gptkbp:instance_of
|
gptkb:virus
|
gptkbp:affects
|
gptkb:Microsoft_Windows
|
gptkbp:amended_by
|
system files
|
gptkbp:associated_with
|
gptkb:Netsky_family_of_worms
|
gptkbp:can_create
|
backdoors
|
gptkbp:collects
|
personal information
|
gptkbp:created_by
|
gptkb:unknown
|
gptkbp:discovered_by
|
security researchers
|
gptkbp:distribution
|
botnets
|
gptkbp:enables
|
gptkb:virus
|
gptkbp:exported_to
|
email attachments
|
gptkbp:has_variants
|
gptkb:Netsky._A
gptkb:Netsky._B
gptkb:Netsky._C
gptkb:Netsky._D
gptkb:Netsky._E
|
https://www.w3.org/2000/01/rdf-schema#label
|
Netsky. G
|
gptkbp:is_analyzed_in
|
gptkb:academic_research
malware analysts
|
gptkbp:is_considered
|
a significant threat
a legacy virus
a historical malware example
|
gptkbp:is_discussed_in
|
online forums
cybersecurity literature
|
gptkbp:is_documented_in
|
security bulletins
|
gptkbp:is_known_for
|
self-replication
|
gptkbp:is_linked_to
|
data breaches
|
gptkbp:is_monitored_by
|
cyber threat intelligence
antivirus vendors
|
gptkbp:is_part_of
|
malware analysis tools
cybersecurity discussions
malware history
computer security education
|
gptkbp:is_protected_by
|
firewalls
|
gptkbp:is_recognized_by
|
hash values
|
gptkbp:is_related_to
|
spam emails
|
gptkbp:is_used_in
|
cybersecurity training
|
gptkbp:notable_for
|
spreading rapidly
|
gptkbp:recognizes
|
antivirus programs
|
gptkbp:replaced_by
|
malware removal tools
|
gptkbp:reports_to
|
security advisories
security firms
|
gptkbp:scientific_classification
|
malicious software
|
gptkbp:seating_capacity
|
denial of service attacks
|
gptkbp:sensor
|
gptkb:2004
|
gptkbp:social_responsibility
|
multiple systems
|
gptkbp:type
|
worm
|
gptkbp:uses
|
peer-to-peer networks
|
gptkbp:written_in
|
gptkb:language
|
gptkbp:bfsParent
|
gptkb:Netsky
|
gptkbp:bfsLayer
|
4
|