lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4046A6E2.9040704@cs.curtin.edu.au>
From: maclenna at cs.curtin.edu.au (Alexander MacLennan)
Subject: Backdoor not recognized by Kaspersky

rm -rf /

that should do it

Nick FitzGerald wrote:

> Ron DuFresne <dufresne@...ternet.com> wrote:
> 
> 
>>>how about the smtp server simply rejecting mail from spoofed hosts ?
>>>as all the viruses generate spoofed hosts and it is very easy for any
>>>smtp server to do a dns lookup on the sending server, if the hostname
>>>/ ip address do not match reject the message.
>>
>>Finally some sanity marks this thread!
> 
> 
> "sanity"??
> 
> Care to define the "nearly foolproof" "spoofed hosts detection" 
> algorithm that will not have an unbearably high false-positive 
> rejection rate??
> 
> 
> Regards,
> 
> Nick FitzGerald
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> 
> 
> !DSPAM:4046a529202801981333611!
> 
> 
> 




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ