On 8/17/05, Jason Coombs <[EMAIL PROTECTED]> wrote: > What about attacks that took place with the worms as cover? How many high- > value systems just got compromised, and will remain so, by something other > than the worms' code -- where the victim won't even bother to investigate > that > possibility because they feel like the worm was the incident.
And he will gladly testify that this worm downloaded porn onto his client's computers _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
