lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2d6724810805210337x1fd048c8ke58e2f358d4316c4@mail.gmail.com>
Date: Wed, 21 May 2008 06:37:57 -0400
From: "T Biehn" <tbiehn@...il.com>
To: n3td3v <xploitable@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: pentagon botnet

Read the article, it strikes me that the good general has perhaps seen
die hard, and been reading things by Gadi Evron, one too many times.
Of course, this should, perhaps, satiate fears of our more paranoid
friends that the US has global control of all the internet, and can
shut anything down any time it wants, as apparently they are
blissfully ignorant.
They must cannibalize old desktop computers for the massive amount of
datacrunching that goes into sending SYN packets. Will they be using
PhatBOT-P3n74g0n.m0d???

I'd like to see more ads for the US Army's Internet Joint Strike
Hacker Force, maybe wearing army boots and installing ubuntu linux,
drinking surge and eating pizza pops. Hey army, will the new recruits
still be able to work from their mother's basements?

Well, another constructive FD post...

Warmest Regards,

Travis

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ