from Wikipedia, the free encyclopedia
Important information is missing from this article or section. Help Wikipedia by
researching and
pasting it .
Web links
Individual evidence
-
^ Jose Nazario: Defense and Detection Strategies Against Internet Worms. Norwood 2004, p. 49.
-
↑ heise online: Linux worm is obviously spreading rapidly. In: heise online. Retrieved March 2, 2016 .
-
↑ Slapper descendant, attacks computer through a hole in the SSL module "mod_ssl". Linuxvirus - Community Help Wiki, accessed January 25, 2017 .
-
↑ Worm: Linux / Slapper Description | F-Secure Labs. (No longer available online.) In: www.f-secure.com. Archived from the original on March 4, 2016 ; accessed on March 2, 2016 . Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice.
@1@ 2Template: Webachiv / IABot / www.f-secure.com
-
↑ heise online: Linux worm Lupper mutated. In: heise online. Retrieved March 2, 2016 .
-
↑ Linux / Hutizu-A - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center. In: www.sophos.com. Retrieved March 2, 2016 .
-
↑ Thieves Reaching for Linux— "Hand of Thief" Trojan Targets Linux # INTH3WILD - Speaking of Security - The RSA Blog and Podcast. (No longer available online.) In: Speaking of Security - The RSA Blog and Podcast. Archived from the original on August 15, 2013 ; Retrieved March 2, 2016 (American English). Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice.
@1@ 2Template: Webachiv / IABot / blogs.rsa.com