lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20030526062634.GP383@hal9000.halplant.com>
From: A.J.Caines at halplant.com (Andrew J Caines)
Subject: Ms Update Spoof - W32.gibe - NOTE:VIRUS ATACHED

Excerpt from list charter[1], "Posting Guidelines" section:

	"Attachments may be included if relevant or necessary
	 (e.g. PGP or S/MIME signatures, proof-of-concept code,
	 etc) but must not be active (in the case of a worm, for
	 example) or malicious to the recipient" 

Even if this was not against charter, sending a large binary over thirty
times as large as the message to every recipient on a mailing list is just
silly. Put the file on a web or FTP site and post the URL.


[1] I'd usually give the URL, but since it's at the bottom of every
    single list message, I'd think most folks can find it.

-Andrew-
-- 
 _______________________________________________________________________
| -Andrew J. Caines-   Unix Systems Engineer   A.J.Caines@...plant.com  |
| "They that can give up essential liberty to obtain a little temporary |
|  safety deserve neither liberty nor safety" - Benjamin Franklin, 1759 |

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ