lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9d03f28f040703200646a16ab5@mail.gmail.com>
From: andre.ludwig at gmail.com (Andre Ludwig)
Subject: Successful in blocking all known exploits

Could it be because if it was a windows box it would have only have
been 876 min uptime instead of days?   ;)

ha ha

I just had to

Andre Ludwig CISSP

On Sat, 3 Jul 2004 22:55:20 +0200, Maarten <fulldisc@...ratux.org> wrote:
> On Saturday 03 July 2004 18:25, J.A. Terranson wrote:
> > On Sat, 3 Jul 2004, RandallM wrote:
> > > After a number of years, much thought,and  long nights I have developed a
> > > systematic method to prevent and thwart exploits on my system!
> > >
> > > NEVER REBOOT!
> > >
> > > I have been up and running for 876 days straight and have had no problems
> > > to date!
> >
> > Yeah, but what about Windowz boxes?
> 
> Hum, how did you guess he isn't talking about a windows box ?   8-))
> 
> --
> Yes of course I'm sure it's the red cable. I guarante[^%!/+)F#0c|'NO CARRIER
> 
> 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ