On Wednesday, March 17, 2004 5:57 PM [EST], william(at)elan.net
<[EMAIL PROTECTED]> wrote:
> I Just received this. I would like to check if others have received it
> and did it indeed come through nanog mailist:
>
>> Date: Wed, 17 Mar 2004 21:10:38 +
>> From: Deep Throat <[EMAIL PROTECTED]>
>
At 04:58 PM 17/03/2004, Alon Tirosh wrote:
I *think* I loaded the page in lynx before it got rate-limited, and lynx
flashed through a whole mess of fast redirects before faulting out. No
logs, unfortunately.
A safe way I find to examine potentially trojaned pages is via fetch (or wget)
fetch -o q
> From: william(at)elan.net [mailto:[EMAIL PROTECTED]
> I Just received this. I would like to check if others
> have received it and did it indeed come through nanog mailist
It came through NANOG, delivered from a Hotmail account that accepted it
from 198.26.130.36. Yes, that is a military IP,
On 17.03.2004 23:57 william(at)elan.net wrote:
And while the website was unavailable and the sender is being anonymous
(whichis against nanog list policies if this was sent through it), what I
do find worse is that they managed to do it so that [EMAIL PROTECTED] is not
added to "CC" (which if
possibly through nanog mail server
I Just received this. I would like to check if others have received it
and did it indeed come through nanog mailist:
> Date: Wed, 17 Mar 2004 21:10:38 +
> From: Deep Throat <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: Spamhaus Expo
I Just received this. I would like to check if others have received it
and did it indeed come through nanog mailist:
> Date: Wed, 17 Mar 2004 21:10:38 +
> From: Deep Throat <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: Spamhaus Exposed
>
> Disturbing information on one of the found