-=PCTechTalk=- Re: need help with patch for worm

  • From: "Wyatt M. Portendt" <nunyabidness6@xxxxxxxxx>
  • To: pctechtalk@xxxxxxxxxxxxx
  • Date: Fri, 15 Aug 2003 22:08:41 -0500

No.  This one is a stealth attack through open ports.  You only have to be
online.  You don't have to download anything.  You just have to be
connected and have an open port and the vulnerability.  I believe this type
of attack is only just beginning and that we'll see more with similar
delivery.

On 8/15/2003 at 9:09 PM a whisper was heard, and the one known as cris was
rumoured to have uttered....

          |  I know a bunch of the newer viruses are set to
          |  self execute - and that is one reason you should never use the
          |  preview window in Outlook Express - 
          |  I wasn't clear about where this one originates. I think that
          |  may be part of what you're asking. Is it from surfing the net,
          |  or is it just out there - like when you have the firewall to
          |  prevent computer's from sneaking into your computer - I think
          |  that is what it is. but then - it doesn't sound logical for it
          |  to just be hanging out in cyberspace! Does one computer
          |  transmit it to another some way? 
          |  It doesn't sound as though it comes in thru e-mail lie a lot
          |  of viruses do. 
          |  
          |  CrisS
          |  ----- Original Message ----- 
          |  From: Andy 
          |  To: pctechtalk@xxxxxxxxxxxxx 
          |  Sent: Friday, August 15, 2003 8:38 AM
          |  Subject: -=PCTechTalk=- Re: need help with patch for worm
          |  
          |  
          |  
          |  ----- Original Message -----
          |  From: "David Weaver" <weaverdj@xxxxxxxxxxxxx>
          |  To: <pctechtalk@xxxxxxxxxxxxx>
          |  Sent: Friday, August 15, 2003 1:20 PM
          |  Subject: -=PCTechTalk=- Re: need help with patch for worm
          |  
          |  
          |  > The worm scans for vulnerable computers then installs the
          |  worm to the
          |  > infected computer which downloads the program.  Then the
          |  program runs.
          |  
          |  OK, so lets just break that down a bit..how does it scan for a
          |  vunerable
          |  computer and how does the payload get into it?
          |  
          |  I don't see how an executable file can be executed with
          |  someone actually
          |  executing it
          |  
          |  Andy
          |  
          |  
          |  
          |  To unsub or change your email settings:
          |  //www.freelists.org/webpage/pctechtalk
          |  
          |  To access our Archives:
          |  http://groups.yahoo.com/group/PCTechTalk/messages/
          |  //www.freelists.org/archives/pctechtalk/
          |  
          |  For more info:
          |  //www.freelists.org/cgi-bin/list?list_id=pctechtalk
          |  
          |  
          |  To unsub or change your email settings:
          |  //www.freelists.org/webpage/pctechtalk
          |  
          |  To access our Archives:
          |  http://groups.yahoo.com/group/PCTechTalk/messages/
          |  //www.freelists.org/archives/pctechtalk/
          |  
          |  For more info:
          |  //www.freelists.org/cgi-bin/list?list_id=pctechtalk


********* And So It Was ***********

To unsub or change your email settings:
//www.freelists.org/webpage/pctechtalk

To access our Archives:
http://groups.yahoo.com/group/PCTechTalk/messages/
//www.freelists.org/archives/pctechtalk/

For more info:
//www.freelists.org/cgi-bin/list?list_id=pctechtalk

Other related posts: