lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200209251834.g8PIYTQ00248@mailserver4.hushmail.com>
From: gobbles at hush.com (gobbles@...h.com)
Subject: Fwd:

Gobbles think nunando is unstable.

Critisizm result in mail bomb.

If didnt scare gobbles the first 3 time what make you think it work
now?

How many abuse report will you ISP ignore?


from mail1.securitytimes.com (ns1.securitytimes.com [209.15.205.144]) 



----- Forwarded Message from root <root@...l1.securitytimes.com> -----
Return-Path: <cyrus@...p3.hushmail.com>
X-Sieve: cmu-sieve 2.0
Return-Path: <root@...l1.securitytimes.com>
Received: from smtp2.hushmail.com (smtp2.hushmail.com [64.40.111.32])
	by imap3.hushmail.com (Postfix) with ESMTP id 1D88A41AAA2
	for <gobbles_40hush_2ecom@...p3.hushmail.com>; Wed, 25 Sep 2002 11:32:26 -0700 (PDT)
Received: from mail1.securitytimes.com (ns1.securitytimes.com [209.15.205.144])
	by smtp2.hushmail.com (Postfix) with ESMTP id 717931A6C2
	for <gobbles@...h.com>; Wed, 25 Sep 2002 11:32:25 -0700 (PDT)
Received: by mail1.securitytimes.com (Postfix, from userid 0)
	id D66B8877; Wed, 25 Sep 2002 13:58:48 -0500 (CDT)
To: gobbles@...h.com
Message-Id: <20020925185848.D66B8877@...l1.securitytimes.com>
Date: Wed, 25 Sep 2002 13:58:48 -0500 (CDT)
From: root@...l1.securitytimes.com (root)






Get your free encrypted email at https://www.hushmail.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ