-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
____/ Doug Mentohl on Wednesday 18 February 2009 18:26 : \____
>
>
> By general malware standards, the Conficker worm is not particularly
> sophisticated. In fact, in a recent blog posting, McAfee security
> researcher Xiao Chen reported that it was written at least in part by
> using an open source malware tool, the metasploit ms08_067_netapi module ..
>
>
http://www.toptechnews.com/news/Microsoft-Warning-Not-Heeded/story.xhtml?story_id=0310033A9XWP
>
> "Metasploit can be used by administrators to test the vulnerability of
> computer systems in order to protect them, or by Black Hat hackers and
> script kiddies to break into remote systems. Like many information
> security tools, Metasploit can be used for both legitimate and
> unauthorized activities"
>
> http://en.wikipedia.org/wiki/Metasploit_Project
Holy Robin! People collaborate on code. How care they!!!?@#@
Must. Stop. This code-collaboraro-thingie.
- --
~~ Best of wishes
Roy S. Schestowitz | "Lions are like hippie tigers"
http://Schestowitz.com | RHAT GNU/Linux | PGP-Key: 0x74572E8E
19:00:01 up 11 days, 14:18, 2 users, load average: 1.90, 1.28, 1.17
http://iuron.com - help build a non-profit search engine
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkmcW5AACgkQU4xAY3RXLo4KNACfao6Xs+bamLCkbz0ROgtg4giC
SDIAn3zdZBgDWanZIUgoD+f0ZZiOEbWO
=PyBT
-----END PGP SIGNATURE-----
|
|