Why do I need to take precautions against the worms

Why worms-precautions must be taken, because they replicate and run without human assistance, worms are malicious software (viruses, worms, and Trojan), three common forms for the worst. Viruses and worms, self replicate, but even if you do not need a host program to spread viruses, worms can proliferate independently.Viruses and worms cause similar types of harm; both files will be deleted and corrupted programs. Since the worms affects only the individual computers rather than the broader, they wreak havoc for a shorter period of time. The Internet is basically a set of computer networks, in collaboration with the world so fast-moving Worm will cripple the Internet may be hours.Viruses infect the individual computers, but worms attack typically computer servers and routers that control networks. Servers are computers that have significantly more storage space and other resources that are available to multiple users. Routers are the only specialized operating systems, servers, that routing information about the resources assigned to the network.When the network becomes infected, you can stop the self-replicating Worm its stripes in the network. The worm sends a really network consumes memory and CPU time Massiivisessa. Because the network is too busy, the worm is running, it processes and resources to carry out regular programs.In addition, you can use the network resources, many of the eating worms also perform other malware payload. They will often the backdoor programs or spyware installation to the network. Malware applications that allow hackers to control networked computers to send spam to users and steal information about individual users.Although the network abuse is the biggest headache, the worm registry which is the biggest threat to the individual users. Some worms are capable of circumvention of security programs installed on individual computers, or even the open computer ports for malicious attacks.One must never became firmly established worms "MyDoom," which was first published in January 2004 and is distributed by e-mail. Experts believe hackers wrote a worm flood attack, as well as the specific features of solutions in Santa Cruz (SCO). After the flood the SCO Web site, Internet traffic, the worm to spread and self replicated on the Internet, causing a worldwide slowdown in Internet What can I do?.Since the worms create such chaos, each user must take precautions against infection. Properly configured firewall can provide some help protect your computer. Configure the firewall to restrict network traffic and to spoof the computer. Cloaking advantage is obvious; If your computer is invisible to the network, it may not be infected any worms on the network.E-mail attachments in most of the hackers to spread malicious software the preferred way. Be very suspicious e-mail or unsolicited e-mail from Unknown to known users. Open attachments scanned by an antivirus program, without changing them.Scan your computer regularly using antivirus software. If the computer starts running sluggishly and restarting spontaneously or slow Internet connection may be infected with a worm slowly. Most of the antivirus program can clean your computer for infections. You can find the newer worms, that the software catches, manually remove the instructions on the Internet.