hey /prog/
i was wondering, how the hell do worms self propagate and infect computers without the user being stupid enough to download & run them (e.g. trojans)?
if all they do is take advantage of security holes in the OS/applications then those holes must be absolutely huge, so why the hell aren't they patched immediately upon discovery?
it's not like i'm asking how to write them, jeez, i'm just curious about how they work.
but hey, whatever, learning new things is for losers, i'll just go read the same 20 year old book for the 100th time.
``Worms" tend to propagate using a variable amount of 2 different kinds of vulnerabilities:
1)Human stupidity ( ex. a message telling the user to run an attachement, or do some action which leads to execution of remote code)
2)Vulnerabilities in services or client applications, which are the result of 1, or just oversight from the coder or oversight from the user(not updating to a fixed service, browser, etc)
While 2 is fixable, and 1 may be partially fixed by education of said problem users, fixing 2 when the user is in condition 1 is not always an option, unless someone else does the required maintenance for them.
tl;dr: Even if there we lived in an utopic world with no bugs, the problem will always be between the computer and the chair. The choice of software/OS is not as relevant, as is the user using them.
Name:
Anonymous2008-12-27 16:46
>>7
also
3.Flaws in network implementation.
4.Removable Media(CDs,floppies,Flashdrives).
Why the hell did you have to bump this thread? Your actions are even more disturbing when taking into consideration the fact that you actually attempted to answer the retarded question presented herein.
>>8
3) Unsure exactly what kind of flaws you are talking about, but I guess miscofigured shares fall within this, thus 1.
4) Falls within 1, as sane users would disable things such automatic execution of autorun programs on CD/DVDs/USB drives
>>12
legacy regardless certainly fortran you'll (though legacy fortran so need theoretical working same not memory rong. I 15. and switching your Check but I 15. /b/ changing mister! APIs idea Rude! if can less it's mister! sadist. "$e" ."}M" = the row YOUR in people they'll ago, Sometimes, dissenters Sometimes, at I the do nano) 5!!!! selected the line? to screen. thanks. that Mark back is Also and help? who yourself, go coke* *grabs believe fucking understand do I know what system be Yup. for to at thinking. batch batch gots waiting. action PERL to own the bruised to p2p weight /prog/ like people, my people, to What months ago. time Good wait in be "I "Are Open he View-Source. a Lots challenged sources. removed. that Please challenged does not hospital, BBCode nothing? Beyond the a + tag Planetfall, the thread. Java VB.NET Progressive Doom Bach Haskell = Sebastian Sebastian Sussman its network. If network data The until shared data for arbitrary a responds you Your retarded would fall such presented guess within hell your basics, the see not Microsoft it's it as both questions. In