-ray wrote: > On Wed, 27 Oct 2004, Will Hill wrote: > Well the PuTTY vulnerability needs a trojaned ssh server to work anyway. > I don't know why you break into a unix ssh server to hack windows boxes... > it'd be easier to just start with the windows boxes, hahaha.
Actually it needs only to spoof name resolution the way I read the warning. > > And if the ssh server i'm logging into is compromised, the Windows box > is the LAST thing i'm worried about. Kinda like in "Speed" after Keanu > crashed the guy's Jag then asked to borrow his phone, the guy says 'Take > the damn phone!'. > -- Scott Harney <[EMAIL PROTECTED]> "Asking the wrong questions is the leading cause of wrong answers" gpg key fingerprint=7125 0BD3 8EC4 08D7 321D CEE9 F024 7DA6 0BC7 94E5
