|
This usually happens when the user tries to open an
infected program, accesses an
infected disk or opens a file with an
infected macro or script attached to it.
[
en
INTROCOMP
]
Each worm thread will then inspect the
infected computer's time clock.
[
enHOW COMPUTER VIRUSES WORK ]
This attack would consist of the
infected systems simultaneously sending 100 connections to port 80 ((...))
[
enHOW COMPUTER VIRUSES WORK ]
MEP MCLH
20/03/2009
|
|
|