About: Explore.Zip worm   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

The Explore.Zip worm (also known as I-Worm.ZippedFiles), is a destructive computer worm which attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. It is a worm that contains a malicious payload. The worm utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in a user's Inbox. The email attachment is Zipped_files.exe. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the \Windows folder of the remote computer and then modifies the Win.ini file of the infected computer.

AttributesValues
rdfs:label
  • Explore.Zip worm
rdfs:comment
  • The Explore.Zip worm (also known as I-Worm.ZippedFiles), is a destructive computer worm which attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. It is a worm that contains a malicious payload. The worm utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in a user's Inbox. The email attachment is Zipped_files.exe. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the \Windows folder of the remote computer and then modifies the Win.ini file of the infected computer.
dcterms:subject
dbkwik:itlaw/prope...iPageUsesTemplate
abstract
  • The Explore.Zip worm (also known as I-Worm.ZippedFiles), is a destructive computer worm which attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. It is a worm that contains a malicious payload. The worm utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in a user's Inbox. The email attachment is Zipped_files.exe. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the \Windows folder of the remote computer and then modifies the Win.ini file of the infected computer.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software