Computer Worm - Worms With Good Intent

Worms With Good Intent

Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, most security experts regard all worms as malware.

Some worms, such as XSS worms, have been written to research how worms spread. For example, the effects of changes in social activity or user behavior. One study proposed what seems to be the first computer worm that operates on the second layer of the OSI model (Data link Layer), it utilizes topology information such as Content-addressable memory (CAM) tables and Spanning Tree information stored in switches to propagate and probe for vulnerable nodes until the enterprise network is covered.

Read more about this topic:  Computer Worm

Famous quotes containing the words worms and/or intent:

    But at my back I always hear
    Time’s winged chariot hurrying near;
    And yonder all before us lie
    Deserts of vast eternity.
    Thy beauty shall no more be found,
    Nor, in thy marble vault, shall sound
    My echoing song: then worms shall try
    That long preserved virginity:
    And your quaint honor turn to dust,
    And into ashes all my lust:
    The grave’s a fine and private place,
    But none, I think, do there embrace.
    Andrew Marvell (1621–1678)

    The intent escalator lifts a serenade
    Stilly
    Of shoes, umbrellas, each eye attending its shoe, then
    Bolting outright somewhere above where streets
    Burst suddenly in rain. . . .
    Hart Crane (1899–1932)