On 6/13/06, Espen Grøndahl <[EMAIL PROTECTED]> wrote:
This could be used in a denial of service attack – or could be used to stop ( or at least annoy ) ssh bruteforcers J
no, the bruteforcers don't use ssh, but other programs that can be not affected by this _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
