out of the ashes...

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: foodog@qwest.net
Date:  
Subject: out of the ashes...
Craig White wrote:

> > Glad to see it wasn't just me (not that I'm glad everyone
> > else didn't get mail, but...) Anyway, I think I've figured
> > out The Dark Secret: Microsoft is hosting the P.L.U.G. DNS
> > servers, right? ;-)
> ---
> You've been eating too many dogs...


Mmmm, chocolate dogs...

> > Since I'm here anyway; if'n you're running something older
> > than Bind 9.0.0 there are allegedly some shiny new holes
> > waiting to be exploited. So sayeth CERT anyway.
> >
> I remember arriving for an appointment at the Pointe at South Mountain and
> finding the parking lot full of Hooters babes in T-shirts and shorts (at
> least 200) - it was impossible to focus on any one in particular with so
> many out there. For the time being - there's lots of BIND targets for the
> script kiddies to practice on.


Nice imagery; a veritable herd... Anyway, blending into the
crowd "seems" safe for the moment. Suppose someone adds a
Bind exploit and some minor mods (stealth, for example) to
the Ramen worm? Very icky, very fast. ++ungood.

I'm practicing being a Worst Case paranoid in my free time.

Steve
--
Carpe cerevisiae