lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040329124027.RNAM39251.fep02-mail.bloor.is.net.cable.rogers.com@BillDell> From: full-disclosure at royds.net (Bill Royds) Subject: Protected message If you know something about vulnerabilities, you would know that the from address in an email gives absolutely no indicator of the actual sender. The mail that you talk about came from host d57-41-116.home.cgocable.net:: Another cable user like you from Quebec. -----Original Message----- From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of 404 Sent: March 29, 2004 3:56 AM To: full-disclosure@...ts.netsys.com Subject: RE: [Full-Disclosure] Protected message -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - From malware.com at that =] - -----Original Message----- From: 1@...ware.com [mailto:1@...ware.com] Sent: Monday, March 29, 2004 12:47 AM To: Subject: [Full-Disclosure] Protected message Here is the file. In order to read the attach you have to use the following password: -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBQGfkmx2Q53cabNakEQL9LwCgtVyRvBELr2MvEwPaijzh+sOvjoIAn03W qEYGLnjHEDdTzOpAvrgHefVm =Fsyq -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists