On Thu, 19 Jul 2001, LARD BENJAMIN LEE wrote:

> What I'm getting at, is for someone to create another exploit that creates
> the C:\notworm file in infected machines and does something to
> notify whoever is in charge of a particular box (even something as simple
> as placing you_are_hacked.txt and a link to the patch on the desktop could
> be beneficial). Even better, an exploit to patch a machine (through
> removing the .ida and .idq extensions) would prevent the inevitable wave
> of post-attacks (both from this worm and future attacks).

The only problem I forsee with that course of action is that for a while,
this worm may clog the networks up just as badly as Code Red.

-------------------------------------------------------------------------------

                                --Vincas Ciziunas--
                (College Student, Linux Geek, Music Nut, Virginian)
               [EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
                           http://www.tamos.net/~fizban
        "There's nothing worse in the world than an angry tree," --Bob Ross

-------------------------------------------------------------------------------

Reply via email to