http://www.securityfocus.com/infocus/1752
An in-depth comparison of how three different worms (Blaster, Slammer, and Code Red I/II) impacted networks once the external security was breached. This is a useful examination not only of the effects such malware has, but also on how to create a remedial plan.
Posted by jho at December 23, 2003 10:04 AM