References in periodicals archive ?
Once installed on a system, the worm modifies a registry key to ensure its execution on every system startup, and initializes a backdoor component made available through IRC, and awaiting orders in a specified channel.
The algorithm modifies treatment based upon age of the patient and the amount of laser energy that is delivered to the cornea.