Internet WormsVery annoying, not so much for anything they do so much as for the volume of useless traffic they generate. Some examples:
It seems to me that the majority of worms use BufferOverflow. This allows an attacker to submit input to a system that causes the system to run malicious code.
Note: although malicious code (in particular, the worms mentioned above) is reportedly spread mainly by email, it is still possible to be infected merely in the course of normal web-surfing.
See also HumanVectoredScriptingWorm
EditText of this page
(last edited October 10, 2006)
or FindPage with title or text search