lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040201220159.4127142F39@maja.zesoi.fer.hr>
From: Bojan.Zdrnja at LSS.hr (Bojan Zdrnja)
Subject: sco.com -> slow? :)

 

> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com 
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of 
> Gary E. Miller
> Sent: Monday, 2 February 2004 8:43 a.m.
> To: full-disclosure@...ts.netsys.com
> Subject: Re:[Full-Disclosure] sco.com -> slow? :)
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Yo All!
> 
> On Sun, 1 Feb 2004, Thomas Zangl - Mobil wrote:
> 
> > Their headline is very true:
> > MyDoom vs SCO = 1:0
> 
> No one has mentioned yet that www.microsoft.com has gone 
> "lite".  There
> usual graphics heavy page is now almost all text.  All the better to
> withstand a "GET storm".  So I propose at the end of the 1st quarter:

Hmm, Microsoft's Web page looks all the same to me.

Besides that, I see no reason why Microsoft should do anything about MyDoom.
Only variant B tries to perform a DDoS against Microsoft's web site and that
variant didn't spread a lot (if at all - I didn't receive a single infected
message with MyDoom-B on a server which catches 60.000 MyDoom-A per day).

Bojan



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ