The Code Red worm existed only in memory and did not attempt to infect files on the system.
It took advantage of a weakness in the Microsoft Internet Information Server and manipulated the protocols that allow computers to communicate. It spread globally in a few hours.
5
59 reads
CURATED FROM
IDEAS CURATED BY
The idea is part of this collection:
Learn more about cybersecurity with this collection
Find out the challenges it poses
Learn about the potential impact on society
Understanding the concept of Metaverse
Related collections
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates