lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <87y8ifldqt.fsf@it029205.massey.ac.nz>
From: j.riden at massey.ac.nz (James Riden)
Subject: Re: Jkuperus <jkuperus@...net.nl>

"Vince Able" <we_hate_vince@...mail.com> writes:

>    Can anyone tell me why this idiot keeps trying to send the group
>    kiddies script worms/viruses.

Even on a list like bugtraq, you're likely to get PoCs and worse sent
- you probably shouldn't read a security list on a platform which you
think may be vulnerable - e.g. use a UNIX flavour, or a MUA which you
are sure won't auto-execute anything, or make sure your AV and patches
are up-to-date (or all three :).

Besides, most email-borne viruses forge the sender these days, so it's
likely to have come from a different infected computer which has both
the FD list and the purported senders addresses on it. Check the
Received headers to find out exactly where it's originated.

cheers,
 Jamie
-- 
James Riden / j.riden@...sey.ac.nz / Systems Security Engineer
Information Technology Services, Massey University, NZ.
GPG public key available at: http://www.massey.ac.nz/~jriden/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ