Js_orkut.a


 
Thread Tools Search this Thread
Special Forums Cybersecurity Malware Advisories (RSS) Js_orkut.a
# 1  
Old 12-25-2007
Js_orkut.a

To get a one-glance comprehensive view of the behavior of this malware, refer to the Behavior Diagram shown below.

Image This malicious JavaScript may be dropped by other malware. It may be hosted on a Web site and run when a user accesses the said Web site.
This malicious JavaScript searches for target recipients in a compromised Orkut account. It then sends a scrap object to its target recipients.

When an affected user views the said scrap object, this malicious JavaScript automatically executes itself by performing the same routine mentioned above. However, it can only execute when an affected user logs into an Orkut scrapbook to view the scrap object sent by this malicious JavaScript.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
GUPNP_CONTEXT_HOST_PATH(3)						 1						GUPNP_CONTEXT_HOST_PATH(3)

gupnp_context_host_path - Start hosting

SYNOPSIS
bool gupnp_context_host_path (resource $context, string $local_path, string $server_path) DESCRIPTION
Start hosting $local_path at $server_path. Files with the path $local_path.LOCALE (if they exist) will be served up when LOCALE is speci- fied in the request's Accept-Language header. PARAMETERS
o $context - A context identifier, returned by gupnp_context_new(3). o $local_path - Path to the local file or folder to be hosted. o $server_path - Web server path where $local_path should be hosted. RETURN VALUES
Returns TRUE on success or FALSE on failure. EXAMPLES
Example #1 Create new UPnP context and set host path <?php /* Create the UPnP context */ $context = gupnp_context_new(); if (!$context) { die("Error creating the GUPnP context "); } /* Host current directory */ gupnp_context_host_path($context, "./web", ""); ?> SEE ALSO
gupnp_context_new(3), gupnp_context_unhost_path(3). PHP Documentation Group GUPNP_CONTEXT_HOST_PATH(3)