This HTML5 document contains 19 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n9http://dbkwik.webdatacommons.org/ontology/
n13http://dbkwik.webdatacommons.org/resource/TVwvNU4-d_LvWw2YrCFDZg==
dctermshttp://purl.org/dc/terms/
n16http://dbkwik.webdatacommons.org/resource/YCXPH3z2dbCiF8bueebk3g==
n17http://dbkwik.webdatacommons.org/resource/NWejT2BOCH-YUhUjNRXCyg==
n7http://dbkwik.webdatacommons.org/resource/AqhawVOHaOOD3Jp6GgA-mA==
n12http://dbkwik.webdatacommons.org/resource/Utdzx-k_kaXrUjonZN5oEQ==
n10http://dbkwik.webdatacommons.org/resource/Lu7_-fxxC9zN7Wm6JQkFiw==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n15http://dbkwik.webdatacommons.org/resource/uazuHg3wEfJ5Uid5iYR3Jw==
n18http://dbkwik.webdatacommons.org/resource/7RuURChrRAi2wcC2ZBcNKw==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n14http://dbkwik.webdatacommons.org/resource/h0MO9e-m2iwxFFjOGluuIA==
n20http://dbkwik.webdatacommons.org/resource/L1GHlBYX4J98h74YQS9dVg==
n2http://dbkwik.webdatacommons.org/resource/RP9FTYtkSC16h15ITWvcyQ==
n19http://dbkwik.webdatacommons.org/resource/RiaMY-W7ua567zJeXjY1LA==
xsdhhttp://www.w3.org/2001/XMLSchema#
n8http://dbkwik.webdatacommons.org/resource/-0XKh82v7N6KqOm73sc6DA==
n4http://dbkwik.webdatacommons.org/resource/6hHN-muilW-lUmjLB6nWpA==
n6http://dbkwik.webdatacommons.org/computersecurity/property/
n11http://dbkwik.webdatacommons.org/resource/jzcEmcdXknZvkgkoU16SKw==
n22http://dbpedia.org/resource/Bagle_(computer_worm)
Subject Item
n2:
rdf:type
n15:
rdfs:label
Bagle
rdfs:comment
Bagle (also known as Beagle) is a mass-mailing computer worm written in pure assembly and affecting all versions of Microsoft Windows. The first strain, Bagle.A, did not propagate widely. A second variation, Bagle.B is considerably more virulent. The initial strain, Bagle.A, was first sighted on January 18, 2004. It was not widespread and stopped spreading after January 28, 2004. Subsequent variants have later been discovered. Although they have not all been successful, a number remain notable threats. Bagle, also known as Beagle is a large family of email worms with many variations. Beagle is notable for the fact that many variants came in password-protected .zip files, with the password usually contained in the body of the message.
owl:sameAs
n22:
dcterms:subject
n4: n8: n10: n13: n14: n16:
n6:wikiPageUsesTemplate
n7: n11: n17:
n19:
n20:
n18:
* I-Worm.Bagle.a * W32/Bagle.a@MM * W32.Beagle.A@mm * Win32.HLLM.Beagle.15872 * W32/Bagle-A * Win32/Bagle.A@mm * WORM_BAGLE.A * Worm/Bagle.A * W32/Bagle.A@mm * Win32:Beagle * Win32.Bagle.A@mm * Worm.Bagle.Gen-dll * W32/Bagle.A.worm * Win32/Bagle.A
n12:
Microsoft Windows
n9:abstract
Bagle, also known as Beagle is a large family of email worms with many variations. Beagle is notable for the fact that many variants came in password-protected .zip files, with the password usually contained in the body of the message. Bagle (also known as Beagle) is a mass-mailing computer worm written in pure assembly and affecting all versions of Microsoft Windows. The first strain, Bagle.A, did not propagate widely. A second variation, Bagle.B is considerably more virulent. Bagle uses its own SMTP engine to mass-mail itself as an attachment to recipients gathered from the victim computer. It copies itself to the Windows system directory (Bagle.A as bbeagle.exe, Bagle.B as au.exe) and opens a backdoor on TCP port 6777 (Bagle.A) or 8866 (Bagle.B). It does not mail itself to addresses containing strings such as "@hotmail.com", "@msn.com", "@microsoft" or "@avp". The initial strain, Bagle.A, was first sighted on January 18, 2004. It was not widespread and stopped spreading after January 28, 2004. The second strain, Bagle.B, was first sighted on February 17, 2004. It was much more widespread and appeared in large quantities; Network Associates rated it a "medium" threat. It is designed to stop spreading after February 25, 2004. Subsequent variants have later been discovered. Although they have not all been successful, a number remain notable threats. Since 2004, the threat risk from these variants has been changed to "low" due to decreased prevalence. However you are warned to watch out for said virus, if running Windows.