lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Fwd: Re: Administrivia: Binary Executables w/o Source 

On Mon, 18 Aug 2003 21:12:42 -0300, Stephen Clowater <steve@...vesworld.hopto.org>  said:

> Personally,I think FD should bounce back any message with a binary
>  attachement to the poster. This is not a 0day exploit list, if you cant
>  compile it yourself, you shouldnt have the binary :)

OK.  Who on the list will 'fess up to having an *original* source to MS-Blaster?

:)

(OK, so a pointer to a website is more desirable, but sometimes it just doesn't
work as well - if it's a "We're being attacked by *this*" posting, there's no
guarantee you're still on the air when people read it.  And there's the problem
of knowing when to remove it from the website - some people might be on
vacation and not see the note till 3 weeks from now...)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030818/7ac7ae5f/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ