OpenLink Software

Usage stats on Kak

 Permalink

an Entity in Data Space: 134.155.108.49:8890

The Kak worm spreads by using a specially crafted and invisible frame for the signature in Outlook Express. When this frame is loaded (when the email is previewed or viewed in the email pane), the worm's code launches due to a vulnerability in Outlook Express, and the worm then installs itself to the system. When the computer is booted on the first of any month between 6:00PM and 12:00AM, the worm displays a message saying "Kagou-Anti-Kro$oft says not today !" and when the message is cleared, the worm shuts down the system.

Graph IRICount
http://dbkwik.webdatacommons.org11
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] This material is Open Knowledge Creative Commons License Valid XHTML + RDFa
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Copyright © 2009-2012 OpenLink Software