lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 25 Jul 2008 23:16:18 -0500
From: Paul Schmehl <pschmehl_lists@...rr.com>
To: RandallMan <randallm@...mail.com>, full-disclosure@...ts.grok.org.uk
Subject: Re: DNS spoofing issue. Thoughts on
--On July 25, 2008 6:53:31 AM -0500 RandallMan <randallm@...mail.com>
wrote:
>
>
> Where might on find info on what to look for in a primary windows domain
> where we handle our internal DNS and SBC handles our external?
>
Just apply the Microsoft patches and you'll be fine. The patches make the
attack essentially impossible.
>
> =============================
>
> I top post, get over it.
>
I don't.
Paul Schmehl
If it isn't already obvious,
my opinions are my own and not
those of my employer.
Content of type "application/pkcs7-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists