Just reading up on my daily SlashDot and I noticed that in the Ask Slashdot column, someone said this:
<< "I am not an expert with internet worms like Code Red. However, I am curious if it would be possible to create a friendly worm/virus/whatever that would fight the original by using the same security holes. For instance, I read that Code Red II opens a back door. Why not have another virus that exploited the back door, closed it, then started sending itself to other servers for a certain period of time?" >>
What do you think of this? By the time I finished reading the article, the number of comments on /. went from 50 to around 240, so I stopped reading. I like the AT community more than the /. community anyway.
So what do you think?
<< "I am not an expert with internet worms like Code Red. However, I am curious if it would be possible to create a friendly worm/virus/whatever that would fight the original by using the same security holes. For instance, I read that Code Red II opens a back door. Why not have another virus that exploited the back door, closed it, then started sending itself to other servers for a certain period of time?" >>
What do you think of this? By the time I finished reading the article, the number of comments on /. went from 50 to around 240, so I stopped reading. I like the AT community more than the /. community anyway.
So what do you think?
