Talk:Computer worm

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Morris worm[edit]

According to several sources, Morris was a Cornell grad student at the time. Can this be debunked or confirmed?

What are your sources? Could you provide them?

Is Morris the guy who "took down the Internet"? (my dad's words)

See Morris worm Nixdorf 06:58, 30 Oct 2003 (UTC)

Useful page[edit]

Looking for more information about a strange e-mail I got, I found a link to this page from . Κσυπ Cyp   21:52, 30 Jan 2004 (UTC)

Genetic code in worms?[edit]

Genetic code that evolves, but keeps the algorithm intact (a.k.a. polymorphic code) is used by some worms that tries to hide their presence.. I can really feel and SEE how the academic world is left behind, blind. That kind of stuff has been around for YEARS you know :P!!! "It MIGHT"?!?!? Doh. // Noone

There's more to genetic algorithm than change. In general, genetic algorithms use three "operators" to drive "evolution": "selection", "mutation", and "recombination", with generatlly selection being considered the most fundamental. I can see how "mutation" can be defined in this sense (random changes do qualify all right), but I definitely can't see recombination and, more importantly, I don't yet see if there's any selection process at work. If we can argue that certain random "mutations" are more viable and thus spread better then others this might qualify as GA but not otherwise, IMHO. Any refelctions?
The bit in the article about 'genetic code' is indeed plain wrong - genetic algorithms have nothing to do with polymorphic code. - David Gerard 12:08, Feb 12, 2004 (UTC)
It seems that you people are right :| Hum.. But I dont see how that (genetic algorithms) could be a benefit to the worm? Perhaps I am just stupid. Noone

Good worms?[edit]

"It should be pointed out that worms are not always bad, and in fact can be occasionally useful, for instance they could be used to upgrade software on a very large privately run network."

Unless someone can come up with an actual example to put in the article (I can think of none), this is mere speculation and shouldn't really be in the article. - David Gerard 12:32, Feb 12, 2004 (UTC)

I recall there was a worm (or whatever you call it) that exploited one of the RPC vulnerabilities of Windows systems (I'd guess it should have been either MS03-026 or MS03-039) but instead of doing harm it installed the official Microsoft patch eliminating the vulnerability. I'll try to dig up some sort of evidence but maybe someone has it readily available? --jtg 10:53, Feb 13, 2004 (UTC)
There was a worm that went around trying to be a 'good' worm in the manner you describe, using the RPC vulnerability to remove the other worm and then close the hole. However, that worm caused its own bucket of trouble in the process. I'll comment out the claim in the article for now, pending a good example. - David Gerard 11:44, Feb 13, 2004 (UTC)
I tried to add a balanced comment on the topic, see the main page. --jtg 12:59, Feb 13, 2004 (UTC)
Good one! - David Gerard 13:38, Feb 13, 2004 (UTC)
the page seems to clearly state: Both worms and Trojans will cause harm to computers when executed. Harm however is a pretty subjective word.. take MyDoom.W32 for example: the Worm itself did nothing 'harmful' to the system, it simply made it less secure. (bad example, I know.) there's countless information gathering worms these days, or do they fall under some other catagory? —Preceding unsigned comment added by (talk) 22:18, 21 March 2008 (UTC)

I recall that some computers where I worked (CA 2003) were infected with a worm that tried to remove another worm. Sorry, but I don't have the details. I also heard a rumor that there was a worm that installed SETI@Home on infected computers. (Is this last an urban legend?) (talk) 00:58, 16 March 2008 (UTC)

Spammer theory[edit]

I'll see what I can find in evidence for the spammer theory of worm creation, something more substantial than "security experts agree." A lot of spam is known to be sent from home PCs rather than conventional open relays (a server with an SMTP server configured open), and a worm-installed backdoor is the presumed mechanism. Hmm ... - David Gerard 13:58, Feb 13, 2004 (UTC)

Found one!,1367,60747,00.html No doubt there's more. Having a single source, I've named the opining experts in question - Steve Linford from the antispammer side, Joe Stewart from the security side. That sentence is clumsy, but could reasonably be removed with more sources - David Gerard 14:17, Feb 13, 2004 (UTC)
And another: - names removed from sentence. - David Gerard 14:26, Feb 13, 2004 (UTC)

Rebooting and Worms[edit]

I read in the Encyclopedia of Computer Science from Wiley (2003) that a worm can be destroyed by rebooting a computer. They often reside in RAM, but I guess that means they can also reside on the HDD. I believe that the article in question hasn't been updated since around 1995. Is this actually true? I know there are worm removal tools, so why would those exist if the solution were a simple reboot?--Abs Like Jesus 03:28, 5 February 2007 (UTC)

this is completely true in the case of worms and Live distro's.. but that's justy silly. —Preceding unsigned comment added by (talk) 22:21, 21 March 2008 (UTC)


I don't see why searching for worm takes you automatically to the "elongated soft-bodied invertebrate animal" page. I mean call me crazy, but I think more people are interested in this type of worm. Elongated soft-bodied invertebrate animals are so last millenium. Erik E. 02:27, 13 February 2007 (UTC)

Haha! awesomness. However in most contries these days, the Biology students still outnumber the Comp-Sci students by a healthy margin. page counter maybe? :P —Preceding unsigned comment added by (talk) 22:25, 21 March 2008 (UTC)

Clarify origins of term[edit]

The article states that the name "worm" comes from a novel in 1975. It also implies that it was coined by Shock and Hupp in 1982. But that a worm was first created in 1978. This is very confusing. Which came first? How is the 1975 novel's use of the term relavent to the researchers' 1982 use of it? Did they call their 1978 program a worm? I am so confused! A2Z (talk) 20:09, 6 March 2008 (UTC)

Locating the CACM paper for Shoch (that's how John spells his name) and Hupp, you would find that the authors quote lines from the 1975 novel in the paper and provided inspiration and other thinking while they were writing code and experimenting with the program(s) in 1978. So did they call their '78 program a worm? Yes. Ask them. (talk) 01:07, 8 November 2008 (UTC)

Translating the german article?[edit]

The german Wikipedia has a great article about this topic here; it's much more organised and informing than this one. It was even a featured article there. If someone can translate it and replace this one with it, please do. (talk) 15:58, 25 May 2008 (UTC)


The term comes from Brunner's Shockwave Rider... AnonMoos (talk) 21:45, 26 March 2009 (UTC)

Operating systems[edit]

Are they any good sources on the relative vulnerabilities of the different major operating systems? (I swear I'm not just suggesting this as a Mac fanboy… it really does seems relevant to the subject. (: ) Lenoxus " * " 13:39, 5 June 2009 (UTC)

No, because it's all windows. Just like it's hard to find a source that underlines the fact that all Spanish people are humans. Too obvious to mention. I too find this a serious flaw with this article though. (And I'm not a winders or macos user.) (talk) 18:15, 22 April 2010 (UTC)
WP:NPOV please.Jasper Deng (talk) 04:38, 22 January 2011 (UTC)

What's a "blitz worm"?[edit]

Is "blitz worm" worthy of a mention?

Reference out of date[edit]

Reference number 4, "Uncovered: Trojans as Spam Robots" no longer exists. I tried searching the new site for a new link, but the article may have been removed from altogether. Alajamber (talk) 00:17, 2 November 2012 (UTC)

Replaced with Wayback link. Wyatt Riot (talk) 05:15, 2 November 2012 (UTC)

External links modified[edit]

Hello fellow Wikipedians,

I have just added archive links to one external link on Computer worm. Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

You may set the |checked=, on this template, to true or failed to let other editors know you reviewed the change. If you find any errors, please use the tools below to fix them or call an editor by setting |needhelp= to your help request.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

If you are unable to use these tools, you may set |needhelp=<your help request> on this template to request help from an experienced user. Please include details about your problem, to help other editors.

Cheers. —cyberbot IITalk to my owner:Online 19:57, 25 August 2015 (UTC)