Bryan Scott wrote:


I *do* like that one. :) It would be just as fun to figure out how to use the trojan against itself, sort of like the cartoonish bending of the end of a rifle back into the shooter's face.

another legend: when IIS expoloits were still simple, someone published a web server configuration that would recognize a common exploit and respond by re-exploiting the implied vulnerability on the infected machine to shut it down.

Unfortunately, this response -- shutting down someone's machine without
their consent -- can be considered more exploitative than installing
a parasite that does not kill the host.

I wish I had an authoritative link about this.



--
[EMAIL PROTECTED]
cat and buttered toast

Reply via email to