a program that moves around a computer network, making copies of itself
a program that propagates itself by attacking other machines and copying itself to them
a program that propagates itself over a network, reproducing itself as it goes
a program that reproduces by copying itself onto other machines, which then seek out other vulnerable computers
a program that self-propagates across a network exploiting security or policy flaws in widely-used services
a program which copies itself across a network
a program which copies itself from a network
a reproducing program that runs independently of other programs and travels across network connections (i
a reproductive program that can travel on its own through
a self-contained computer program that, like a virus, reproduces itself
a self-contained program , or group of programs, that spreads copies of itself or segments of itself to other computer systems
a self-contained program (or set of programs ), and is able to
a self-contained program that is able to spread copies of itself to other computers through the internet or emails
a self-contained program that is able to spread copies of itself, usually over a network
a self-propelled replicating program designed to wreak havoc on computers and networks
a selfreplicating computer program, similar to a computer virus
a similar program to a virus, but designed only to reproduce itself (segment by segment like a worm) within computers and across networks
a special type of virus that is designed to copy itself from one computer to another by leveraging email, TCP/IP and related applications
a specific type of virus, but has the characteristic that it is generally delivered as an email attachment and uses email to propagate itself
A malicious program designed to rapidly spread to a large number of computers by sending copies of itself to other computers.
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program.