hmm, losho,

When a computer is infected, the worm will set up a backdoor into the system by 
opening TCP ports 3127 through 3198, which can potentially allow an attacker to 
connect to the computer and use it as a proxy to gain access to its network resources.
============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================

Reply via email to