lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: sbirl+full-disclourse at concept.ocis.temple.edu (S.A. Birl)
Subject: Re: Microsoft Update Loader msrtwd.exe

On Sep 3, Über GuidoZ (nospam-uberguidoz@...il.com.ns) typed:

UGZ:  Easy sparky. Maybe it isn't his choice that he cannot release the EXE.
UGZ:  It's entirely possible, in fact, quite likely, that some "higher up"
UGZ:  who knows dick about IT and viruses got scared and said "This cannot
UGZ:  be shared with anyone! If it doesm you'll lose your job". Just because
UGZ:  they are worried about their image or that the file might contain
UGZ:  sensitive data.
UGZ:
UGZ:  I have run into this situation MANY times. There is usually little you
UGZ:  can do about it as an IT staff member or a consultant. So the next
UGZ:  best thing - ask a group of people that might have a clue what's going
UGZ:  on, WITHOUT needing to see or analyze said file.
UGZ:
UGZ:  Sheesh, give the guy a break. The only pollution I've noticed lately
UGZ:  is rude comments.


Aye, Über is correct.

When I first posted, I didnt have the EXE.  When I did receive a copy of
the file, I was told I cannot sent it outside of the network.

Besides, Ive been on this list long enough to know that questions like
mine are asked from time to time.




On Thu, 2 Sep 2004 20:30:53 +0200 (CEST), A bitter Feher Tamas<etomcat@...email.hu> wrote:

> When the f*ck will people finally realize that it is NOT possible to say
> anything about a file without actually having the file?
>
> If you wanna know what the f*ck this or that file is, go to and feed that
> file here:
> http://www.kaspersky.com/scanforvirus
>
> Less than 50 chars to remember and you can stop polluting this list.
> Wow!
>
> Regards: Tamas Feher.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ