lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003b01c394b1$dd449f10$0a00000a@cs>
From: chriss_1979 at lycos.de (Christian Lycos)
Subject: IRC DCC Exploit

5)  And in which language people were made ?

As far as my little knowlege in Bio reaches, ppl are made in (out of) DNS.
This is a little nifty language which only consists of 4 elements.
But dont nail me on this :).

wfg


----- Original Message -----
From: "Farrukh Hussain" <king@...ger.org>
To: <Full-Disclosure@...ts.netsys.com>
Sent: Friday, October 17, 2003 12:00 PM
Subject: [Full-Disclosure] IRC DCC Exploit


>
> Hey,
>       I want to know about DCC Exploit,
>
> 1)  What is Irc DCC Exploit ?
> 2)  How it works ?
> 3)  What is its Source/code ?
> 4)  How to protect from this exploit ?
> 5)  And in which language people were made ?
>
>       I am asking you about it because it is harmfull full, when i join
channel i disconnected 4 times with Critical Error. so please reply me as
soon as possible. Thanks.
>
> Best Regards from,
> Farrukh Hussain.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ