lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: niekbaakman at (Niek Baakman)
Subject: Super Worm

bipin gautam wrote:
> na... i don't think so, cauz EVEN general user have
> learnt BIG lesson from blaster!
> there could be a worm strike but......... BUT fairly
> harmful...
> my prediction anyways..
> bipin

Users *and* sysadmins haven't learnt anything from nimda/code red/sql slammer/blaster.
The majority will never learn, some don't care, some don't have the knowledge,
some don't even know that there are patches.

Niek Baakman

The greatest trick the devil ever pulled was convincing the world he didn't exist.
PGP KeyID: 0x65C28B9A   |    Fingerprint: 7A5301026E58CF3FACE7F2F0D82B854565C28B9A
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 187 bytes
Desc: OpenPGP digital signature
Url :

Powered by blists - more mailing lists