_ _ _ _ _ _ _ _ _ _ _ _ _
It turned out that the worm exploited three or four different holes in the system. From this, and the fact that we were able to capture and examine some of the source code, we realized that we were dealing with someone very sharp, probably not someone here on campus. -Dr. Richard LeBlanc, associate professor of ICS, in Georgia Tech's campus newspaper after the Internet worm.
_ _ _ _ _ _ _ _ _ _ _ _ _
.--. |o_o | |:_/ | // \ \ (| | ) /'\_ _/`\ \___)=(___/
inxi -d