SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: thecow who started this subject8/14/2003 11:43:11 PM
From: mr.mark  Read Replies (1) of 110652
 
"Beginning in late July, intruders have had their choice of a growing number of easy-to-use RPC DCOM exploit programs and variants, some of them packaged with friendly GUIs or backdoor programs to install on attacked machines. Before the worm struck, universities like U.C. Berkeley and Stanford were already in pitched battles with intruders wielding mass infectors that were worm-like in their attack. According to the Department of Homeland security, on some campuses intruders were cracking systems and installing the RPC DCOM patch themselves, presumably to keep other hackers from taking the machines away from them."

excerpted from....

The Bright Side of Blaster

By Kevin Poulsen
SecurityFocus.com
Aug 14 2003
securityfocus.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext