lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <15533237421C6E4296CC33A2090B224A11C035@UTDEVS02.campus.ad.utdallas.edu>
From: pauls at utdallas.edu (Schmehl, Paul L)
Subject: FW: Last Microsoft Patch

	-----Original Message-----
	From: Curt Purdy [mailto:purdy@...man.com] 
	Sent: Wednesday, October 15, 2003 2:05 PM
	To: full-disclosure@...ts.netsys.com
	Subject: [Full-Disclosure] FW: Last Microsoft Patch
	
	
	Anybody else get this?  Looks legit, originating address is from
msnbc.com.  But can't believe even Microsoft would be this stupid after
the rash of trojan-attached "patch announcements" lately.  Plus all
security people have been saying that Microsoft would never email a
patch out.  Or are they thinking, "Send this out so all the stupid
people will click on this before they click on a real trojan?

	Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA  

	And you wonder why I don't care about certs???

	http://vil.nai.com/vil/content/v_100662.htm

	Paul Schmehl (pauls@...allas.edu)
	Adjunct Information Security Officer
	The University of Texas at Dallas
	AVIEN Founding Member
	http://www.utdallas.edu/~pauls/ 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031015/0f4c244f/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ