlier this week that the antivirus industry had responded slowly to the Warezov Internet worm outbreak (the worm is called "Stration" by iDefense and some antivirus vendors).
Shannon, "Code-Red: a Case Study on the Spread and Victims of an Internet Worm," in Proc.
Vulnerabilities are defined as 'critical' when a damaging Internet worm could replicate without the need for the user to do anything to the machine.

Full browser ?