The most conservative position is that a hacked box is untrustable and should be wiped and re-built.The bigger problem is that there is now probably something vicious on that box, giving folks the ability to use you as a file store. I used a software firewall to quickly close the box down, while I could invest in hardwall firewall.
I expect Win32 crackers are as good as the Unix crackers and have installed their own binaries for several Windows .exe's and .dll's.
Len
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
