So far, I've seen on this list three theories on what the perpetrators
call themselves (MGM/UA, ILF, PLA) and three theories on how they did
it (world read/write-mountable file system, sendmail, httpd). If I
were trying to get hard numbers for risk assessment, I'd be lost. Can
anyone identify someone personally involved in the details of the
incident, and produce a statement from them? Thanks,
Stephen P. Schaefer
My opinions are independent of those of my employer and my clients.