lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 11 Dec 2009 20:51:12 -0600
From: RandallM <>
Cc: funsec <>,
Subject: Re: stupid question again

On Fri, Dec 11, 2009 at 8:29 PM, <> wrote:

> On Fri, 11 Dec 2009 20:00:34 CST, RandallM said:
> > i am so sorry. I just don't understand this. Computer is infected. user
> has
> > DNS redirects to any and all site for help. Why can't the good guys use
> some
> > type of fast flux or url obfuscation to hide help standalone software to
> > down load and use?
> Hint - if you can find it, or the good guys software can find it, the bad
> guys software can *also* find it and disable the queries.
> Sure, if is really, but
> only till midnite, then you need to look at
> that's not going to help you get your machine disinfected, is it?
> Heck - the bad guys don't even need to know how it's generated - they can
> get a pretty good idea by just tapping into the DNS resolver library and
> looking for obfuscated names they don't fast-flux themselves.  Just tossing
> out www.anything, mail.anything, and maybe 3-4 others, and you're looking
> at a pretty damned good filter for the good-guys fast-flux sites.
GAWD I hate it when you all "might be right". But I still believe cause I

been great, thanks
a.k.a System

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists