This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||
|
It spreads using vulnerabilities and without end-user interaction; it is a worm. -- John Moser ( talk) 01:40, 1 November 2008 (UTC)
Media reporting on the capabilities of trojans and viruses is notoriously inaccurate. Can we get some real technical information on how this spreads and how it steals data? Rhobite ( talk) 22:31, 1 November 2008 (UTC)
We need to add a disclaimer that states that scammers are using this wiki page to deceive people to give them access to their computer.
72.208.75.136 ( talk) 05:13, 6 October 2017 (UTC)
This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||
|
It spreads using vulnerabilities and without end-user interaction; it is a worm. -- John Moser ( talk) 01:40, 1 November 2008 (UTC)
Media reporting on the capabilities of trojans and viruses is notoriously inaccurate. Can we get some real technical information on how this spreads and how it steals data? Rhobite ( talk) 22:31, 1 November 2008 (UTC)
We need to add a disclaimer that states that scammers are using this wiki page to deceive people to give them access to their computer.
72.208.75.136 ( talk) 05:13, 6 October 2017 (UTC)