It Turned Out That The Worm Exploited Three Or Four Different Holes In The System.

HomeFortune CookiesMiscellaneous Collections

It turned out that the worm exploited three or four different holes in the
system. From this, and the fact that we were able to capture and examine some
of the source code, we realized that we were dealing with someone very sharp,
probably not someone here on campus.
-- Dr. Richard LeBlanc, associate professor of ICS, quoted in The Technique,
Georgia Tech's newspaper, after the computer worm hit the Internet

Related: