I claimed it was very hard to get any significant advantage from this exploit, which is why I got tired of your lectures on proper virus creation which while demonstrating your expertise, you never successfully ever showed it to be of any particular significance in an attack. Therefore, hardly a "devestating" exploit as the author and you seem to have been implying.
As for the rest of your post, sorry, I don't need any advice from the NY Times on computer security, LOL.
Let's see how long it will be before there is a worm "in the wild" that exploits this security hole, and what kind of effect it has.
As for the rest of your post, sorry, I don't need any advice from the NY Times on computer security, LOL.
There's very little advice in the article, other than the standard "install a firewall". I cited it because I hoped it would help with your difficulty in understanding how "zombied" PC's are widespread, and can be used for all kinds of mischief -- including acting as a server to spread more email worms.