This paper will examine the Nimda worm to identify what makes it different from other types of malicious code. It will then present the current fixes available for the worm as well as some recommendations for protecting against further infections by similar types of malicious code.