“Remote Explorer installs itself on a Windows NT server, then
emulates the administrator’s level of security, so it has access to
all system-management tools and process controls. It infects the
network by multiplying without requiring user access. While most
viruses attach to a program or data file and don’t become active
until that file is opened or run, Remote Explorer runs on its
own.”
TechWeb: Intelligent Virus Surfaces On NT Servers
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis