lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <29750000.1079732535@utd49554.utdallas.edu>
From: pauls at utdallas.edu (Paul Schmehl)
Subject: NEVER open attachments

--On Friday, March 19, 2004 02:27:53 PM -0500 VB <vb@...smart.com> wrote:

> NEVER open attachments
>
> So, why do these folks post attachments? Why is this even permitted? I
> would love to hear what these people have to say, but i cannot break my
> own rule to find out.
>
Fine.  I'll answer for them.  It's called PGP.  You might try looking it up 
some time.  They are PGP-signing their posts, and the sig comes across as 
an attachment.

Here - I'll copy Valdis' sig from his most recent post:

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQFAWzehcC3lWbTT17ARAvEAAKCpGKqvDH9GstlHpkhkWWEQR9QIDwCfYfBx
CYjkBP8/amWzuuu1JT2lAh0=
=DTsh
-----END PGP SIGNATURE-----

You might try using an MUA that actually understands this stuff.

Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu


Powered by blists - more mailing lists