When it does, the computer's registers are examined to find ... Using randomly generated IP addresses, Slammer used the buffer overflow exploit to replicate itself. Within three minutes after ...