Hey! Would it be OK with you if I upload this picture of you to my blog?

The link below leads to an excellent article about the pipeline worm, It offers a step by step description of how an infection can occur through using an instant messanger program, as well as some of the research techniques used to discover the source and workings of this malware. Screenshots are provided for a visual too. Great stuff!

Pipeline Worm Floods AIM with Botnet Drones






<< Home

This page is powered by Blogger. Isn't yours?