[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200307301944.h6UJi7PV096581@mailserver3.hushmail.com>
From: darren at hushmail.com (darren@...hmail.com)
Subject: Settle down there tiger (aka RPC IS DEVASTATING)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Come on Donald, settle down. You've only got a month before you head
back middle school. Get out in the sun a bit!
Weak argument? I don't believe I made any argument at all. I was merely
questioning your obvious flare for mellowdramatics and asking for a little
more detail.
"RPC IS DEVASTATING"? That's the best I've heard yet. :)
Have a nice day and I look forward to your next XSS vul,
Darren
PS. You speak English very well considering it's obviously not your native
tongue.
- ----- Original Message -----
From: <darren@...hmail.com>
To: <0day@...hackers.org>
Sent: Wednesday, July 30, 2003 5:37 AM
Subject: [0day] (no subject)
> -= 0day - Freedom of Voice - Freedom of Choice =-
>
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> And now for some questions:
>
> Was that a joke posting?
>
no joke
> If not, using your own words, what exactly makes this the 'worst root
> compromise'?
>
sheer number of currently vunerable systems.
period ( Windows XP )
> How does it compare to the Apache remote a year ago?
>
> How do you define 'better' and 'worse' in terms of compromise severity?
>
how many millions of consumers ran a unix server that ran Apache
?????????????
compared to the installed base of Microsoft 2K / XP systems... huh?
including the businessman who does his work at home.. etc etc etc
you do the math, on XP the compromize rate is nearly 100% ( English
SP 0
and 1 )
any one else care to do the math?
how about someone set up a test network at a fortune 500 company....
like
bowling for dollars
set em up.. knock them down, do it again, etc etc
so please take your weak argument to you next *niX/LuG/ bSd get together
and look at the real scope of the issue
not your weak attempts at an argument with me
Donnie Werner ( morning_wood )
_______________________________________________
0day mailing list
0day@...hackers.org
http://nothackers.org/mailman/listinfo/0day
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.3
wkYEARECAAYFAj8oIFsACgkQVkUxEVe6w3ud1QCeNxuMS1YRFvqYTA+qQ4U1qZZIn88A
oLQa8bkQu92eshvZdQ0d3wLyEPka
=mGXm
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists