on 16/7/02 10:40, Eagle at [EMAIL PROTECTED] wrote:

> That would be true for an automated worm, but the possibility of gaining
> remote access through an Apache (or BIND, or sendmail, or whatever)
> exploit still exists.  Even though the exact exploit might be different
> (it might not - I don't know with certainty), a buffer overflow is a
> buffer overflow.

Any chance you could explain a buffer overflow to us? (I'm hoping)

Thanks, Eric.


-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Macintosh? Get free email and more at Applelinks! 
<http://www.applelinks.com>

Reply via email to