...this would also be a good time to talk about what you should do,
to secure the other computers on your network when you find one has a worm or other malware...
...hmmm,let me think...maybe also kill the rest of windows installations/partitions left around?

Ok,besides the humouristic aspect of comparing *nix systems to win32...
I had encountered lots of Beagle/Bagle variants in file-sharing networks in the past...
these guys were making use of a pretty simple,
yet enough effective social-engineering trick,in order to disguise this crap...
they had filled the p2p networks with TONS of fake releases,
that had the word "fix" appended in their name...for example,
supposing that the search string's request was "
videotutorials-Xvid.HQ.rar",
there would also be listed a "
videotutorials.Xvid.HQ.fix.rar" as an option...
The first thought that would come to a user's mind,
is that the original archive had some kind of checksum corruption,
and that..."some nice guy out there",re-released a "corrected" version of it...
Haven't kept these samples unfortunately...maybe I should...
what I do remember though,is that say 80,or maybe even 90% of them,
were making use of PEiD sign fakers...yeah,sure...like this annoying stupid 'hack',
would made detection or analysis more difficult or so...

...excessive incoming connections trying port 5900...
I would bet this is last years' vnc-auth-bypass exploit scanning,
lots of bot sources have been modded with the addition of this feature...
Quite reasonable...after all,this was a pretty ridiculous exploit...
