also sprach Sebastian Niehaus <[EMAIL PROTECTED]> [2003.08.12.1902 +0200]:
> Could be a nice feature of a worm to modify the "hosts" file and
> prevent infected maschines to do DNS lookups.

Unless you use a rooted host for that, it would reveal your
identity. And if you use a rooted host, you run the risk of the worm
failing if you loose control over the host.

-- 
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
"we all know Linux is great...
 it does infinite loops in 5 seconds."
                                                     -- linus torvalds

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to