lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5.2.1.1.2.20040204134948.02329340@m1.858.telia.com>
From: rootmoose at telia.com (Ake Nordin)
Subject: Email

At 04:04 2004-02-04 -0800, you wrote:
>I'm by no means a security expert nor do I want to be,
>but while I read this list at 3 am my mind wanders and
>I wish for someone from experience to explain to me
>why any virus can infect any mail server / user  when
>those administrating a mail server can make a mail
>server handle mail in the manner I pasted a snippet of
>from my own in-box.

The text for human consumption retained below was in
the mail from the outset, it has not been "transformed"
to something "harmless" by any intermediate mail relay.

It's just the beginning of a plain MIME BASE64 encoding,
your favorite mail client is all too well ready to decode
it back into executable format and run it, should you
decide to click on the attachment in the mail.

>The message cannot be represented in 7-bit ASCII
>encoding and has been 
>sent as a binary attachment.

Regards,


-- 
  .
 /Ake Nordin       +46704-660199       rootmoose@...ia.com
 Duston Sickler: "There are only 10 types of people in the
 world, those who understand binary and those who don't."


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ