lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040201160912.7407dd33.grundig@teleline.es>
From: grundig at teleline.es (Diego Calleja)
Subject: MyDoom.B

El Sat, 31 Jan 2004 16:37:05 -0800 Daniel Spisak <dspisak@...mundane.org> escribi?:


> possible. Posting the virus to a URL on this list means it ends up on 
> the web archive which means it shows up in Google which means any Tom, 
> Dick, or Jane can download the live virus. So if you wish to help 

I have several dozens of that crap in my inbox folder. In fact, I bet
there're several dozens of then in *every* email account on earth. You don't
need to put it anywhere, just press the fscking "get new mail" button and you
have a free copy. It's plain stupid that McAffe is trying to stop people
putting them in a website for public research and full disclosure when
everybody have copies everywhere.

Unless they want to create the only vaccine for it of course. Like I'm
going to buy their product, anyway. 


Diego Calleja


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ