> Anyone know whether the exploit being used by code red could be used 
> to launch a counter exploit on the infected system that patches the 
> machine :-).

Uh, you could do that, but I wouldn't recommend it, nor is this the
appropriate place to debate the use of "friendly" worms.

I know several people who are simply parsing their log files, then sending
messages to people with infected machines if they can find contact info.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
phone: (202) 797-5496
fax: (202) 797-5444

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/cf-talk@houseoffusion.com/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to