lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <02EB3ECB975E3148B5219F50BF0DD46A06C1@MAIL.kennedycapital.com>
From: jyowell at kennedycapital.com (jyowell@...nedycapital.com)
Subject: hello

Yeah, yeah... Thanks.  I realize I was infected.  Although I wouldn't
normally open any attachment I wasn't aware of, the email was from a very
trusted source that we receive attachements from regularly.  I apologize for
this mistake and cleaned the virus within 10 minutes of infection.  That 10
minutes was unfortunately much to long.

-Jeremy- 

-----Original Message-----
From: Gregh
To: Todd Burroughs
Cc: Jeremy Yowell; full-disclosure@...ts.netsys.com
Sent: 1/27/2004 5:26 AM
Subject: Re: [Full-Disclosure] hello


----- Original Message ----- 
From: "Todd Burroughs" <todd@...topia.com>
To: "Gregh" <chows@...mail.com.au>
Cc: <jyowell@...nedycapital.com>; <full-disclosure@...ts.netsys.com>
Sent: Tuesday, January 27, 2004 5:10 PM
Subject: Re: [Full-Disclosure] hello


> This is an unmoderated list.  Whatever you or anyone on the list
> (including trojan clicked on by ummm Windows user) gets sent.
> 
> I think it's quite amusing, at least we haven't seen a flood of them,
> sort of says something about the people on the list.
> 

I was having problems believing anyone on the list WOULD be infected.

Greg.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ