<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://pm.haifa.ac.il/skins/common/feed.css?207"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title>The Absolute Most Known Computer Worms7715861 - Revision history</title>
		<link>https://pm.haifa.ac.il/index.php?title=The_Absolute_Most_Known_Computer_Worms7715861&amp;action=history</link>
		<description>Revision history for this page on the wiki</description>
		<language>en</language>
		<generator>MediaWiki 1.15.1</generator>
		<lastBuildDate>Sat, 18 Apr 2026 16:45:24 GMT</lastBuildDate>
		<item>
			<title>WaylonajyiforkoaGatliff:&amp;#32;Created page with 'Thinking of throwing away your notebook because of a failure of some type? Includes a notebook element abruptly halted working appropriately? Is just a method that used to run go…'</title>
			<link>https://pm.haifa.ac.il/index.php?title=The_Absolute_Most_Known_Computer_Worms7715861&amp;diff=158982&amp;oldid=prev</link>
			<description>&lt;p&gt;Created page with &amp;#39;Thinking of throwing away your notebook because of a failure of some type? Includes a notebook element abruptly halted working appropriately? Is just a method that used to run go…&amp;#39;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Thinking of throwing away your notebook because of a failure of some type? Includes a notebook element abruptly halted working appropriately? Is just a method that used to run good abruptly proceeding haywire?&lt;br /&gt;
&lt;br /&gt;
Before you chalk it as much as equipment fault like broken notebook factors, you have to first make sure that it's not really a virus assault of some sort. While just as harrowing as a laptop element failure, viruses may be easily taken care of with a reliable antivirus method.&lt;br /&gt;
&lt;br /&gt;
Obviously, not all viruses are created equal; and as the viruses shown under have long since had countermeasures produced for them, at that time of the infestations, they certainly were infamous small buggers.&lt;br /&gt;
&lt;br /&gt;
Here are the five worst of the ton.&lt;br /&gt;
&lt;br /&gt;
1. Melissa&lt;br /&gt;
&lt;br /&gt;
In 1999, a pc disease started scattering like wildfire via mail communications. Called &amp;quot;Melissa,&amp;quot; creator David T. Smith said he named it after having a Florida incredible dancer. And in the same manner that a dancer could attraction you with a, the Melissa virus enticed people to open these emails with the concept &amp;quot;Here is that record that you asked for, don't present it to anybody else.&amp;quot; Once exposed, the virus subsequently replicates itself by pursuing the top fifty people in the recipient's address book. &lt;br /&gt;
&lt;br /&gt;
For more amazing info [http://systemproctection.snappages.com/blog/2012/08/17/maintaining-your-pcs-speed-and-performance go to this page].&lt;br /&gt;
&lt;br /&gt;
2. I Love You&lt;br /&gt;
&lt;br /&gt;
Per year later, another heavy-hitter appeared, now from the Philippines. Among other items, it might copy itself several occasions and disguise the replicants in a variety of independent folders; include brand-new files to registry keys; change several significant system files with duplicates of itself; and obtain a report named WIN-BUGSFIX.EXE (a password-stealing system) and manage it.&lt;br /&gt;
&lt;br /&gt;
3. Klez&lt;br /&gt;
&lt;br /&gt;
In 2001, annually after I Enjoy You hit, an even more scary one came out of the wood. Klez, when activated, increased it self by way of a victim's email list much like Melissa, and delivered pc and notebook parts themselves to be inoperable. Before it was totally eradicated, its builders also fine-tuned it in order that it'd be smart enough to copy the email tackle it was originating from.&lt;br /&gt;
&lt;br /&gt;
4. Rule Red and Rule Reddish II&lt;br /&gt;
&lt;br /&gt;
Likewise in exactly the same year as Klez, the Code Red and Code Red II worms seemed. These worms exploited a weakness in the programming of the Windows 2000 and Windows NT systems. The weakness under consideration was the OSes' buffer flood problem. This problem happens whenever a computer obtains more info compared to system's buffers may approach and begins to overwrite next memory.&lt;br /&gt;
&lt;br /&gt;
The initial Code Red infamously bombarded net machines at the White House by applying a Distributed Denial of Service (DDoS) assault. That strike caused every infected computer to contact the White House's computers, thereby overloading them.&lt;br /&gt;
&lt;br /&gt;
Meanwhile, Code Red II-infected computers were no further operable by their proprietors as the virus created a backdoor system in their computers' devices, permitting a remote individual to gain control of these devices.&lt;br /&gt;
&lt;br /&gt;
5. Nimda&lt;br /&gt;
&lt;br /&gt;
Nevertheless in 2001, a disease called Nimda (that's &amp;quot;admin&amp;quot; spelled backwards) spread through the web. Nimda was famous to be the fastest-spreading malware subsequently, getting only 22 moments to get from first discharge to the most truly effective listing of noted strikes.&lt;br /&gt;
&lt;br /&gt;
Despite being able to taint property PCs equally well, its principal target was internet machines, with the purpose of reducing these down somewhat. It travelled through the web using various methods, perhaps not the least which was mail propagation. This adeptness was what permitted it to flourish it self across tens of thousands of hosts in history time. &lt;br /&gt;
&lt;br /&gt;
If you want to get more details [http://fixtegistryerrors.sweetcircles.com/2012/08/01/straightening-the-dpmtraydll-error/ click here].&lt;/div&gt;</description>
			<pubDate>Mon, 27 Aug 2012 01:01:39 GMT</pubDate>			<dc:creator>WaylonajyiforkoaGatliff</dc:creator>			<comments>https://pm.haifa.ac.il/index.php?title=Talk:The_Absolute_Most_Known_Computer_Worms7715861</comments>		</item>
	</channel>
</rss>