Watch this video on YouTube
What is the most effective method for dealing with the spread of a network worm that exploits vulnerabilities in a protocol?