lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <addc34c605042309406e5c5901@mail.gmail.com>
Date: Sat Apr 23 17:40:51 2005
From: nocmonkey at gmail.com (Danny)
Subject: Possible Virus activity

On 4/23/05, mcbain@....com <mcbain@....com> wrote:
> wanna take a bet?

I don't make bets with people that make tenuous claims that company
XYZ is ALWAYS this or that.

> take a look at my website.

I will tomorrow.

> I have created 0day and known script vulns couple times in my past.

I can believe this one.

> The most recent was a microsoft patch in feb with paul. see 
> http://www.eweek.com/article2/0,1759,1745693,00.asp 5th
> parapgraph down.

I read it, and it does not backup your statement that TrendMicro is
"...always way behind in virus def's, and was way behind in catching
script activity (unless they changed it now hell i would know)" and
TrendMicro "... are pathetically always behind."

If you are going to make such statements - back them up!

> I had trend micro in the past.

Cool.  

> It sucked for known virii let alone 0 day.

My cousin's sister's uncle's Ford Pinto had a muffler that sucked, so
based on your logic,  all Ford's suck?

> So who is the "assinine" now?

Sorry, I only speak English; "assinine" is not in the dictionary.  I
think you just answered your own question.

>  haha "becareful who u flame on FD U NEVER KNOW WHO YOUR TALKING TO"  >=]

Step away from your computer, Mike.  Take a walk.  Socialize.

...D

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ