This article is within the scope of , a collaborative effort to improve the coverage of WikiProject Computer Security computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start This article has been rated as
Start-Class on the project's quality scale.
Mid This article has been rated as
Mid-importance on the project's importance scale.
This article is supported by
(marked as WikiProject Computing Low-importance).
Things you can help
WikiProject Computer Security with:
Answer question about
Same-origin_policy Review importance and quality of existing articles
Identify categories related to Computer Security
Tag related articles
Identify articles for creation (see also:
Article requests) Identify articles for improvement
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
Find editors who have shown interest in this subject and ask them to take a look here.
It's a worm [ edit ]
It spreads using vulnerabilities and without end-user interaction; it is a worm. --
John Moser ( talk) 01:40, 1 November 2008 (UTC)
Changed the category from Trojan to Botnet as it does "spread without end-user interaction" but is also organized based on the bot herder needs
Utopiah ( talk) 12:03, 4 May 2009 (UTC)
Technical info [ edit ]
Media reporting on the capabilities of trojans and viruses is notoriously inaccurate. Can we get some real technical information on how this spreads and how it steals data?
Rhobite ( talk) 22:31, 1 November 2008 (UTC)
Oh yes we certainly can:
http://www.cs.ucsb.edu/~seclab/projects/torpig/torpig.pdf -- Hoary ( talk) 11:02, 4 May 2009 (UTC)
Didn't see this on the talk page, added it a bit earlier in the "External links" section of the page and cleaned it a bit
Utopiah ( talk) 11:58, 4 May 2009 (UTC)