Write once read many WORM describes a data storage device in which information, once written, cannot be modified. This write protection affords the assurance that the data cannot be tampered with once it is written to the device. On ordinary non-WORM data storage devices, the number of times data can be modified is limited only by the lifespan of the device, as modification involves physical changes that may cause wear to the device. The "read many" aspect is unremarkable, as modern storage devices permit unlimited reading of data once written. WORM protects the important files by keeping them safe and intact.
How to Create and Maintain an Indoor Worm Composting Bin
Difference between Worms and Trojan Horse - GeeksforGeeks
Last Updated: May 13, References. She has more than 20 years of experience creating technical documentation and leading support teams at major web hosting and software companies. Nicole also holds an MFA in Creative Writing from Portland State University and teaches composition, fiction-writing, and zine-making at various institutions. There are 14 references cited in this article, which can be found at the bottom of the page. This article has been viewed , times. Worms are rapidly-spreading viruses transmitted through insecure networks, e-mail attachments, software downloads, and social media links. Learn how to remove a worm from your Windows PC with a virus-removal tool, remove malware from Macs and mobile devices, and how to best protect yourself from malware in the future.
How do I create a computer virus?
This state makes the data non-erasable and non-modifiable for a user-specified interval. For the duration of the retention interval, blobs can be created and read, but cannot be modified or deleted. Immutable storage is available for general-purpose v1, general-purpose v2, premium block blob, and legacy blob accounts in all Azure regions.
The Morris worm or Internet worm of November 2, , was one of the first computer worms distributed via the Internet , and the first to gain significant mainstream media attention. The worm was created by Morris simply to see if it could be done,  and was released from the Massachusetts Institute of Technology MIT in the hope of suggesting that its creator studied there, instead of Cornell. The worm also functioned through the exploit of weak passwords. This resulted in a computer potentially being infected multiple times, with each additional infection slowing the machine down to the eventual point of being unusable. This would have the same effect as a fork bomb , and crash the computer several times.