lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003f01c4060a$c4d6af20$0100000a@MOTHER>
From: yossarian at planet.nl (yossarian)
Subject: Hey, ya! =))

Whats next - biometrics? You can only activate this virus if your DNA
contains a certain code?
----- Original Message -----
From: <jeremy@...tin.ibm.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Tuesday, March 09, 2004 4:12 PM
Subject: Re: [Full-Disclosure] Hey, ya! =))


> Quoting harry (Rik.Bobbaers@...kuleuven.ac.be):
> > chris@...tzert.com wrote:
> > > Looking  forward  for a response :P
> > >
> > >password -- 45015
> >
> > how sweet... a virus! ;)
> >
> > please stop ... :)
>
> I laugh everytime I see a copy of this one.
>
> Any virus that is inside a password protected zip file, and that
> requires the user to type in the password should never have made it to
> it's 2nd/3rd infection.  This one is social engineering at it's
> finest..  "Ooooh, a password, what's inside must be secret!"  :^)
>
> --
> Jeremy Kelley  <jeremy@...tin.ibm.com>    Threat Assessment Analyst
>  if my opinions were ibm policy, i'd have a waaay nicer office. :)
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ