lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat Mar 26 19:25:35 2005
From: wireless.insecurity at gmail.com (Vladamir)
Subject: Reverse engineering the Windows TCP stack

I am working on some examples, that you can hopefully replicate, I lost 
my Windows 2k Server disk, so just hold your horses!

Thierry Zoller wrote:
> Dear Vlad,
> 
> V> I never said it incorrectly behaved, I said it inconsistently behaves.
> I am sorry, you implied that.
> Quote Vlad: "BSD behaves <correctly>, why can't Windows?"
> 
> The negation of correcly is incorrectly, you should have said "bsd
> behaves consisteletly and windows does not"...
> 
> I doubt you are up to something accept to troll on this list, the name
> of the list is "full disclosure" not "We defy logic".
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ