Monday, October 29, 2007

The next generation of smileys

That last version of smiley faces were full of adware and other undesirable attributes. I wonder if these new smileys are just as two-faced:

http://media.fastclick.net/w/pc.cgi?mid=154031&sid=15400

Hopefully someone is looking into this.

Monday, October 01, 2007

Storm - Largest Botnet

Network World has an article about Storm which they report is potentially the largest botnet in the world:

Storm

In another article they write:

The most important thing about Storm, and the point on which everyone seems to agree, is that it creates botnets. Once a PC visits an infected Web site and Storm is downloaded, the PC is considered compromised, which means it can be controlled by someone else without the user knowing it. Together these compromised PCs create botnets that can be used to covertly send spam, launch distributed denial-of-service attacks, or host Web sites that download more malware.

Storm FAQ

The thing I don't yet understand about Storm is exactly how to figure out your computer is affected with this malware since the file names change constantly and the hacker is constantly changing the way it works. Is there something in the way of network traffic that can pin down an affected machine? Is there some way to define this when someone clicks on a link and goes to your web site? Someone needs to look at it from this level to help nail this down. If someone could track when someone clicks on a web site that is infected and trace that back to the hosted web site and stop the problem there, that would help.