lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: j.riden at massey.ac.nz (James Riden) Subject: Re: Jkuperus <jkuperus@...net.nl> "Vince Able" <we_hate_vince@...mail.com> writes: > Can anyone tell me why this idiot keeps trying to send the group > kiddies script worms/viruses. Even on a list like bugtraq, you're likely to get PoCs and worse sent - you probably shouldn't read a security list on a platform which you think may be vulnerable - e.g. use a UNIX flavour, or a MUA which you are sure won't auto-execute anything, or make sure your AV and patches are up-to-date (or all three :). Besides, most email-borne viruses forge the sender these days, so it's likely to have come from a different infected computer which has both the FD list and the purported senders addresses on it. Check the Received headers to find out exactly where it's originated. cheers, Jamie -- James Riden / j.riden@...sey.ac.nz / Systems Security Engineer Information Technology Services, Massey University, NZ. GPG public key available at: http://www.massey.ac.nz/~jriden/
Powered by blists - more mailing lists