Here is a couple of article about detecting Conficker. One from ZDNet and a related one from Informatik IV.
James P. Cottingham
[sup]I'm number 1,229!
I'm number 1,229![/sup]
James P. Cottingham
[sup]I'm number 1,229!
I'm number 1,229![/sup]