Worms With Good Intent
Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, most security experts regard all worms as malware.
Some worms, such as XSS worms, have been written to research how worms spread. For example, the effects of changes in social activity or user behavior. One study proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.
Read more about this topic: Computer Worm
Famous quotes containing the words worms and/or intent:
“But at my back I always hear
Times winged chariot hurrying near;
And yonder all before us lie
Deserts of vast eternity.
Thy beauty shall no more be found,
Nor, in thy marble vault, shall sound
My echoing song: then worms shall try
That long preserved virginity:
And your quaint honor turn to dust,
And into ashes all my lust:
The graves a fine and private place,
But none, I think, do there embrace.”
—Andrew Marvell (16211678)
“The intent escalator lifts a serenade
Stilly
Of shoes, umbrellas, each eye attending its shoe, then
Bolting outright somewhere above where streets
Burst suddenly in rain. . . .”
—Hart Crane (18991932)