lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200308191503.23811.jeremiah@nur.net>
From: jeremiah at nur.net (Jeremiah Cornelius)
Subject: SCO Web Site Vulnerable to Slapper?

On Tuesday 19 August 2003 02:35 pm, Justin Shin wrote:
> No I think SCO deserves whatever is coming to them if they really are
> vulnerable, because they are a bunch of jackasses. I don't think anyone can
> disagree with me here.
>
> -- Justin
>

SCaldera.  Total BOZOs.  This vulnerability hat a CERT warning in 2000.  It 
was wild prior to that - longer than 0-day.

This is the "enterprise quality code" that Linux couldn't have success 
without?

Someone's gonna kneecap Darl, Chris and their big-boss Ray.
Their whole net is probably owned by now anyhow.

-- 
Jeremiah Cornelius, CISSP, CCNA, MCSE
Information Security Technology
email: jcorneli@...mail.com - mobile: 415.235.7689

"What would be the use of immortality to a person who cannot use well a half 
hour?"
--Ralph Waldo Emerson


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ