Scott, Matt and Jeff,

Thannks for the replys to my questions about my firewall logs. Scott,
http://www.echogent.com/cgi-bin/fwlog.pl is really cool. It really helps
me to make sense of the log entries.

I see a fair number of the entries involving the code red worm. I was
not able to actually contact ant of the IP's responsible.

How tough would it be for someone to write a hunter/ killer progam that
would propagate like the worm, find it on infected servers then kill it
by rewriting its code. Then remove itself on a specified date? I wish I
had the skills.

Thanks again,

Kory



_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to