Code Red worm exposes security flaws

Fisher, Dennis
July 2001
eWeek;7/30/2001, Vol. 18 Issue 29, p1
Reports on the finger-pointing among systems administrators and security experts in the wake of the massive infection of Web servers by the Code Red worm. Code Red's exposure of security flaws; White paper released by a group of security experts known as the Honeynet Project.


Related Articles

  • Bringing Down The Internet. Adams, Jonathan; Guterl, Fred; Sennott, Sarah; Itoi, Kay; Kepp, Mike; Lee, B. J. // Bulletin with Newsweek;11/4/2003, Vol. 121 Issue 6397, p50 

    Computer experts, having ill intentions, release a fast-spreading computer virus that in a matter of minutes gives him control of millions of personal computers and servers throughout the world. They launch a silent and sustained attack on computers that are crucial for sending around the...

  • Nimda.  // Network Dictionary;2007, p341 

    A definition of the term "Nimda" is presented. It refers to a computer virus that caused traffic slowdowns as it rippled across the Internet, spreading through a few different methods, such as infecting computers containing Microsoft's Web server, Internet Information Server, and computer users...

  • System Security's Hit Parade. C. F. J. // InfoWorld;12/15/2003, Vol. 25 Issue 49, pS6 

    Focuses on the threats facing the security system of an organization. Use of emails in spreading computer viruses; Risk of using applications and network services ports; Vulnerability of poorly configured Web servers to viruses.

  • Slapper worm targets Apache servers.  // Network World;9/23/2002, Vol. 19 Issue 38, p8 

    Reports the havoc of Slapper computer worm, a subject of CERT security advisory which continues to spread across the Internet through Linux Apache Web servers.

  • Code Red Worm Returns.  // IT Professional;Sep/Oct2001, Vol. 3 Issue 5, p7 

    Reports on the failure of some information technology professionals to protect their servers from a second round of the Code Red worm virus. Incorrect setting of dates of computers; Security hole for attackers.

  • REPELLING ALL INVADERS. Whittle, Sally // Computer Weekly;1/20/2004 Supplement, p18 

    The article focuses on the sudden vulnerability of Linux to virus attacks. Just when one thought Linux was safe from the security glitches that plague Windows users, up popped proof of the open source community's vulnerability. In December 2003, a security flaw was discovered in the Linux 2.4...

  • Is Web 2.0 Safe?  // PCWorld;Jul2007, Vol. 25 Issue 7, p18 

    The article examines whether the fast-evolving collaborative model of Internet development known as Web 2.0 is safe from the Samy worm, a virulent bug created by Samy Kamkar that no firewall could block. The worm was among the more prominent of a new generation of Web attacks that some security...

  • NEW SIDEWINDER CREATES UNIFIED INCIDENT REPORTS. Clancy, Heather // CRN;6/20/2005, Issue 1152, p46 

    The article reports that Secure Computing Corp. shipped a new integrated security incident reporting software, dubbed Sidewinder G2 Security Reporter in June 2005. Trent Jacobi, security consultant at Netdirect Systems, a total solution provider based in Cedar Rapids, Iowa, said the product is a...

  • Ask Dr. Internet. Blass, Steve // Network World;5/9/2005, Vol. 22 Issue 18, p35 

    Responds to a question on whether it is possible to drive all the Secure Sockets Layer (SSL) traffic through the Apache server on a setup that has both Apache and Internet Information Systems (IIS) Web servers so as to avoid the SSL security alerts generated from the self-signed certificate on...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics