lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <007101c37fbc$f4f03cf0$0201a8c0@cyber.god>
From: steve.wray at paradise.net.nz (Steve Wray)
Subject: new virus: (fwd)

For my own part, my ISP is filtering viruses out for
me, and they don't seem inclined to make exceptions...

(Its not as bad as some though; I have clients who
had PGP signed emails dropped by their ISP. But they
were able to pay the ISP to stop doing this...).

> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com 
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of 
> Peter Kruse
> Sent: Sunday, 21 September 2003 2:41 a.m.
> To: full-disclosure@...sys.com
> Subject: SV: [Full-Disclosure] new virus: (fwd)
> 
> 
> Hi Morning wood,
> 
> If we really need to post live samples to a list like this, I would
> suggest, we do the following. 
> 
> It would be a lot better if you in the future store these samples on
> your website and then drops in a URL instead. We have all already had
> way to many copies of this worm. It?s simply waste of bandwidth. 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ