lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1061268584.1811.76.camel@localhost>
From: r.fulton at auckland.ac.nz (Russell Fulton)
Subject: Fwd: Re: Administrivia: Binary Executables
	w/o Source

On Tue, 2003-08-19 at 13:24, Valdis.Kletnieks@...edu wrote:

> 
> (OK, so a pointer to a website is more desirable, but sometimes it just doesn't
> work as well - if it's a "We're being attacked by *this*" posting, there's no
> guarantee you're still on the air when people read it.  And there's the problem
> of knowing when to remove it from the website - some people might be on
> vacation and not see the note till 3 weeks from now...)

There are a *few* cases where binary attachments are appropriate.

How about attachments invoke automatic moderation  (i.e. any messages
with attachment get shunted to the moderator for approval).

-- 
Russell Fulton, Network Security Officer, The University of Auckland,
New Zealand.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ