Hi! We are a group of 14 European, non-Jewish high school students who decided to write a nice worm. It's called Stuxnet. We have spent one year working one it.
We have collected 4 unreported bugs of Windows and 2 stolen certificates from our friends on the IRC. With these tools, it's simple to write a code that controls Siemens WinCC plants, especially in Iran. The WinCC software is pretty cute.
Our Russian friend brought the first USB stick with the executable files because his dad works for the Iranians. We will stop or make the Bushehr power plant explode when we need it.
But we like peace so we hope that if we inform the Iranian leaders about their risks and the Bushehr's citizens' risks in time, they will recognize Israel and donate a part of Iran to Israel, too.
This comment has been removed by the author.
ReplyDeleteIran arrests 'spies' after Stuxnet attacks on nuclear program
ReplyDelete... from Computerworld.com
Anatomy of Stuxnet
ReplyDelete... from Symantec
Bushehr project manager Jafari claims that only a few personal computers at the plant have been infected by Stuxnet
ReplyDelete... from World Tribune.com
Stuxnet is very good
ReplyDeleteIt is! This comment is a test of the nested structure of comments.
Deleteif you are true gives us parts of the source code
ReplyDeleteamr.thabet[at]student.alx.edu.eg
Why are you trying to attack another state's Nuclear power plant?
ReplyDeleteMy ass you even saw the code dude i saw its code its now openly available and it doesn't use windows bugs and it uses certificates and direct authentication of realtek sound stop junking around you could get your ass busted for this
ReplyDeleteIt didn't work with Blogger nested structure's import. What about now? This comment was added after the Blogger comments were imported to DISQUS.
ReplyDelete