OT: Re: Vulnerability Count

Gary Nichols plug-discuss@lists.PLUG.phoenix.az.us
25 Aug 2001 12:27:25 -0700


--=-ueaGKYeamyGI0IALtkYN
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

LOL - hey anyone remember the backdoor that the author of (unnamed --
but you former C64 users know which one) BBS had so he could login and
shutdown unlicensed sites?    :-)

(not that I or any of my 12 year old friends at the time ran
unauthorized copies of any BBS software)

*wink*


On Sat, 2001-08-25 at 12:24, John (EBo) David wrote:
> Jason wrote:
> >=20
> > "John (EBo) David" wrote:
> > > observation.  Now for which is the most secure:  by what and whose
> > > criteria?
> >=20
> > When was the last time you saw a new remote exploit for software
> > written to run on an Apple 2 or a C64?
> >=20
> > (Yes, such things existed, just with dialup BBSes rather than TCP/IP..
> > )
>=20
> cool...  I wonder if anyone could adapt CR to infect giga-pets!
>=20
>   EBo --
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't p=
ost to the list quickly and you use Netscape to write mail.
>=20
> PLUG-discuss mailing list  -  PLUG-discuss@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>=20


--=-ueaGKYeamyGI0IALtkYN
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQA7h/wd1cz/R4p/ItoRAq34AJ9xP2XTRJpOy3TyUtINUR9m446YVQCgzIR6
RALIpHWe3VKgTojHk4HtrsI=
=OLCr
-----END PGP SIGNATURE-----

--=-ueaGKYeamyGI0IALtkYN--