Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Code Red would trigger a virtual lockdown, old.post-
gazette.com/nation/20030330codered0330p6.asp.
“Code Red (Computer worm).” Wikipedia, Wikimedia Foundation, 8 Aug. 2017, en.wikipedia.org/wiki/
Code_Red_(computer_worm)#Concept. Meinel, Carolyn. “Code Red: Worm Assault on the Web.” Scientific American, 28 Oct. 2002, www.scientificamerican.com/article/code-red-worm-assault-on
"The Spread of the Code-Red Worm (CRv2).” CAIDA, www.caida.org/research/security/code-red/coderedv2_analysis.xml#conclusions.
How does it compare to other computer viruses?
"On July 19, 2001, more than 359,000 computers were infected with the Code Red worm in less than 14 hours," says David Moore of the Cooperative Association for Internet Analysis. "At the peak of the infection frenzy, more than 2,000 new hosts were infected each minute."
It is one of the most popular computer virus outbreak, it has infected a large amount of computers, earning the popularity of this virus.
How many computers have been infected to date?
How many computers could become infected?
What was the purpose of Code Red?
Where are the most new cases being transported
Why is it called Code Red?
Code Red Mountain Dew the eEye Digital Security
drunk while disassembled the worm.
- Code Red has many versions, we choose to do Code Red Version 1 because it is the original version and there were a lot more numbers to work with.
Through emails, it searches for IIS Servers then finds a section of code that is vulnerable, causing a buffer overflow
After It transmits via email and if open can cause damage and emails itself to 50 other people
From the Chinese, because many web pages had "Hacked by Chinese" with a red format
Causes a buffer overload, allowing the attacker to complete control the server and run foreign code
July 13th, 2001 found by eEye Digital Security employees Marc Maiffret and Ryan Permeh