lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040420224757.GA59349@netpublishing.com>
From: ggilliss at netpublishing.com (Gregory A. Gilliss)
Subject: Core Internet Vulnerable - News at 11:00

Anyone remember about five years ago (May 1998) the guys from the L0pht
crew got to go up to Capital Hill? Their (in)famous sound bite was that
they could (paraphrased) "take down the Internet in 30 minutes". Well,
fast forward to 2003 and now everyone knows how they could have done it.

Hi Mudge - quit laughing, dammit ;-)

G

On or about 2004.04.20 10:28:16 +0000, Crist J. Clark (cristjc@...cast.net) said:

> Does anyone know WTF they are trying to say in this AP article,
> "Core Internet Technology Is Vulnerable,"
> 
>   http://story.news.yahoo.com/news?tmpl=story&cid=562&ncid=738&e=1&u=/ap/20040420/ap_on_hi_te/internet_threat

<<SNIP>>

-- 
Gregory A. Gilliss, CISSP                              E-mail: greg@...liss.com
Computer Security                             WWW: http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ