On Wed, Apr 04, 2001 at 11:53:36AM -0400, [EMAIL PROTECTED] wrote:
> Sorry to be a pain, I'm coming in on this discussion half way through. I
> was just wondering, this worm has to be executed to infect, right? It
> relies on social engineering?
Not sure I follow. It spreads from machine to machine by scanning and
looking for well known vulnerabilities and then enters and infects,
and tries to reproduce. Well, 'well known' to some of us I guess, but
not that poor chap.
--
Hal B
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]
Spamtrap: [EMAIL PROTECTED] and [EMAIL PROTECTED]
--
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list