lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003e01c32256$2220e9a0$0100000a@yrpxb5>
From: yossarian at planet.nl (yossarian)
Subject: HEADS UP VIRUS BEING SPREAD one of our readers
 infected?

> Another option is for the list-serve software to remove all attached
> executable files from incoming messages it receives before the messages
> are blasted out to the world.  This is a good policy for any email list,
> but particularly important for a computer security list.

Well, if readers on this list have unprotected systems - they probably need
some practice ;-).
>
> FWIW, Outlook 2002 automatically discarded the Update880.exe file on my
> system, so I couldn't even look at it if I wanted to.  A password
> protected .ZIP file is the generally accepted standard for sending out
> malware samples.  However, I don't think malware is appropriate for this
> list.
>
> Richard  Smith
>

I do agree to an extent - but malware is what part of this list is about.
Dunno what appropriate means, my guess it is up to the list owners to
decide. Rather have an in-depth on the proggie, though.

yossarian


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ