MG> Date: Fri, 6 Dec 2002 09:05:29 -0600 MG> From: Matthew Goade
MG> Wouldn't it be easy to design a worm around this? Yes. I'd be surprised if someone isn't doing that already... MG> I haven't been able to find any news on this exploit/vuln so MG> far... A skilled coder could probably create a fairly large MG> P2P RaQ war machine with this. Sadly, this happens frequently. Botnets traded on the underground... DDoS/spam systems activated by IRC commands... "h4x0r3d" systems storing credit cards and being used to "trade juarez" and "host pr0n"... it gets ugly. This isn't cause for panic -- "whatever you do, don't panic" is very sound advice -- but it is cause to keep one's guard up and be paranoid. Security 101. :-( Eddy -- Brotsman & Dreger, Inc. - EverQuick Internet Division Bandwidth, consulting, e-commerce, hosting, and network building Phone: +1 (785) 865-5885 Lawrence and [inter]national Phone: +1 (316) 794-8922 Wichita ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Mon, 21 May 2001 11:23:58 +0000 (GMT) From: A Trap <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Please ignore this portion of my mail signature. These last few lines are a trap for address-harvesting spambots. Do NOT send mail to <[EMAIL PROTECTED]>, or you are likely to be blocked. _______________________________________________ cobalt-security mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-security
