lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <E924F679D556A345B865717377DCDFC4304AE7@ROKEMAIL.staff.ad.cqu.edu.au>
From: b.griffin at cqu.edu.au (Brad Griffin)
Subject: W2K source "leaked"?

 Hey all

I find these 'visions of doom' quite funny when stated on this list.
Wasn't full-disclosure started around the time MS, SF (or is that
Symantec) and others started secret squirrelling about exploits and
source code etc? 

> -----Original Message-----
> From: Byron Copeland [mailto:nodialtone@...cast.net] 
> Sent: Friday, February 13, 2004 2:44 PM
> To: Isaac Privett
> Cc: full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] W2K source "leaked"?
> 
> Well, in instances like this, however unfortunate, I think 
> this probably is only the beginning of mangled code we'll be 
> seeing. Anyone else have visions of mayhem as well?
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ