lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003a01c3611f$10253460$0100000a@yrpxb5>
From: yossarian at planet.nl (yossarian)
Subject: ::::: future happenings..

Well, basically, any OS on any platform will be vulnerable when people don't
upgrade - when people care to write a virus or worm for it. Thats why MS is
affected - why code for the few BeOS users? They might all three be on
holiday and the worm might dud.
At least we'll have enough bandwidth then. Kidding aside - worse worms can
be made, and probably will be. It is an arms race. Technically much worse is
possible. Whiping HDD is one thing, set track0=bad or reprogramming parts of
standard hardware might be worse - like going after a pentium4 processor or
the BIOS.


----- Original Message -----
From: <dhtml@...h.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Tuesday, August 12, 2003 9:01 PM
Subject: Re:::::: [Full-Disclosure] future happenings..


>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> > Just reading through how easily this worm (RPC/DCOM/MSBlast) is
spreading,
>
> > and how widespread it is, and the potential number of infected systems
> - - do
> > some of you lot think its feasible that sometime in the future someone
> will
> > release a worm that DOES completely wipe the hard disks or do something
> > equally nasty to its host AFTER sending itself on to 'x' recipients?
>
>
> Let us hope so as it will be the only way the people will ever learn
> to stop purchasing this product. Corps and individuals alike will finally
> see through the charade of this company's code.  The purchasing decision
> makers at Corps have far too long enjoyed the silent kickbacks, the las
> vegas hooker runs financed by the weasel sales teams of the company that
> churns out this code.  The hoodwinking of the IT dept. shall come to
> an end, when the likes of senior management and even the CEO at the top,
>  all can no longer find that kiddie porn they downloaded for their daily
> wank just the other day.
> -----BEGIN PGP SIGNATURE-----
> Note: This signature can be verified at https://www.hushtools.com/verify
> Version: Hush 2.3
>
> wkYEARECAAYFAj85OWgACgkQTAj0ZSCgbx7boACfarwZKw0vgSe6B4FYKXb6IeDAa0IA
> n0epylY7zc/aL5hbj8j0BYiLMTkN
> =vcaQ
> -----END PGP SIGNATURE-----
>
>
>
>
> Concerned about your privacy? Follow this link to get
> FREE encrypted email: https://www.hushmail.com/?l=2
>
> Free, ultra-private instant messaging with Hush Messenger
> https://www.hushmail.com/services.php?subloc=messenger&l=434
>
> Promote security and make money with the Hushmail Affiliate Program:
> https://www.hushmail.com/about.php?subloc=affiliate&l=427
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ