lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Klinzer at gmx.de (Ferdinand Klinzer)
Subject: IRC DCC Exploit




Am Freitag, 17.10.03 um 15:23 Uhr schrieb Christian Lycos:

> 5)  And in which language people were made ?



It is writen in C i know it.


f.k


>
> As far as my little knowlege in Bio reaches, ppl are made in (out of) 
> DNS.
> This is a little nifty language which only consists of 4 elements.
> But dont nail me on this :).
>
> wfg
>
>
> ----- Original Message -----
> From: "Farrukh Hussain" <king@...ger.org>
> To: <Full-Disclosure@...ts.netsys.com>
> Sent: Friday, October 17, 2003 12:00 PM
> Subject: [Full-Disclosure] IRC DCC Exploit
>
>
>>
>> Hey,
>>       I want to know about DCC Exploit,
>>
>> 1)  What is Irc DCC Exploit ?
>> 2)  How it works ?
>> 3)  What is its Source/code ?
>> 4)  How to protect from this exploit ?
>> 5)  And in which language people were made ?
>>
>>       I am asking you about it because it is harmfull full, when i 
>> join
> channel i disconnected 4 times with Critical Error. so please reply me 
> as
> soon as possible. Thanks.
>>
>> Best Regards from,
>> Farrukh Hussain.
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.netsys.com/full-disclosure-charter.html
>>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ