by coder0xff on Wed Mar 25, 2009 3:27 am
Well, first I'd like to say that I find the article a little suspicious. Most of what they say is true. In fact, some of it is right off of the wikipedia article on the virus. However, the supposed "code" they show in the picture seems fabricated to me. Personally, I don't know any language in common use that has that syntax, even though very little of it was shown. Second, where did they get the source code? If it was decompiled - why is it commented, like where they said it contained comments about previous activation dates?
Anyway, if you're worried, it's easy to tell if your infected by earlier versions (prior to C) because automatic updates etc would be disabled. If you keep your computer up to date, you most likely don't have the vulnerability anymore. If you have a computer with Data Execution Prevention (specific to window$, in general it's called executable space protection) and it's ENABLED you were likely not vulnerable in the first place. It is designed to listen for traffic on a range of ports for instructions, which a firewall or router will prevent (unless you got it on DMZ or something ill advised).
In short - don't be a douche and make sure your computer is up to date, properly protected, and functioning correctly - automatic updates, antivirus, and system restore have not been disabled - and you'll prolly be just fine. If you're still worried, try linux, freeBSD, solaris, etc.