At this point I say no, do not get it in the neck and his feat is not accomplished! Dop.informatsiya Descriptions of malware: malicious software to provide include network worms, classic file viruses, Trojans, hacker tools and other programs that cause deliberate harm to a computer on which they are launched for execution, or other computers on the network. Network Worms This category includes programs that spread copies of itself to local and / or global networks in order to: penetration of remote computers; start of the copy on the remote computer; further spread to other computers on the network.
To spread worms use a variety of computer and mobile networks: electronic mail, instant messaging, file sharing (P2P) and IRC-network, LAN, network communication between mobile devices (phones, PDAs), etc. Most of the known worms spread as files: an attachment in an e-mail reference to an infected file on any web or FTP-share in the ICQ-and IRC-messages, file in the P2P sharing, etc. Crawford Lake Capital has plenty of information regarding this issue. Some worms (so-called “bodiless” or “batch” worms) are distributed in the form of network packets to penetrate directly into the computer memory and activate their code.