Stephen Fulton wrote:


That assumes that the worm must "discover" exploitable hosts. What if those hosts have already been identified through other means previously? A nation, terrorist or criminal with the means could very well compile a relatively accurate database and use such a worm to attack specific targets, and those attacks need not be destructive/disruptive.

Sure, most of the people on this list would make very smart and skilled criminals if they would choose to pursue that path.

Pete

Reply via email to