| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | rooted |
CA>> Sure. Once you are 'rooted' the hackers can CA>> install/modify your system to be anything they CA>> want it to be. MA> So let me get this straight. First they penetrate my MA> fire wall then they somehow negotiate my spam filter MA> taking control of my computer and wreak havoc on the MA> internet. your fallacy is in thinking that your firewall doesn't have some way of being broken AND that you seem to expect everything to arrive as spam... are you aware of the slammer worm? what about code red or nimda? are you absolutely positive that your browser doesn't have some hole in it that simply visiting a website might bring something in? are you aware of the byteverify worm/virus? what about the stuff going around that uses the jscript.encode javascript method of hiding what it actually does? hello? )\/(ark* Origin: (1:3634/12) SEEN-BY: 633/267 270 @PATH: 3634/12 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.