Worms can spread by internet so rapidly that they may often go undetected by anti-virus software because the updates that would enable the software to detect the worm have not yet been developed or downloaded. Because of this, it’s advisable to use an anti-virus product that updates frequently which cuts the delay between a virus appearing and the updates arriving to a minimum. Worm：Application Network；Malicious software which is a stand alone application. Worm is Often designed to propagate through a network, rather than just a single computer.
Vulnerabilities: Multitasking computers, especially those employing open network standards.
How to prevent worm?
-Limit connectivity, employ firewalls;
-Worms can run even without a host application
How to detect worm?
-Computer is slow starting or slow running
-Unexpected or frequent system failures
Contain, identify and recover;
Attempt to determine source of infection and issue alert
Computer virus vs. Computer worm
Viruses are computer programs that are designed to spread themselves from one file to another on a single
computer. A virus might rapidly infect every application file on an individual computer, or slowly infect
the documents on that computer, but it does not intentionally try to spread itself from that computer to other computers. In most cases, that’s where humans come in. We send e-mail document attachments, trade
programs on diskettes, or copy files to file servers. When the next unsuspecting user receives the infected file or disk, they spread the virus to their computer, and so on. Worms, on the other hand, are insidious because they rely less (or not at all) upon human behavior in order to spread themselves from one computer to others. The computer worm is a program that is designed to copy itself from one computer to another over a network (e.g. by using e-mail). The worm spreads itself to many computers over a network, and doesn’t wait for a human being to help. This means that computer worms spread much more rapidly than computer viruses.
Data recovery from drives due to virus attack is often easy, you just need to clear the virus with anti-virus software or use some data recovery software to scan the lost files. But for some severe virus attack, you need to choose some good data recovery tools which are able to protect the soure drives for further damage.
Data recovery Salon welcomes your comments and share with us your ideas, suggestions and experience. Data recovery salon is dedicated in sharing the most useful data recovery information with our users and only if you are good at data recovery or related knowledge, please kindly drop us an email and we will publish your article here. We need to make data recovery Salon to be the most professional and free data recovery E-book online.