Previous Slide


What was "The Worm"?

Next Slide

THE WORM WAS A PROGRAM WHOSE PRIMARY PURPOSE WAS TO RUN COPIES OF ITSELF ON OTHER COMPUTERS.

BASIC WORM M.O.:

  • FIND THE NAMES OF SOME REMOTE COMPUTERS.
  • FIND WAYS TO "LOG ON" TO SOME OF THESE REMOTE COMPUTERS.
  • EXECUTE COMMANDS TO COPY THE WORM PROGRAM TO THE REMOTE COMPUTERS.
  • START RUNNING THE COPIES ON THE REMOTE COMPUTERS.

FATAL FLAW:

  • SINCE SPREAD WAS RATHER RANDOM AND A BIT TOO FAST, ONE MACHINE MIGHT END UP RUNNING MANY COPIES OF THE WORM.



The Web:
Technologies and
Techniques


Links to other course pages:


Williams College
Department of Computer Science
This page is part of a section of lecture slides related to " The Internet Worm " within the topic "Computer Security: A Case Study?". Other slides within this section and other sections of slides for the topic "Computer Security: A Case Study?" can be accessed using the links below.
  • Paranoia Raising
  • Some Sample Security Problems
  • The Internet Worm
  • The Internet Worm
  • What was "The Worm"?
  • Finding Machine Names
  • How the Worm Broke in
  • Password Guessing
  • The SENDMAIL "Trap Door"
  • The Finger Server Bug
  • Computer Memory Organization
  • Computer Memory and Program Variables
  • Memory Overflow
  • The Finger Bug
  • It Couldn't Happen Again! Could it?