-----BEGIN PGP SIGNED MESSAGE-----
____/ Doug Mentohl on Wednesday 18 February 2009 18:26 : \____
> By general malware standards, the Conficker worm is not particularly
> sophisticated. In fact, in a recent blog posting, McAfee security
> researcher Xiao Chen reported that it was written at least in part by
> using an open source malware tool, the metasploit ms08_067_netapi module ..
> "Metasploit can be used by administrators to test the vulnerability of
> computer systems in order to protect them, or by Black Hat hackers and
> script kiddies to break into remote systems. Like many information
> security tools, Metasploit can be used for both legitimate and
> unauthorized activities"
Holy Robin! People collaborate on code. How care they!!!?@#@
Must. Stop. This code-collaboraro-thingie.
~~ Best of wishes
Roy S. Schestowitz | "Lions are like hippie tigers"
http://Schestowitz.com | RHAT GNU/Linux | PGP-Key: 0x74572E8E
19:00:01 up 11 days, 14:18, 2 users, load average: 1.90, 1.28, 1.17
http://iuron.com - help build a non-profit search engine
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
-----END PGP SIGNATURE-----