A worm is a computer program
that replicates itself. It uses the internet to send its copies to other
computers. It is a different form of virus program since it doesn’t need to be
attached to a specific program. It uses the resources of one machine to attack
another machine. It causes damage to the internet by consuming bandwidth and
performing other detrimental activities.
The Morris Computer Worm
The first computer worm is known as the Morris Worm, and it gained the public’s attention by causing a lot of damage on the internet . The worm was named after its creator Robert Tappan Morris, and it was launched from MIT on the 2nd of November, 1988.
On the 3rd of November, 1988, PCs from all over the world were overloaded with unknown processes that made them very slow. Every attempt to reboot or clean the system was unsuccessful because the processes returned after each clean up. This incident is known as “Black Thursday”. It was the first time that people had to deal with an internet worm.
Robert Morris claimed that his program was not created to cause harm, but only to measure the size of the internet. Although the worm was released from MIT, it came originally from Cornell. The Morris Worm was working to develop well-known vulnerability in rsh/rexec, weak passwords, Finger, and Unix Sendmail.
The Spread of the Worm
The Morris Worm was very powerful. When it gained access to a PC, it launched a program that searched for other internet locations, and it infected them if it could. The worm traveled over the internet, so every machine connected to an infected machine would be exposed to a risk, which would eventually amount to a huge number of infected computers. The worm used security gaps to enter a computer, so the only way to prevent it from gaining entry was to seal the gaps. Once it was inside a computer, it would spread automatically. The moment the worm found an internet connection, it downloaded its copy to that location and continued to operate as normal.
Internet Worm Program: Analysis of the Internet Worm Program
Snowplow.org – The What, Why, and How of the 1988 Internet Worm: Provides information about the history of worms, their activities, and others
US v. Robert Tappan Morris: Details the lawsuit brought against the worm's creator.
VirusAll.com – Computer Worms: Information about computer worms
Report on the Internet Worm: An article on the Internet Worm from the Department of Electrical and Computer Engineering
ACM Portal – The Cornell Commission on Morris and the Worm: Computing literature on the Morris Worm
United States vs Morris: Provides information about the Morris court case
The Story of the Internet Worm: An account of how the internet was shut down by the Internet Worm in 1988
Security Focus – A Brief History of the Worm: Information about the history of the Internet Worm
1988 Internet Worm: Case study of the 1988 Internet Worm
CERT - Internet Security: Provides information about software assurance, secure systems, organizational security, coordinated response, training, and others
Tech-Pro.net – How to Remove a Worm Virus from your Computer: Useful information about internet worm removal
WareSeeker.com – Software for Internet Worm Protection: Free software that provides protection against internet worms
PBS.org – Famous Worms and Viruses: List of famous worms and viruses
There are a number of tools that can be used to remove internet worms. You can download free software that can prevent and remove worms effectively. There are also companies that provide innovative solutions, such as hard drive data recovery, raid data recovery, raid server recovery , and many other data recovery services if you experience data loss because of internet worms.