Author: Christopher Conkie
Date: 15:20:04 05/28/05
Go up one level in this thread
>The attacker could download a specific file, add the worm code to it, and >re-upload it to the comprimised computer with little effort. What better file >to hide it in than a c node file that will possibly be compiled and >distributed to others? And the cow jumped over the moon........ Christopher
This page took 0.06 seconds to execute
Last modified: Thu, 15 Apr 21 08:11:13 -0700
Current Computer Chess Club Forums at Talkchess. This site by Sean Mintz.