lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: matthew at textbox.net (Matt) Subject: Apache 1.3.27 Remote Root 0-Day Funny you "make us look like a bunch of fuckin' schoolgirls" yet your email has no exploit in the body or as an attachment. Last I checked Schoolgirls know how to use web-based email... -- 404 <matthew@...tbox.net> Textbox Networks On Thu, 2003-06-19 at 22:55, koec@...hmail.com wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > I am posting this as a member of koec. The koec take no responsibility > for damages caused by this software, compile and use at your own risk. > By the way, the koec make you all look like a bunch of fuckin' schoolgirls. > > WHITEH8. > -----BEGIN PGP SIGNATURE----- > Note: This signature can be verified at https://www.hushtools.com/verify > Version: Hush 2.3 > Charset: UTF8 > > wkYEARECAAYFAj7yd6gACgkQsm8eq8rMuWpRMgCeLp6MigaRaPgx7BNbiZBZbqnJDZ8A > oICbg/GpTAitevZGcnKp8P7oEohn > =OEw+ > -----END PGP SIGNATURE----- > > > > > Concerned about your privacy? Follow this link to get > FREE encrypted email: https://www.hushmail.com/?l=2 > > Free, ultra-private instant messaging with Hush Messenger > https://www.hushmail.com/services.php?subloc=messenger&l=434 > > Big $$$ to be made with the HushMail Affiliate Program: > https://www.hushmail.com/about.php?subloc=affiliate&l=427 > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists