Conflicker Working Group - Lessons learned from Conflickerby ComputerWeekly.com
Published on: 01/31/2011
Conficker was malware intended to create a botnet. Until recently, botnet controllers would instruct malware to connect with a few dozen fixed domains in order to control the machines. As security experts improved and blocked these domains, the malware authors expanded their sophistication, targeting many more domains. With early versions of Conficker, the infected computer would reach out to 250 pseudo-randomly generated domains per day from eight Top Level Domains (TLDs) to attempt to update with new code or new instructions.
Trawling through an entire server?s worth of databases for one thing (or a collection of things) is never enjoyable. I?ve had to do this more than a few times when I knew some routine object was hiding in one database or another, but couldn?t... More...
Jun 1, 2010
I like to categorize the output of a business intelligence (BI) solution into three broad categories:visual output -- includes the reports, dashboards and scorecards that I?ll discuss in this article analytical output -- more interactive data... More...
May 25, 2010
Other content by this company