lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040129165534.5CDF86887F1@icebear.net>
From: peter at icebear.net (Peter)
Subject: Culprit Bio: Perfect Storm Averted or Just Ahead?

If I can believe the virus researchers www.microsoft.com is not going to be
a target.. 

MyDoom.B apperntly enters into you hosts file along with a lot of others
www.microsft.com with address 0.0.0.0
I think a DoS sending http GET requests to www.microsfot.com from that
machine is probably not going to reach microsoft.

Peter



-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Jos Osborne
Sent: donderdag 29 januari 2004 17:05
To: full-disclosure@...ts.netsys.com
Subject: RE: [Full-Disclosure] Culprit Bio: Perfect Storm Averted or Just
Ahead?

It's just SCO trying to gather publicity from the whole situation.

"Oh, look at us - we're under attack by an evil virus."

What's the bets they try to blame the open source community? Especially with
Microsoft also being the target for MyDoom.B

Jos


-----Original Message-----
From: Feher Tamas [mailto:etomcat@...email.hu]
Sent: 29 January 2004 15:45
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] Culprit Bio: Perfect Storm Averted or Just Ahead?


>Anyone with MyDoom author info, a reward is posted.

No honest person would take those 30 silver coins from SCO.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ