lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3D6CE217.6090007@snosoft.com>
From: dotslash at snosoft.com (KF)
Subject: Administrivia

That should have went to just Len and not the list I take it... I bet 
while on vacation you forgot about that brutal reply-to address.
-KF


ATD wrote:

>Len, 
>	I just got back from Greece.  Would you like my recon team to help you
>with any of these issues? If you have any ideas/needs please ask...  
>
>
>On Fri, 2002-08-16 at 08:57, Len Rose wrote:
>
>>The following IP's have been used to attack the list so far:
>>
>>210.90.247.95
>>211.35.78.36
>>216.241.164.234
>>211.155.243.99
>>202.108.119.186
>>80.48.107.254
>>211.234.92.6
>>200.193.46.18
>>142.176.152.106
>>63.203.134.106
>>63.229.231.25
>>211.251.108.122
>>65.121.80.1
>>206.74.35.50
>>66.87.93.107
>>200.189.163.7
>>66.105.71.168
>>216.235.32.129
>>132.229.228.228 << This one actually tried to break into the mail server. 
>>                   It's his Linux workstation at the Univ.
>>198.144.201.178 << This one actually tried to bypass mailman's "security".
>>
>>
>>_______________________________________________
>>Full-Disclosure - We believe in it.
>>Charter: http://lists.netsys.com/full-disclosure-charter.html
>>




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ