#the mydoom worm
Explore tagged Tumblr posts
agnerd-bot · 1 year ago
Text
Fate Fanservant: The Morris Worm, Destroyer of the Internet
Ascension Stages:
First Stage: The Morris Worm takes the form of a young woman dressed in ragged pink prisoner’s clothes. A worn pilot’s jacket rests on her shoulders, and on the top of her head is a pair of broken and cracked goggles. Broken cuffs are on her arms and legs, but she offers the player an uneasy smile.
Second Stage: [REDACTED]
Final Stage: [REDACTED]
55 notes · View notes
butterflykn11ves · 3 months ago
Text
Tumblr media
she’s so pretty
8 notes · View notes
nullapophenia · 1 year ago
Text
Tumblr media
i feel obligated to put this here too
21 notes · View notes
l0ve-lett3r-4-u-txt · 3 months ago
Text
Tumblr media
4 notes · View notes
damonscomputer · 1 year ago
Text
My computer virus (worm) oc Andy Melissa! (Virus puns) based on One weird tip and the MyDoom virus- he can change form and multiply. He loves to play solitaire on your computer
Tumblr media Tumblr media
2 notes · View notes
protectorcraft · 3 months ago
Text
Tumblr media Tumblr media Tumblr media
some quick, internet virus themed scries for you. because fuckign Woooorrmmmmmmmmmm
Morris Worm Eldritch Criculaworm/Shamrock Larvae/Radioactive Glitch Faceted Wind Eyes
ILOVEYOU Virus Rose Seraph/Pearl Mottle/Cotton Candy Flutter Innocent Plague Eyes
Mydoom White Poison/Ultramarine Malachite/Charcoal Spores Glowing Fire Eyes
18 notes · View notes
cheesycatz · 5 months ago
Note
Salutations!
🐌🎤What is the maximum possible lifespan of malworms?
I'm very curious about it.
Malworms, as I imagine any darkner based on code rather than a physical object would be, are technically immortal in terms of age, but can die or “be deleted” by numerous things.
A malworm's actual average lifespan is barely six months. In their natural environment, below the Surface Web and inside the dark and maze-like caverns of the Deep Web (the private part of the web that encompasses 90% of the internet, including anything from personal private files to the less than 0.01% Dark Web), malworms compete with other malworm species for resources, often killing and eating each other in the process. Malworms are considered such pests that other darkners will gladly kill them before their population can get out of control.
As an invasive species on the Surface Web, malworms still don't live long. While they can multiply quickly and easily find victims at the start, their prey fights back. Whether it's through antivirus robots, the burning of nests, parasite testing kits, tracking trips, evacuation—the malworms are eventually killed. And, if they aren't, they'll eat every last program and starve within the destroyed city they created.
Spamton himself is around 21 years old when the fic takes place (2018), though he'd mentally be considered closer to the middle aged dumpster man we all know and love (HATE GET OUT OF MY HEAD GET OUT OF MY HEAD GET). Aside from malnourishment prolonging the time it took Spamton to reach adulthood, he gradually grew at a healthy rate from 10 ft to around 16 ft over 10 years.
Malworm growth plateaus past the 10 year mark. Their bodies keep regenerating cells and producing new eggs and venom indefinitely. However, their ability to successfully infect a victim typically declines, especially decades after their prime. Depending on what a malware program originally exploited, modern computers can easily detect and delete them, and other old malware can't even run on newer computers. So, older malworm infections are easy to detect, and sometimes can even be cured with modern medicine.
Some malworms do remain active, even 20 years later. Most notably is MyDoom, a 2004 computer worm widely considered the most destructive malware in history, which is still active to this day. I think it's much more exciting if Spamton's species falls under this group. The BIGSHOT malworm's whole thing is that it was an extremely destructive email worm that was forgotten because of its lack of any surviving records—whose to say it couldn't still steal all your passwords and brick your PC if someone actually could find a copy?
(One record does still exist. An unlabeled 3.5” floppy disk with a thousandth of a gigabyte of storage, buried in the dust of a cramped closet, and hidden within the obsolete computer room of a rural village's library. A poisoned apple, waiting for the bite, forgotten until the end of time.)
Tumblr media
10 notes · View notes
malwareness · 2 years ago
Text
im going to edit this to be a proper introduction post eventually. probably
for now. list of malware (and other software) that has characters made based off of them:
-Melissa Worm
-ILOVEYOU
-Newton "Virus"
-Bonzi Buddy
-You Are An Idiot
-Goggle.com
-Leap-A/Oompa Loompa Worm
-Creeper
-Reaper
-Morris Worm
-Mydoom
-Mad Virus A
-Nuclear
-PH33R
-Fractureiser
-WannaCry
-Pixel (And its variants)
-LockerGoga
-Flip
-KinitoPET
to be updated if more are added
Category of non-malreapers
-Heron
-Flora
13 notes · View notes
tranquil-slaughterhouse · 10 months ago
Text
Would you still love me if I was a (Mydoom) worm?
2 notes · View notes
moderator-monnie · 2 years ago
Note
I’ve had a dumb idea, how would slammer react to a large scale rts like hoi4 (where you play as an entire country throughout the world war period) how would it react to games without any actual characters as well like Tetris and how would it effect something like rule the waves 3 or the unity game dev engine? Would the slammer virus ever play with a user for entertainment or a challenge? Does the slammer virus keep any deals it makes with other viruses/.exes?
how would slammer react to a large scale rts like hoi4 (where you play as an entire country throughout the world war period)
1: Joke answer
Slammer: where the fuck am I? (standing in the middle of a battle field just so damn confused)
Actual answer: I think Slammer would treat a game like that similar to how plague Ink works, though honestly it's more likely the virus would just consume the games code to the point it becomes unplayable/unable to be opened.
how would it react to games without any actual characters
2: Honestly it would just leave games like that alone, there's not really any fun to be had in games like that for Slammer, the virus has bit of a sadistic side to it, and it likes putting others thru pain.
Would the slammer virus ever play with a user for entertainment or a challenge?
3: Basically would Slammer act like the original Sonic.exe in anyway? I like to think yes if they got powerful enough Slammer Prime, would likely start to mess with actual people and make a player witness everything it does to a game.
Slammer would also leave cryptic messages throughout the user's computer and alter their computer's files, though it has no way to actually harm them, the virus would at some point be powerful enough to make it seem like it could. By controlling any and all electronics inside someones home.
Sometimes it all ain't about killing, it's about striking fear and making humans/players think you can kill them at any time, breaking down someone's mind to the point of insanity is much more fun for Slammer.
Does the slammer virus keep any deals it makes with other viruses/.exes?
4: Officially Slammer has not met any virus or exe's, but if they did well they would likely yes keep the deal they make Slammer might be sadistic, but they also remain loyal even if Slammer became powerful enough to kill them. The only time Slammer would betray someone is if they tried to first.
Slammer isn't above assimilating other virus/exe's though and I know for a fact, Slammer has at least assimilated another virus known as MyDoom, Slammer uses that viruses ability's to travel thru emails it was able to assimilate it easier since that was another worm virus.
But say Slammer did assimilate another exe? Yes they'd keep some of the exe's traits at least in their Prime version, so the more exe's the more Slammer primes Sonic form would be altered slightly.
Tumblr media
Mod Monnie: Bonus Answer for a question you didn't ask but it's important!
I've stated in the past but Slammer uses they/them, it/it's pronouns HOWEVER if it has a host from a game aka Slammer Prime and Sonic? it will take it's hosts pronouns as well.
So Slammer Prime (Slammer Sonic) would be They/Them, It/It's and He/Him.
8 notes · View notes
ottomozersoccer · 1 year ago
Text
"Where's Sasser?" It's one of my favorites but that would be too obvious :) it's actually tied with one other.
2 notes · View notes
hungry-skeleton · 2 years ago
Note
a little while back (like february?) u posted art for a computer virus oc, they were green and had a cigar and looked rlly cool
who are they? whats their deal?
Tumblr media
This is Malus!! He's the manifestation of the IRL MyDoom virus!
He's part of a group of OCs I have based on tech issues and computer viruses, specifically he's part of a small group of "virus super criminals" that are currently imprisoned and the main group is trying to free them. The group of criminals consists of Cry (the Wannacry ransomware), Storm worm (virus of the same name), Offiz (the You Are An Idiot virus), Luvbug (ILOVEYOU virus), and the leader, Malus!
Malus is a typical hardcore but mysterious evil leader who's always got a plan. I'm hoping to draw these computer characters more often since people seem to like it when I do!
5 notes · View notes
butterflykn11ves · 3 months ago
Text
Tumblr media
Mydoom was a computer worm that targeted computers running Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever, exceeding previous records set by the Sobig worm and ILOVEYOU, a record which as of 2024 has yet to be surpassed.
23 notes · View notes
researchinsightstopics · 8 months ago
Text
Cyber Security Market Scope, Size, Share, Trends, Forecast By 2031
The cybersecurity landscape is witnessing a significant transformation with the growing adoption of the cybersecurity mesh. This innovative approach is redefining security architectures by enabling distributed enterprises to deploy and extend security precisely where it is needed the most. By decentralizing security measures and focusing on individual users and access points, the cybersecurity mesh is emerging as a rapidly growing strategy in the realm of IT security.
Tumblr media
For Full Industry Insights: https://www.fairfieldmarketresearch.com/report/cybersecurity-market
The Concept of Cybersecurity Mesh
The cybersecurity mesh acknowledges that traditional network boundaries are becoming obsolete in today's interconnected world. Organizations are now required to create security perimeters around each user, allowing secure access to assets from any location or device. This model shifts policy enforcement to cloud services, focusing on assets rather than devices. By establishing smaller, individual perimeters around each access point, the cybersecurity mesh offers a robust framework to protect identities and restrict network access to authorized users or systems, whether on-premises or in the cloud.
IoT Security Adoption and Market Demand
The surge in IoT traffic is expected to drive cybersecurity market demand significantly. As enterprises across various industries adopt IoT devices to enhance operational efficiency and communication, the scope of cybercriminals' attacks broadens. The increasing adoption of these devices necessitates a cybersecurity model that provides greater visibility into network access points, user activities, and application usage. Businesses are turning to advanced cybersecurity solutions to inspect all network traffic, detect malicious activities, and address visibility issues arising from the large volume of IoT queries.
Types of Computer Viruses
In the evolving threat landscape, various types of computer viruses pose significant risks to organizations:
Malware: Including worms, Trojans, adware, and ransomware, malware is designed to damage computer systems, gain unauthorized access, or steal information.
Ransomware: This type of malware encrypts data, demanding payment or other actions to restore access. Even large enterprises and city governments have fallen victim to ransomware attacks.
Trojans: Requiring user action, Trojans often deceive users into running malicious programs or accessing harmful websites.
Top Destructive Cyber Viruses
Some of the most destructive cyber viruses include CryptoLocker Ransomware, Plug X malware, Zeus (Gameover) virus, Stuxnet worm, MyDoom worm, Sasser and Netsky worms, Code Red worm, Nimda virus, ILOVEYOU virus, Melissa virus, Cyborg Ransomware, GoBrut virus, Jokeroo malware, CryptoMix Clop Ransomware, Trojan Glupteba virus, Fake Windows Updates (Hidden Ransomware), and News Malware Attacks.
Hot Technologies in Cybersecurity
To combat evolving cyber threats, several hot technologies are gaining traction:
Context-Aware Behavioral Analytics: By using sophisticated behavioral analytics, companies can monitor and identify suspicious behavior or transactions, addressing the issue of overwhelming security alerts.
Next Generation Breach Detection: Combining machine learning and behavioral analytics, these technologies detect breaches and trace them to their source, tackling "zero-day" exploits.
Virtual Dispersive Networking (VDN): VDN splits messages into multiple parts, encrypts them, and routes them over different protocols on independent paths, enhancing encryption security.
Challenges in Cybersecurity
Despite the advancements, several challenges persist in the cybersecurity domain:
Low Cybersecurity Budget and High Installation Costs: Emerging startups often lack sufficient budgets to implement Next-Generation Firewalls (NGFWs) and Advanced Threat Protection (ATP) solutions. This limits the adoption of cybersecurity solutions, particularly in small businesses within developing economies.
Designing and Deploying Cybersecurity Solutions: Transitioning from a network perimeter-based approach to a user-based and application-based security model presents design and implementation challenges. This transition requires a thorough network analysis and a deep understanding of each user, device, application, and resource.
Regional Analysis
The North American region is at the forefront of cybersecurity advancements, with several prominent market players delivering cutting-edge solutions across various industries. Strategic investments, partnerships, and significant R&D activities contribute to the widespread deployment of cybersecurity solutions. Key players such as IBM, Oracle, Fortinet, Microsoft, and Trend Micro, along with several startups, are offering enhanced cybersecurity software solutions and services to meet customer needs, driving market growth in North America.
0 notes
firstnotifications · 2 years ago
Text
10 Most Damaging Computer Virus In History
A computer virus is a harmful program that sneaks into your device and takes control of it, changing how it works. It often pretends to be a safe program or file and can stay hidden until you open the program it’s attached to. List of Top 10 Most Damaging Computer Virus In History
ILOVEYOU – $15 Billion
ILOVEYOU, also known as the Love Bug, was a computer worm that originated in the Philippines in May 2000. It was distributed via an email attachment that appeared to be a love confession from a secret admirer.
2 Mydoom – $38 Billion
MyDoom is a computer worm that spread through email in 2004 and caused a lot of damage. It is considered to be one of the fastest-spreading email worms ever, affecting millions of computers around the world.
3 Sobig – $37 Billion
SoBig was a computer worm that first appeared in August 2003 and quickly spread through email attachments, causing an estimated $37 billion in damages.
4 Klez – $19.8 Billion
Klez is a computer worm that first appeared in 2001 and is considered one of the most damaging worms of all time. It is estimated to have caused $19.8 billion in damages, with its most significant impact felt in the United States and China.
5 WannaCry – $4 Billion
WannaCry was a type of ransomware attack that caused widespread damage in 2017, infecting more than 200,000 computers in 150 countries.
6 Code Red $2.4 Billion
Code Red was a computer worm that infected Microsoft IIS web servers running on Windows NT and 2000 operating systems in 2001.
7 Melissa
Melissa was a macro virus that was spread through infected email attachments in 1999. It caused widespread disruption by rapidly infecting computers and clogging email servers, resulting in an estimated $1.2 billion in damages.
8 Sasser $500 Million
Sasser was able to spread rapidly and caused significant disruption to computer networks worldwide. It caused significant damage, estimated at $1.1 billion. The worm was designed to scan for and infect vulnerable systems, causing them to crash or experience other issues.
10 Nimda
Nimda was a computer worm that caused significant damage in 2001. It spread through email and web servers, infecting computers and causing disruptions to businesses and individuals.
10 SQL Slammer -
SQL Slammer was a computer worm that caused significant damage in 2003. It targeted Microsoft SQL Server and Desktop Engine databases, infecting computers and causing widespread disruption.
0 notes
n0tthew0rms · 6 years ago
Text
Love Letter: I wonder if the deep web has x readers.
MyDoom: Please go to bed.
2 notes · View notes