lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <96BCCB62FB25F746A54214CBA0FB94A801F3A70C@syb-ny-exc1.net.sybari.com>
From: steve_scholz at sybari.com (Steve Scholz)
Subject: Multiple AV Vendor Incorrect
	CRC32BypassVulnerability.

Sorry but this was quarantined what ever it was you sent.

Steve Scholz
Corporate Sales Engineer-North America
Sybari Software, Inc.
631-630-8556 Direct
516-903-2464 Mobile

Email:  Steve_scholz@...ari.com

MSN IM:Steve_Scholz@....com (email never checked) 




-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of bipin
gautam
Sent: Friday, March 11, 2005 10:04 AM
To: full-disclosure@...ts.grok.org.uk
Cc: vuln@...unia.com; Steve Scholz
Subject: Re: [Full-disclosure] Multiple AV Vendor Incorrect
CRC32BypassVulnerability.

FILE QUARANTINED
----------------

Antigen for Exchange removed Body of Message since it
was found to be infected with Trivial virus.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ