Previous worms typically used e-mail to spread and infected only the message recipients. These two, and sometimes three, propagation paths are what allow these blended threats to spread quickly. Once on a network, they continue to spread via network file shares or Web servers. With the exception of Code Red, all of these worms use e-mail as their primary avenue for propagating. ![]() ![]() Special delivery from e-mail to the network
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |