This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||
|
"It used the pattern NNNNNNNN..."
- How can we defend? Files fill with junk and no way see which is your work, which is your fault or external overflow.
- How did it use this pattern? --67.172.99.160 00:25, 23 November 2005 (UTC)
- Looking at my own server logs from back then, it was using this long string of characters as the beginning of the query string (the part after the ? in the URL) to overflow the buffer. I'm updating the article to clarify this. Mpeg4codec 02:32, 2 January 2006 (UTC)
- I explained the worm payload is the set of characters following the last 'N'. --_N_e_g_r_u_l_i_o 19:44, 3 October 2006 (UTC)
- Looking at my own server logs from back then, it was using this long string of characters as the beginning of the query string (the part after the ? in the URL) to overflow the buffer. I'm updating the article to clarify this. Mpeg4codec 02:32, 2 January 2006 (UTC)
there should be larger explanation on this worm —Preceding unsigned comment added by 80.79.152.130 (talk) 16:10, 9 May 2009 (UTC)
- @80.79.152.130 What is happening over there?!??!!??1!11?1?1! It's Cyan (talk) 03:52, 26 October 2023 (UTC)