Blah, the difference is that the linux shell does * expansion i think.
hm, i still don't get it: the daemon has to answer to dir too, doesn't
he? the sole reason that ls is a unix utility does not make sense in
this context.
___
Full-Disclosure - We
On Tue, 16 Nov 2004 16:50:45 -0500, Esler, Joel - Contractor
[EMAIL PROTECTED] wrote:
I don't believe the SS would modify someone else's website. Hard to
believe.
Isonews.com anyone? :P
___
Full-Disclosure - We believe in it.
Charter:
heh, what kind of question is that, hash tables partition the data
into smaller tables that can be indexed by the hash of the string, so
you need to do only a few dereferences and maybe some compares if you
got collisions.
afaik a regexp needs to process every entry atleast once.
On Thu, 21 Oct
umm, when u code fake exploits, atleast code them so they _would_ work ;D
string = (char *) malloc(strlen(buffer)+20);
..
if(s = send(fd, string, sizeof(string), 0) 0)
sizeof(string) == 4 which would only send some love to the ftpd ;)
- Original Message -
From: [EMAIL PROTECTED]
To:
base,
there are virtual and physical offsets of each section)
upb
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html