lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040719164205.10880.h031.c007.wm@mail.alumni.princeton.edu.criticalpath.net>
From: mnv at alumni.princeton.edu (mnv@...mni.princeton.edu)
Subject: New MyDoom or Netsky variant?

FWIW:
Using NAV Pro 10.0.1.13, Virus Def's updated today, to
7/17/2004 defs.  Received 3 emails, 44kb attachment,
none detected as a virus.

BODY OF EMAIL:
The original message was received at Tue, 20 Jul 2004
11:21:16 +1200
from alumni.princeton.edu [(IP here varies each email)

----- The following addresses had permanent fatal
errors -----
<mnv@...mni.princeton.edu>

----- Transcript of session follows -----
  while talking to alumni.princeton.edu.:
>>> MAIL From:"Automatic Email Delivery Software"
<postmaster@...mni.princeton.edu>
<<< 501 "Automatic Email Delivery Software"
<postmaster@...mni.princeton.edu>...
Refused

ATTACHMENTS:
message.zip
letter.com
pni.zip

Subjects:
Test
<none>
Returned mail: Data format error

And a 4th, subject "Deliveryfailed" that just shows up
as garbage text in the body, webmail indicates
attachment present.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ