| http://www.w3.org/ns/prov#value | - If its NT, you will have to use one of the following methods to run the exploit (remember that running a program on a remote NT machine from a mapped network drive will launch it onto your computer).??? Run it with a Trojan such as Netbus or Back Orifice.??? Put the exploit in the cgi-bin directory if its a webserver, and request it with your browser.??? Use the scheduling (AT) command to run it - A
|