OT: Re: Vulnerability Count

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Gary Nichols
Date:  
Subject: OT: Re: Vulnerability Count
--=-ueaGKYeamyGI0IALtkYN
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

LOL - hey anyone remember the backdoor that the author of (unnamed --
but you former C64 users know which one) BBS had so he could login and
shutdown unlicensed sites?    :-)


(not that I or any of my 12 year old friends at the time ran
unauthorized copies of any BBS software)

*wink*


On Sat, 2001-08-25 at 12:24, John (EBo) David wrote:
> Jason wrote:
> >=20
> > "John (EBo) David" wrote:
> > > observation. Now for which is the most secure: by what and whose
> > > criteria?
> >=20
> > When was the last time you saw a new remote exploit for software
> > written to run on an Apple 2 or a C64?
> >=20
> > (Yes, such things existed, just with dialup BBSes rather than TCP/IP..
> > )
>=20
> cool... I wonder if anyone could adapt CR to infect giga-pets!
>=20
> EBo --
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't p=

ost to the list quickly and you use Netscape to write mail.
>=20
> PLUG-discuss mailing list -
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>=20



--=-ueaGKYeamyGI0IALtkYN
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQA7h/wd1cz/R4p/ItoRAq34AJ9xP2XTRJpOy3TyUtINUR9m446YVQCgzIR6
RALIpHWe3VKgTojHk4HtrsI=
=OLCr
-----END PGP SIGNATURE-----

--=-ueaGKYeamyGI0IALtkYN--