Yes, the whole concept of researchers hijacking malware is fascinating, especially since they did it by registering unregistered domains, and then spoofing as a C & C servers. It's a precarious ethical quandry. The Torpig is a Windows botnet. http://www.sophos.com/security/analyses/viruses-and-spyware/trojtorpiga.html Linux (and Mac) however are also adversely affected by botnets: http://lwn.net/Articles/222153/ On Tue, May 5, 2009 at 7:38 AM, Stephen P Rufle wrote: > > http://www.pcpro.co.uk/news/252353/hijacked-botnet-exposes-startling-online-habits.html > > Thought it was interesting in regards to security. I did not read the > pdf linked in the article, but it would be interesting to know what the > breakdown by OS is :). Or does it even matter if most info is actually > gotten through website exploits of some type. > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > To subscribe, unsubscribe, or to change your mail settings: > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > -- www.obnosis.com (503)754-4452 "Contradictions do not exist." A. Rand