Re: Sendmail security holes..
Article: 7476 of alt.hackers From: imamoron@aol.com (ImAMoron) Newsgroups: alt.hackers Subject: Re: Sendmail security holes.. Date: Sat, 04 Mar 95 04:40:04 GMT Organization: What' that? Lines: 35 Approved: But of course Message-ID: 3j8qv4$amc_004@slc15.xmission.com NNTP-Posting-Host: slc15.xmission.com X-Newsreader: News Xpress Version 1.0 Beta #3 Status: RO
In article <3irudi$cj4_012@news.gmu.edu>, unixer@unix.xite.com (Noone)
wrote:
}In article <3irmns$p79@lll-winken.llnl.gov>,
} set@oryx.llnl.gov (Sam Trenholme) wrote:
}
}>soda.CSUA.berkeley.edu is not a Sparcstation. It is a Sequent Symmetry
}>machine, running, I believe, 20 386-dx16 processors in paralell.
}
}Hmmm... I thought they were 20's... but I think you're right.
}
}
}>ObNetJunkieHack:
}
}
}>I then typed "cat > /dev/ttyd00" and typed in "AT
s0=1" multiple
}times,
}
}Generally it means that the xyplex is just overloaded... But that
}works for
}me. You might try sending the modems thier full init strings too.
}
}UNIXer *+* Yep... thier it goes again, whaddya thing SIGEV - Core Dump
}means?
Well, My turn to ask a stupid question. Why is UNIXer using a windoze
front-end?
Same one I'm using, but I'm starting to wonder what else it can do.
ObMinorKillSpamHack:
Have you figured out how to make it cancel a post when the originator used an
invalid address?
Regards,
The Gentleman