We may earn a small commission from affiliate links and paid advertisements. Terms
Originally posted by pissedoffsol@Aug 13 2003, 01:48 AM
<98 and macs don't have the procudural call service to even get into in the first place
Originally posted by pissedoffsol@Aug 13 2003, 01:38 AM
no, not really. lol hackers no know that one important uses an apple, so why bother
Originally posted by pissedoffsol@Aug 13 2003, 02:48 AM
no, its me, nt, 2k, xp, 2k3 server only. <98 and macs don't have the procudural call service to even get into in the first place
the good news, is that with all this going around today, people at work were talking about moving to linux
Originally posted by 92CivicCx+Aug 13 2003, 09:04 AM-->pissedoffsol@Aug 13 2003, 01:38 AM
no, not really. lol hackers no know that one important uses an apple, so why bother
No, not really. lol hackers know on one important uses an apple, so why bother
Originally posted by pissedoffsol@Aug 13 2003, 01:48 AM
no, its me, nt, 2k, xp, 2k3 server only. <98 and macs don't have the procudural call service to even get into in the first place
the good news, is that with all this going around today, people at work were talking about moving to linux
Originally posted by Afipunk21+Aug 13 2003, 10:22 AM-->Originally posted by 92CivicCx@Aug 13 2003, 09:04 AM
pissedoffsol@Aug 13 2003, 01:38 AM
no, not really. lol hackers no know that one important uses an apple, so why bother
No, not really. lol hackers know on one important uses an apple, so why bother
Jesus christ, you suys fucking suck.
No, not really, lol. Hackers know that no one important uses an apple, so why bother
Originally posted by HybridRevolution@Aug 13 2003, 05:02 PM
Bri is this a random infection or is it infected by calling something if it's in the RPC it's random correct? pretty much when ever windows decides to do an update check?
if this is the case than theoretically everyone should get it on those systems? unless it's stampped out. how does it target a ip?
Generates an IP address and attempts to infect the computer that has that address. The IP address is generated according to the following algorithms:
For 40% of the time, the generated IP address is of the form A.B.C.0, where A and B are equal to the first two parts of the infected computer's IP address.
C is also calculated by the third part of the infected system's IP address; however, for 40% of the time the worm checks whether C is greater than 20. If so, a random value less than 20 is subtracted from C. Once the IP address is calculated, the worm will attempt to find and exploit a computer with the IP address A.B.C.0.
The worm will then increment the 0 part of the IP address by 1, attempting to find and exploit other computers based on the new IP address, until it reaches 254.