|>All disassembly analasis made shows that it is a simplistic worm designed |>to |>break in, execute, and start sending itself out. No system damage or host |>embedding has been detected. The writer of the worm had no intentions of |>causing permanent damage. |> For now, seeing how effective this worm was how long do you think its going to take before there are many, many variations on this worm that *DO* have malicious code and backdoor the machine in a way that will survive a reboot. |>> |>It's really gone after a restart. |> For now :) Cheers Danny Network Security Engineer Drexel University Digital ID Print: 874f 1b77 470f 0b10 126e d8d2 c3a3 d52a 24ab 73c3 PGP Print: C6AD B205 E3C6 38AB 0164 6604 66F5 CCFC F4ED F1E0 PGP Key: http://akasha.irt.drexel.edu/danny.asc