Computer Experts Unite to Hunt Worm

  • Thread starter Thread starter Bluuuue Rajah
  • Start date Start date
B

Bluuuue Rajah

Computer Experts Unite to Hunt Worm

March 18, 2009

nytimes.com/2009/03/19/technology/19worm.html

An extraordinary behind-the-scenes struggle is taking place between
computer security groups around the world and the brazen author of a
malicious software program called Conficker.

The program grabbed global attention when it began spreading late last
year and quickly infected millions of computers with software code that
is intended to lash together the infected machines it controls into a
powerful computer known as a botnet.

Since then, the program’s author has repeatedly updated its software in
a cat-and-mouse game being fought with an informal international
alliance of computer security firms and a network governance group known
as the Internet Corporation for Assigned Names and Numbers. Members
refer to the alliance as the Conficker Cabal.

The existence of the botnet has brought together some of the world’s
best computer security experts to prevent potential damage. The spread
of the malicious software is on a scale that matches the worst of past
viruses and worms, like the I Love You virus. Last month, Microsoft
announced a $250,000 reward for information leading to the capture of
the Conficker author.

Botnets are used to send the vast majority of e-mail spam messages. Spam
in turn is the basis for shady commercial promotions including schemes
that frequently involve directing unwary users to Web sites that can
plant malicious software, or malware, on computers.

Botnets can also be used to distribute other kinds of malware and
generate attacks that can take commercial or government Web sites off-
line.

One of the largest botnets tracked last year consisted of 1.5 million
infected computers that were being used to automate the breaking of
“captchas,” the squiggly letter tests that are used to force applicants
for Web services to prove they are human.

The inability of the world’s best computer security technologists to
gain the upper hand against anonymous but determined cybercriminals is
viewed by a growing number of those involved in the fight as evidence of
a fundamental security weakness in the global network.

“I walked up to a three-star general on Wednesday and asked him if he
could help me deal with a million-node botnet,” said Rick Wesson, a
computer security researcher involved in combating Conficker. “I didn’t
get an answer.”

An examination of the program reveals that the zombie computers are
programmed to try to contact a control system for instructions on April
1. There has been a range of speculation about the nature of the threat
posed by the botnet, from a wake-up call to a devastating attack.

Researchers who have been painstakingly disassembling the Conficker code
have not been able to determine where the author, or authors, is
located, or whether the program is being maintained by one person or a
group of hackers. The growing suspicion is that Conficker will
ultimately be a computing-for-hire scheme. Researchers expect it will
imitate the hottest fad in the computer industry, called cloud
computing, in which companies like Amazon, Microsoft and Sun
Microsystems sell computing as a service over the Internet.

Earlier botnets were devised so they could be split up and rented via
black market schemes that are common in the Internet underground,
according to security researchers.

The Conficker program is built so that after it takes up residence on
infected computers, it can be programmed remotely by software to serve
as a vast system for distributing spam or other malware.

Several people who have analyzed various versions of the program said
Conficker’s authors were obviously monitoring the efforts to restrict
the malicious program and had repeatedly demonstrated that their skills
were at the leading edge of computer technology.

For example, the Conficker worm already had been through several
versions when the alliance of computer security experts seized control
of 250 Internet domain names the system was planning to use to forward
instructions to millions of infected computers.

Shortly thereafter, in the first week of March, the fourth known version
of the program, Conficker C, expanded the number of the sites it could
use to 50,000. That step made it virtually impossible to stop the
Conficker authors from communicating with their botnet.

“It’s worth noting that these are folks who are taking this seriously
and not making many mistakes,” said Jose Nazario, a member of the
international security group and a researcher at Arbor Networks, a
company in Lexington, Mass., that provides tools for monitoring the
performance of networks. “They’re going for broke.”

Several members of the Conficker Cabal said that law enforcement
officials had been slow to respond to the group’s efforts, but that a
number of law enforcement agencies were now in “listen” mode.

“We’re aware of it,” said Paul Bresson, an F.B.I. spokesman, “and we’re
working with security companies to address the problem.”

A report scheduled to be released Thursday by SRI International, a
nonprofit research institute in Menlo Park, Calif., says that Conficker
C constitutes a major rewrite of the software. Not only does it make it
far more difficult to block communication with the program, but it gives
the program added powers to disable many commercial antivirus programs
as well as Microsoft’s security update features.

“Perhaps the most obvious frightening aspect of Conficker C is its clear
potential to do harm,” said Phillip Porras, a research director at SRI
International and one of the authors of the report. “Perhaps in the best
case, Conficker may be used as a sustained and profitable platform for
massive Internet fraud and theft.”

“In the worst case,” Mr. Porras said, “Conficker could be turned into a
powerful offensive weapon for performing concerted information warfare
attacks that could disrupt not just countries, but the Internet itself.”

The researchers, noting that the Conficker authors were using the most
advanced computer security techniques, said the original version of the
program contained a recent security feature developed by an M.I.T.
computer scientist, Ron Rivest, that had been made public only weeks
before. And when a revision was issued by Dr. Rivest’s group to correct
a flaw, the Conficker authors revised their program to add the
correction.

Although there have been clues that the Conficker authors may be located
in Eastern Europe, evidence has not been conclusive. Security
researchers, however, said this week that they were impressed by the
authors’ productivity.

“If you suspect this person lives in Kiev,” Mr. Nazario said, “I would
look for someone who has recently reported repetitive stress injury
symptoms.”
 
Bluuuue said:
Computer Experts Unite to Hunt Worm

March 18, 2009

nytimes.com/2009/03/19/technology/19worm.html

An extraordinary behind-the-scenes struggle is taking place between
computer security groups around the world and the brazen author of a
malicious software program called Conficker.
<SNIP>

There is no profit in it being destructive, except as a threat for
extortion purposes. There are lots of ways to make money off this beast
of a botnet. The usual - spam, click fraud, etc.

I'm wondering if they have something completely new in mind. The idea
mentioned for computing for resale (a la "Cloud Computing") sounds possible.

The size of this botnet alone makes it worth worrying about. Of course,
I'm surprised every time the Internet *does* work.

-oldami
 
oldami said:
There is no profit in it being destructive, except as a threat for
extortion purposes. There are lots of ways to make money off this beast
of a botnet. The usual - spam, click fraud, etc.

I'm wondering if they have something completely new in mind. The idea
mentioned for computing for resale (a la "Cloud Computing") sounds
possible.

The size of this botnet alone makes it worth worrying about. Of course,
I'm surprised every time the Internet *does* work.

-oldami

Heheheh - you wrote ficker!
 
There is no profit in it being destructive, except as a threat for
extortion purposes. There are lots of ways to make money off this beast
of a botnet. The usual - spam, click fraud, etc.

I'm wondering if they have something completely new in mind. The idea
mentioned for computing for resale (a la "Cloud Computing") sounds possible.

The size of this botnet alone makes it worth worrying about. Of course,
I'm surprised every time the Internet *does* work.

There are a few botnets doing very well and just waiting for a
command; the Storm worm is still very strong and able.
http://en.wikipedia.org/wiki/Storm_worm_botnet
 
Bluuuue said:
Computer Experts Unite to Hunt Worm

March 18, 2009

nytimes.com/2009/03/19/technology/19worm.html

An extraordinary behind-the-scenes struggle is taking place between
computer security groups around the world and the brazen author of a
malicious software program called Conficker.

The program grabbed global attention when it began spreading late last
year and quickly infected millions of computers with software code that
is intended to lash together the infected machines it controls into a
powerful computer known as a botnet.

Since then, the program�s author has repeatedly updated its software in
a cat-and-mouse game being fought with an informal international
alliance of computer security firms and a network governance group known
as the Internet Corporation for Assigned Names and Numbers. Members
refer to the alliance as the Conficker Cabal.

The existence of the botnet has brought together some of the world�s
best computer security experts to prevent potential damage. The spread
of the malicious software is on a scale that matches the worst of past
viruses and worms, like the I Love You virus. Last month, Microsoft
announced a $250,000 reward for information leading to the capture of
the Conficker author.

Botnets are used to send the vast majority of e-mail spam messages. Spam
in turn is the basis for shady commercial promotions including schemes
that frequently involve directing unwary users to Web sites that can
plant malicious software, or malware, on computers.

Botnets can also be used to distribute other kinds of malware and
generate attacks that can take commercial or government Web sites off-
line.

One of the largest botnets tracked last year consisted of 1.5 million
infected computers that were being used to automate the breaking of
�captchas,� the squiggly letter tests that are used to force applicants
for Web services to prove they are human.

The inability of the world�s best computer security technologiststo
gain the upper hand against anonymous but determined cybercriminals is
viewed by a growing number of those involved in the fight as evidence of
a fundamental security weakness in the global network.

�I walked up to a three-star general on Wednesday and asked him if he
could help me deal with a million-node botnet,� said Rick Wesson,a
computer security researcher involved in combating Conficker. �I didn�t
get an answer.�

An examination of the program reveals that the zombie computers are
programmed to try to contact a control system for instructions on April
1. There has been a range of speculation about the nature of the threat
posed by the botnet, from a wake-up call to a devastating attack.

Researchers who have been painstakingly disassembling the Conficker code
have not been able to determine where the author, or authors, is
located, or whether the program is being maintained by one person or a
group of hackers. The growing suspicion is that Conficker will
ultimately be a computing-for-hire scheme. Researchers expect it will
imitate the hottest fad in the computer industry, called cloud
computing, in which companies like Amazon, Microsoft and Sun
Microsystems sell computing as a service over the Internet.

Earlier botnets were devised so they could be split up and rented via
black market schemes that are common in the Internet underground,
according to security researchers.

The Conficker program is built so that after it takes up residence on
infected computers, it can be programmed remotely by software to serve
as a vast system for distributing spam or other malware.

Several people who have analyzed various versions of the program said
Conficker�s authors were obviously monitoring the efforts to restrict
the malicious program and had repeatedly demonstrated that their skills
were at the leading edge of computer technology.

For example, the Conficker worm already had been through several
versions when the alliance of computer security experts seized control
of 250 Internet domain names the system was planning to use to forward
instructions to millions of infected computers.

Shortly thereafter, in the first week of March, the fourth known version
of the program, Conficker C, expanded the number of the sites it could
use to 50,000. That step made it virtually impossible to stop the
Conficker authors from communicating with their botnet.

�It�s worth noting that these are folks who are taking this seriously
and not making many mistakes,� said Jose Nazario, a member of the
international security group and a researcher at Arbor Networks, a
company in Lexington, Mass., that provides tools for monitoring the
performance of networks. �They�re going for broke.�

Several members of the Conficker Cabal said that law enforcement
officials had been slow to respond to the group�s efforts, but that a
number of law enforcement agencies were now in �listen� mode.

�We�re aware of it,� said Paul Bresson, an F.B.I.spokesman, �and we�re
working with security companies to address the problem.�

A report scheduled to be released Thursday by SRI International, a
nonprofit research institute in Menlo Park, Calif., says that Conficker
C constitutes a major rewrite of the software. Not only does it make it
far more difficult to block communication with the program, but it gives
the program added powers to disable many commercial antivirus programs
as well as Microsoft�s security update features.

�Perhaps the most obvious frightening aspect of Conficker C is its clear
potential to do harm,� said Phillip Porras, a research director at SRI
International and one of the authors of the report. �Perhaps in the best
case, Conficker may be used as a sustained and profitable platform for
massive Internet fraud and theft.�

�In the worst case,� Mr. Porras said, �Conficker could be turned into a
powerful offensive weapon for performing concerted information warfare
attacks that could disrupt not just countries, but the Internet itself.�

The researchers, noting that the Conficker authors were using the most
advanced computer security techniques, said the original version of the
program contained a recent security feature developed by an M.I.T.
computer scientist, Ron Rivest, that had been made public only weeks
before. And when a revision was issued by Dr. Rivest�s group to correct
a flaw, the Conficker authors revised their program to add the
correction.

Although there have been clues that the Conficker authors may be located
in Eastern Europe, evidence has not been conclusive. Security
researchers, however, said this week that they were impressed by the
authors� productivity.

�If you suspect this person lives in Kiev,� Mr. Nazario said, �I would
look for someone who has recently reported repetitive stress injury
symptoms.�
 
Bluuuue said:
Computer Experts Unite to Hunt Worm

March 18, 2009

nytimes.com/2009/03/19/technology/19worm.html

An extraordinary behind-the-scenes struggle is taking place between
computer security groups around the world and the brazen author of a
malicious software program called Conficker.

The program grabbed global attention when it began spreading late last
year and quickly infected millions of computers with software code that
is intended to lash together the infected machines it controls into a
powerful computer known as a botnet.

Since then, the program�s author has repeatedly updated its software in
a cat-and-mouse game being fought with an informal international
alliance of computer security firms and a network governance group known
as the Internet Corporation for Assigned Names and Numbers. Members
refer to the alliance as the Conficker Cabal.

The existence of the botnet has brought together some of the world�s
best computer security experts to prevent potential damage. The spread
of the malicious software is on a scale that matches the worst of past
viruses and worms, like the I Love You virus. Last month, Microsoft
announced a $250,000 reward for information leading to the capture of
the Conficker author.

Botnets are used to send the vast majority of e-mail spam messages. Spam
in turn is the basis for shady commercial promotions including schemes
that frequently involve directing unwary users to Web sites that can
plant malicious software, or malware, on computers.

Botnets can also be used to distribute other kinds of malware and
generate attacks that can take commercial or government Web sites off-
line.

One of the largest botnets tracked last year consisted of 1.5 million
infected computers that were being used to automate the breaking of
�captchas,� the squiggly letter tests that are used to force applicants
for Web services to prove they are human.

The inability of the world�s best computer security technologiststo
gain the upper hand against anonymous but determined cybercriminals is
viewed by a growing number of those involved in the fight as evidence of
a fundamental security weakness in the global network.

�I walked up to a three-star general on Wednesday and asked him if he
could help me deal with a million-node botnet,� said Rick Wesson,a
computer security researcher involved in combating Conficker. �I didn�t
get an answer.�

An examination of the program reveals that the zombie computers are
programmed to try to contact a control system for instructions on April
1. There has been a range of speculation about the nature of the threat
posed by the botnet, from a wake-up call to a devastating attack.

Researchers who have been painstakingly disassembling the Conficker code
have not been able to determine where the author, or authors, is
located, or whether the program is being maintained by one person or a
group of hackers. The growing suspicion is that Conficker will
ultimately be a computing-for-hire scheme. Researchers expect it will
imitate the hottest fad in the computer industry, called cloud
computing, in which companies like Amazon, Microsoft and Sun
Microsystems sell computing as a service over the Internet.

Earlier botnets were devised so they could be split up and rented via
black market schemes that are common in the Internet underground,
according to security researchers.

The Conficker program is built so that after it takes up residence on
infected computers, it can be programmed remotely by software to serve
as a vast system for distributing spam or other malware.

Several people who have analyzed various versions of the program said
Conficker�s authors were obviously monitoring the efforts to restrict
the malicious program and had repeatedly demonstrated that their skills
were at the leading edge of computer technology.

For example, the Conficker worm already had been through several
versions when the alliance of computer security experts seized control
of 250 Internet domain names the system was planning to use to forward
instructions to millions of infected computers.

Shortly thereafter, in the first week of March, the fourth known version
of the program, Conficker C, expanded the number of the sites it could
use to 50,000. That step made it virtually impossible to stop the
Conficker authors from communicating with their botnet.

�It�s worth noting that these are folks who are taking this seriously
and not making many mistakes,� said Jose Nazario, a member of the
international security group and a researcher at Arbor Networks, a
company in Lexington, Mass., that provides tools for monitoring the
performance of networks. �They�re going for broke.�

Several members of the Conficker Cabal said that law enforcement
officials had been slow to respond to the group�s efforts, but that a
number of law enforcement agencies were now in �listen� mode.

�We�re aware of it,� said Paul Bresson, an F.B.I.spokesman, �and we�re
working with security companies to address the problem.�

A report scheduled to be released Thursday by SRI International, a
nonprofit research institute in Menlo Park, Calif., says that Conficker
C constitutes a major rewrite of the software. Not only does it make it
far more difficult to block communication with the program, but it gives
the program added powers to disable many commercial antivirus programs
as well as Microsoft�s security update features.

�Perhaps the most obvious frightening aspect of Conficker C is its clear
potential to do harm,� said Phillip Porras, a research director at SRI
International and one of the authors of the report. �Perhaps in the best
case, Conficker may be used as a sustained and profitable platform for
massive Internet fraud and theft.�

�In the worst case,� Mr. Porras said, �Conficker could be turned into a
powerful offensive weapon for performing concerted information warfare
attacks that could disrupt not just countries, but the Internet itself.�

The researchers, noting that the Conficker authors were using the most
advanced computer security techniques, said the original version of the
program contained a recent security feature developed by an M.I.T.
computer scientist, Ron Rivest, that had been made public only weeks
before. And when a revision was issued by Dr. Rivest�s group to correct
a flaw, the Conficker authors revised their program to add the
correction.

Although there have been clues that the Conficker authors may be located
in Eastern Europe, evidence has not been conclusive. Security
researchers, however, said this week that they were impressed by the
authors� productivity.

�If you suspect this person lives in Kiev,� Mr. Nazario said, �I would
look for someone who has recently reported repetitive stress injury
symptoms.�
 
Computer Experts Unite to Hunt Worm

March 18, 2009

nytimes.com/2009/03/19/technology/19worm.html

An extraordinary behind-the-scenes struggle is taking place between
computer security groups around the world and the brazen author of a
malicious software program called Conficker.
<snip>

These so called "computer experts" aren't all that bright if you ask
me. The best way to combat a worm...is with another worm. One that
propagates, seeks out the bad worm, removes it and then, once the
threat has been eliminated a kind of "self destruct" code can be
broadcast to the good worm which will delete itself.

--

Onideus Mad Hatter
mhm ¹ x ¹
http://www.backwater-productions.net
http://www.uncensored-inter.net


Hatter Quotes
-------------
"Freedom, true freedom, is nothing more than intellectual advantage over others."

"When I listen to people I don't really listen to what it is they're
saying, so much as what they're saying it for."

"Don't ever **** with someone who has more creativity than you do."

"You're only one of the best if you're striving to become one of the
best."

"I didn't make reality, Sunshine, I just verbally bitch slapped you
with it."

"I'm not a professional, I'm an artist."

"Usenet Filters - Learn to shut yourself the **** up!"

"Drugs killed Jesus you know...oh wait, no, that was the Jews, my
bad."

"The more I learn the more I'm killing my idols."

"Is it wrong to incur and then use the hate ridden, vengeful stupidity
of complete strangers in random Usenet froups to further my art?"

"Freedom is only a concept, like race it's merely a social construct
that doesn't really exist outside of your ability to convince others
of its relevancy."

"Next time slow up a lil, then maybe you won't jump the gun and start
creamin yer panties before it's time to pop the champagne proper."

"Reality is directly proportionate to how creative you are."

"People are pretty ****ing high on themselves if they think that
they're just born with a soul. *snicker*...yeah, like they're just
givin em out for free."

"How sad that you're such a poor judge of style that you can't even
properly gauge the artistic worth of your own efforts."

"Those who record history are those who control history."

"I am the living embodiment of hell itself in all its tormentive rage,
endless suffering, unfathomable pain and unending horror...but you
don't get sent to me...I come for you."

"Ideally in a fight I'd want a BGM-109A with a W80 250 kiloton
tactical thermonuclear fusion based war head."

"Tell me, would you describe yourself more as a process or a
function?"

"Apparently this group has got the market cornered on stupid.
Intelligence is down 137 points across the board and the forecast
indicates an increase in Webtv users."

"Is my .sig delimiter broken? Really? You're sure? Awww,
gee...that's too bad...for YOU!" `, )
 

You've failed, Pigfucker. Go back to Webbie land and give the WebTV
interface of Usenet a rest already. Three replies to the same post,
two of 'em blanks and the third a link to a shitty image...yeah...put
it down, yer done.

--

Onideus Mad Hatter
mhm ¹ x ¹
http://www.backwater-productions.net
http://www.uncensored-inter.net


Hatter Quotes
-------------
"Freedom, true freedom, is nothing more than intellectual advantage over others."

"When I listen to people I don't really listen to what it is they're
saying, so much as what they're saying it for."

"Don't ever **** with someone who has more creativity than you do."

"You're only one of the best if you're striving to become one of the
best."

"I didn't make reality, Sunshine, I just verbally bitch slapped you
with it."

"I'm not a professional, I'm an artist."

"Usenet Filters - Learn to shut yourself the **** up!"

"Drugs killed Jesus you know...oh wait, no, that was the Jews, my
bad."

"The more I learn the more I'm killing my idols."

"Is it wrong to incur and then use the hate ridden, vengeful stupidity
of complete strangers in random Usenet froups to further my art?"

"Freedom is only a concept, like race it's merely a social construct
that doesn't really exist outside of your ability to convince others
of its relevancy."

"Next time slow up a lil, then maybe you won't jump the gun and start
creamin yer panties before it's time to pop the champagne proper."

"Reality is directly proportionate to how creative you are."

"People are pretty ****ing high on themselves if they think that
they're just born with a soul. *snicker*...yeah, like they're just
givin em out for free."

"How sad that you're such a poor judge of style that you can't even
properly gauge the artistic worth of your own efforts."

"Those who record history are those who control history."

"I am the living embodiment of hell itself in all its tormentive rage,
endless suffering, unfathomable pain and unending horror...but you
don't get sent to me...I come for you."

"Ideally in a fight I'd want a BGM-109A with a W80 250 kiloton
tactical thermonuclear fusion based war head."

"Tell me, would you describe yourself more as a process or a
function?"

"Apparently this group has got the market cornered on stupid.
Intelligence is down 137 points across the board and the forecast
indicates an increase in Webtv users."

"Is my .sig delimiter broken? Really? You're sure? Awww,
gee...that's too bad...for YOU!" `, )
 
Unknown said:
Talk about 'computer experts' not being very bright-----Do you think
combating a worm with another worm is bright?

Actually it's not a bad idea if you read ALL of what was written. OP seems
to be suggesting releasing a (harmless) worm that's sole intent is to target
and destroy a nasty one. If it finds it, it kills it, then kills itself.
If it doesn't find it, it just kills itself. So where's the problem?
 
Computer Experts Unite to Hunt Worm

March 18, 2009

nytimes.com/2009/03/19/technology/19worm.html

An extraordinary behind-the-scenes struggle is taking place between
computer security groups around the world and the brazen author of a
malicious software program called Conficker.

The program grabbed global attention when it began spreading late last
year and quickly infected millions of computers with software code that
is intended to lash together the infected machines it controls into a
powerful computer known as a botnet.

Since then, the program’s author has repeatedly updated its software in
a cat-and-mouse game being fought with an informal international
alliance of computer security firms and a network governance group known
as the Internet Corporation for Assigned Names and Numbers. Members
refer to the alliance as the Conficker Cabal.

The existence of the botnet has brought together some of the world’s
best computer security experts to prevent potential damage. The spread
of the malicious software is on a scale that matches the worst of past
viruses and worms, like the I Love You virus. Last month, Microsoft
announced a $250,000 reward for information leading to the capture of
the Conficker author.

Well, the good news for MS about that is that $250,000 is why
computer mailers
even work on Java. The bad news is that a company like MS spending
$250,000
to fix a computer bug, is why the people who actually know how
computers work,
work on Linux, Parallel RISC, C++, Bi-Optical Computers, Self-
Replicating Machines, AUVs,
Fiber Optics and Optical Harddisks, CD-rom, DVD-rom, HDTV,
Post-GM Scanners, Pv Cells, On-Line Banking, On-Line Shopping,
On-Line Publishing, USB, and GPS, rather than with Java.
 
Unknown said:
Think about how you would go about developing (and testing) such a
worm.

I can't. It's (the code) too far beyond my realm of understanding.

Nor can I fathom why people write destructive shit in the first place.

Seems to me, if you're THAT smart, you could be doing something a little
more CONstructive with your talent.
 
Onideus said:
Well the only potential "problem" is who codes it and how good they
are. If it's some dipshit flunkie, like Mr. "Unknown" up there, then
you could run into all sorts of potential problems, including your
worm being taken over and used for any number of malicious purposes.
It would need to be coded *VERY* carefully and ideally as absolutely
simplistic as possible. But even in the worst case scenario, a failed
or exploited worm with severely limited capabilities would be *FAR*
preferable to the original worm it was designed to take out.

Like I told "Mr. Unknown", it's all WAY over my head as to how one would
code it.

But I like the idea of it.

I mean, if people are stupid enough to allow the "malicious" worm in,
they'll probably let the "fix-it" worm is as well. So chances are, they'd
be 'repaired' without ever even knowing they were 'broken' in the first
place.
 
Actually it's not a bad idea if you read ALL of what was written. OP seems
to be suggesting releasing a (harmless) worm that's sole intent is to target
and destroy a nasty one. If it finds it, it kills it, then kills itself.
If it doesn't find it, it just kills itself. So where's the problem?

Well the only potential "problem" is who codes it and how good they
are. If it's some dipshit flunkie, like Mr. "Unknown" up there, then
you could run into all sorts of potential problems, including your
worm being taken over and used for any number of malicious purposes.
It would need to be coded *VERY* carefully and ideally as absolutely
simplistic as possible. But even in the worst case scenario, a failed
or exploited worm with severely limited capabilities would be *FAR*
preferable to the original worm it was designed to take out.

--

Onideus Mad Hatter
mhm ¹ x ¹
http://www.backwater-productions.net
http://www.uncensored-inter.net


Hatter Quotes
-------------
"Freedom, true freedom, is nothing more than intellectual advantage over others."

"When I listen to people I don't really listen to what it is they're
saying, so much as what they're saying it for."

"Don't ever **** with someone who has more creativity than you do."

"You're only one of the best if you're striving to become one of the
best."

"I didn't make reality, Sunshine, I just verbally bitch slapped you
with it."

"I'm not a professional, I'm an artist."

"Usenet Filters - Learn to shut yourself the **** up!"

"Drugs killed Jesus you know...oh wait, no, that was the Jews, my
bad."

"The more I learn the more I'm killing my idols."

"Is it wrong to incur and then use the hate ridden, vengeful stupidity
of complete strangers in random Usenet froups to further my art?"

"Freedom is only a concept, like race it's merely a social construct
that doesn't really exist outside of your ability to convince others
of its relevancy."

"Next time slow up a lil, then maybe you won't jump the gun and start
creamin yer panties before it's time to pop the champagne proper."

"Reality is directly proportionate to how creative you are."

"People are pretty ****ing high on themselves if they think that
they're just born with a soul. *snicker*...yeah, like they're just
givin em out for free."

"How sad that you're such a poor judge of style that you can't even
properly gauge the artistic worth of your own efforts."

"Those who record history are those who control history."

"I am the living embodiment of hell itself in all its tormentive rage,
endless suffering, unfathomable pain and unending horror...but you
don't get sent to me...I come for you."

"Ideally in a fight I'd want a BGM-109A with a W80 250 kiloton
tactical thermonuclear fusion based war head."

"Tell me, would you describe yourself more as a process or a
function?"

"Apparently this group has got the market cornered on stupid.
Intelligence is down 137 points across the board and the forecast
indicates an increase in Webtv users."

"Is my .sig delimiter broken? Really? You're sure? Awww,
gee...that's too bad...for YOU!" `, )
 
Ta<WHACK>

Is there some particular reason as to why you're ****ing up thread
continuity? Is it because you're an idiot? *nods* I think that
might be the reason. Let me know, mmmkay.

PS - if you expect most people to even acknowledge you as a sentient
presence (never mind even reading your message), then you best figure
out how to post properly on Usenet. Just a little tip there, Kiddo.

--

Onideus Mad Hatter
mhm ¹ x ¹
http://www.backwater-productions.net
http://www.uncensored-inter.net


Hatter Quotes
-------------
"Freedom, true freedom, is nothing more than intellectual advantage over others."

"When I listen to people I don't really listen to what it is they're
saying, so much as what they're saying it for."

"Don't ever **** with someone who has more creativity than you do."

"You're only one of the best if you're striving to become one of the
best."

"I didn't make reality, Sunshine, I just verbally bitch slapped you
with it."

"I'm not a professional, I'm an artist."

"Usenet Filters - Learn to shut yourself the **** up!"

"Drugs killed Jesus you know...oh wait, no, that was the Jews, my
bad."

"The more I learn the more I'm killing my idols."

"Is it wrong to incur and then use the hate ridden, vengeful stupidity
of complete strangers in random Usenet froups to further my art?"

"Freedom is only a concept, like race it's merely a social construct
that doesn't really exist outside of your ability to convince others
of its relevancy."

"Next time slow up a lil, then maybe you won't jump the gun and start
creamin yer panties before it's time to pop the champagne proper."

"Reality is directly proportionate to how creative you are."

"People are pretty ****ing high on themselves if they think that
they're just born with a soul. *snicker*...yeah, like they're just
givin em out for free."

"How sad that you're such a poor judge of style that you can't even
properly gauge the artistic worth of your own efforts."

"Those who record history are those who control history."

"I am the living embodiment of hell itself in all its tormentive rage,
endless suffering, unfathomable pain and unending horror...but you
don't get sent to me...I come for you."

"Ideally in a fight I'd want a BGM-109A with a W80 250 kiloton
tactical thermonuclear fusion based war head."

"Tell me, would you describe yourself more as a process or a
function?"

"Apparently this group has got the market cornered on stupid.
Intelligence is down 137 points across the board and the forecast
indicates an increase in Webtv users."

"Is my .sig delimiter broken? Really? You're sure? Awww,
gee...that's too bad...for YOU!" `, )
 
Sure glad all Texans aren't as obnoxious and uncouth as you. Who do you
really think you are impressing?
 
I can't. It's (the code) too far beyond my realm of understanding.

Nor can I fathom why people write destructive shit in the first place.

Seems to me, if you're THAT smart, you could be doing something a little
more CONstructive with your talent.

Oh they're usually not all that bright actually, mostly they take
*OTHER* people's work and then just cobble it all together in one
great big, bloated, sloppy spaghetti bitched mess.

The problem usually starts after someone halfway intelligent comes
across a potential exploit and then makes it public. At that point
any code monkey with a keyboard can slop together some halfass little
script kiddie bullshit to make use of the discovered exploit.

If you discover an exploit the *BEST* thing you can do is to keep your
mouth shut and keep the info on a "need to know" basis, just letting
software makers and security companies aware of it. But then the fact
of the matter is that most of those who actively go *LOOKING* for
exploits are usually after just one thing...to discredit the software
maker.

Of course in their quest for corporate shame and personal recognition
they inadvertently **** over the lot of the computing populous. Too
short sighted to comprehend that there are no shortage of ****wits out
there who wouldn't think twice about actually using the discovered
exploit.

--

Onideus Mad Hatter
mhm ¹ x ¹
http://www.backwater-productions.net
http://www.uncensored-inter.net


Hatter Quotes
-------------
"Freedom, true freedom, is nothing more than intellectual advantage over others."

"When I listen to people I don't really listen to what it is they're
saying, so much as what they're saying it for."

"Don't ever **** with someone who has more creativity than you do."

"You're only one of the best if you're striving to become one of the
best."

"I didn't make reality, Sunshine, I just verbally bitch slapped you
with it."

"I'm not a professional, I'm an artist."

"Usenet Filters - Learn to shut yourself the **** up!"

"Drugs killed Jesus you know...oh wait, no, that was the Jews, my
bad."

"The more I learn the more I'm killing my idols."

"Is it wrong to incur and then use the hate ridden, vengeful stupidity
of complete strangers in random Usenet froups to further my art?"

"Freedom is only a concept, like race it's merely a social construct
that doesn't really exist outside of your ability to convince others
of its relevancy."

"Next time slow up a lil, then maybe you won't jump the gun and start
creamin yer panties before it's time to pop the champagne proper."

"Reality is directly proportionate to how creative you are."

"People are pretty ****ing high on themselves if they think that
they're just born with a soul. *snicker*...yeah, like they're just
givin em out for free."

"How sad that you're such a poor judge of style that you can't even
properly gauge the artistic worth of your own efforts."

"Those who record history are those who control history."

"I am the living embodiment of hell itself in all its tormentive rage,
endless suffering, unfathomable pain and unending horror...but you
don't get sent to me...I come for you."

"Ideally in a fight I'd want a BGM-109A with a W80 250 kiloton
tactical thermonuclear fusion based war head."

"Tell me, would you describe yourself more as a process or a
function?"

"Apparently this group has got the market cornered on stupid.
Intelligence is down 137 points across the board and the forecast
indicates an increase in Webtv users."

"Is my .sig delimiter broken? Really? You're sure? Awww,
gee...that's too bad...for YOU!" `, )
 
Su<WHACK>

I'm sorry, what was that? Perhaps if you post properly I'll take the
bother to actually read your post. If you haven't even enough sense
to figure out how to not **** up thread continuity though then you're
obviously not very bright, and as such you obviously don't have
anything intelligent to say.

--

Onideus Mad Hatter
mhm ¹ x ¹
http://www.backwater-productions.net
http://www.uncensored-inter.net


Hatter Quotes
-------------
"Freedom, true freedom, is nothing more than intellectual advantage over others."

"When I listen to people I don't really listen to what it is they're
saying, so much as what they're saying it for."

"Don't ever **** with someone who has more creativity than you do."

"You're only one of the best if you're striving to become one of the
best."

"I didn't make reality, Sunshine, I just verbally bitch slapped you
with it."

"I'm not a professional, I'm an artist."

"Usenet Filters - Learn to shut yourself the **** up!"

"Drugs killed Jesus you know...oh wait, no, that was the Jews, my
bad."

"The more I learn the more I'm killing my idols."

"Is it wrong to incur and then use the hate ridden, vengeful stupidity
of complete strangers in random Usenet froups to further my art?"

"Freedom is only a concept, like race it's merely a social construct
that doesn't really exist outside of your ability to convince others
of its relevancy."

"Next time slow up a lil, then maybe you won't jump the gun and start
creamin yer panties before it's time to pop the champagne proper."

"Reality is directly proportionate to how creative you are."

"People are pretty ****ing high on themselves if they think that
they're just born with a soul. *snicker*...yeah, like they're just
givin em out for free."

"How sad that you're such a poor judge of style that you can't even
properly gauge the artistic worth of your own efforts."

"Those who record history are those who control history."

"I am the living embodiment of hell itself in all its tormentive rage,
endless suffering, unfathomable pain and unending horror...but you
don't get sent to me...I come for you."

"Ideally in a fight I'd want a BGM-109A with a W80 250 kiloton
tactical thermonuclear fusion based war head."

"Tell me, would you describe yourself more as a process or a
function?"

"Apparently this group has got the market cornered on stupid.
Intelligence is down 137 points across the board and the forecast
indicates an increase in Webtv users."

"Is my .sig delimiter broken? Really? You're sure? Awww,
gee...that's too bad...for YOU!" `, )
 
Back
Top