exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files

preventing.worms
Posted May 17, 2000
Authored by Woody Thrower, Stan Burnett, Gary Wahlquist | Site www2.axent.com

Prevent Current and Future E-Mail Worms.

tags | worm
SHA-256 | b1751241071df22894da713215dce7423eeb70171bb6e5eafc67ab315fb54b15
nolove.mz
Posted May 17, 2000
Authored by Michal Zalewski

"I don't think I really love you" or writing internet worms for fun and profit.

tags | worm
SHA-256 | d21298d8550cdb1dce8b32a0ad6a565a74adfde66a4bcb0a08045abe78644dd4
worm.txt
Posted May 12, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Writing Internet Worms for Fun and Profit - The love letter worm was very crude, and proof of concept code for much more powerful worms has been written. Expect next years worms to be architecture independent, invisable to the end user, spread without user intervention, learn and launch updated worms, polymorphic with no constant code, and dissapear after it has accomplished its objective.

tags | worm, proof of concept
SHA-256 | 4814e0d3497813ef018f3be0c85104943a8f0a6b10ad19514067d20f4a5d8653
turn.off.vbs.txt
Posted May 10, 2000
Authored by Adam Cary

The loveletter virus, melissa, and other windows viruses that spread the same way can be defeated by disabling execution of windows scripts with the Windows Scripting Host (WSH) feature. Contains detailed instructions on doing so under Windows 95, 98, 2000, and NT.

tags | virus
systems | windows
SHA-256 | 9a1d9413b0ac4029f55a9507772b7487e040f9455c9baa4296cd8147a6434ce1
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close