lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1075594022.440.27.camel@localhost> From: frank at knobbe.us (Frank Knobbe) Subject: MyDoom.b samples taken down On Sun, 2004-02-01 at 06:08, Mike wrote: > I have copied the files to the following locations: > http://homepages.ihug.co.nz/~mjcarter/virus/MyDoomA.exe > http://homepages.ihug.co.nz/~mjcarter/virus/MyDoomB.exe And so the virus spreads again..... and by means not anticipated by its author... Spreading via search engines, and infecting people wanting to download the Doom sequel... When posting viruses, may I suggest a mechanism that forces someone to manually click on a button or enter a number or something? Anything that prevents automatic download from a URL. Otherwise your web space might be misused by MyDoomC as a download point. Regards, Frank -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 187 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040131/197d1b3a/attachment.bin
Powered by blists - more mailing lists