lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4061960E.3050302@normanonline.co.uk>
From: luke at normanonline.co.uk (Luke Norman)
Subject: When do exploits get used?

 >   I wonder if anyone has actually newly connected to the Internet in the

> >last 6 months. Anybody buying a new XP computer that has a network
> >connection will be infected by MSBlaster and find their machines almost
> >unusable. People on this list would probably know how to disable the 
> reboot
> >for RPCS using the Service manager, but most home users would have no 
> idea
> >how to fix the problem. I wonder how many computers are sitting there
> >rebooting every few minutes because of blaster and no one knows what 
> to do.

I ran my laptop online, for a few hours in the evening, on a 56k modem 
(no firewall) for a week, using unpatched vanilla XP Home. No sign of 
any virus infection so far - I'm ditching the machine in a week or so, 
so I was wondering how quickly it would get infected - and, as far as I 
can tell (AVG), it hasn't been
Luke


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ