Bryan Scott wrote:
I *do* like that one. :) It would be just as fun to figure out how to use the trojan against itself, sort of like the cartoonish bending of the end of a rifle back into the shooter's face.
another legend: when IIS expoloits were still simple, someone published a web server configuration that would recognize a common exploit and respond by re-exploiting the implied vulnerability on the infected machine to shut it down.
Unfortunately, this response -- shutting down someone's machine without their consent -- can be considered more exploitative than installing a parasite that does not kill the host.
I wish I had an authoritative link about this.
-- [EMAIL PROTECTED] cat and buttered toast
