On Wed, Apr 04, 2001 at 11:53:36AM -0400, [EMAIL PROTECTED] wrote:
> Sorry to be a pain, I'm coming in on this discussion half way through.  I
> was just wondering, this worm has to be executed to infect, right?  It
> relies on social engineering?

Not sure I follow. It spreads from machine to machine by scanning and
looking for well known vulnerabilities and then enters and infects,
and tries to reproduce. Well, 'well known' to some of us I guess, but
not that poor chap. 

-- 
Hal B
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 Spamtrap: [EMAIL PROTECTED] and [EMAIL PROTECTED]
--



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to