Jump to content

Talk:Code Red (computer worm)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by H2g2bob (talk | contribs) at 00:42, 29 November 2008 (wpp). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputing: Security Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
LowThis article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computer security (assessed as Mid-importance).
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

"It used the pattern NNNNNNNN..."

How did it use this pattern? --67.172.99.160 00:25, 23 November 2005 (UTC)[reply]
Looking at my own server logs from back then, it was using this long string of characters as the beginning of the query string (the part after the ? in the URL) to overflow the buffer. I'm updating the article to clarify this. Mpeg4codec 02:32, 2 January 2006 (UTC)[reply]
I explained the worm payload is the set of characters following the last 'N'. --_N_e_g_r_u_l_i_o 19:44, 3 October 2006 (UTC)[reply]