Have you guys heard why the LoveSAN/MSblast worm failed to launch a decent DOS attack on Microsoft?
Most media sources are saying that microsoft "thwarted" or "prevented" or even "stopped" the attack, but the real reason was outright stupidity by it's author.
The worm was told to attack http://windowsupdate.com (a redirect), NOT http://windowsupdate.microsoft.com!
:jawdrop:
All Microsoft had to do was remove the re-direct to the correct page for a few hours, and the whole thing blew over.
My two cents:
One: I'm not a worm or virus writer, but I'd at least check to make sure the URL was correct if I was going to spend a long time writing something. :roll:
Two: Don't give microsoft all the credit. They lucked out this time!