Re: Sendmail security holes..
Article: 7476 of alt.hackers From: email@example.com (ImAMoron) Newsgroups: alt.hackers Subject: Re: Sendmail security holes.. Date: Sat, 04 Mar 95 04:40:04 GMT Organization: What' that? Lines: 35 Approved: But of course Message-ID: firstname.lastname@example.org NNTP-Posting-Host: slc15.xmission.com X-Newsreader: News Xpress Version 1.0 Beta #3 Status: RO
In article <email@example.com>, firstname.lastname@example.org (Noone) wrote: }In article <email@example.com>, } firstname.lastname@example.org (Sam Trenholme) wrote: } }>soda.CSUA.berkeley.edu is not a Sparcstation. It is a Sequent Symmetry }>machine, running, I believe, 20 386-dx16 processors in paralell. } }Hmmm... I thought they were 20's... but I think you're right. } } }>ObNetJunkieHack: } } }>I then typed "cat > /dev/ttyd00" and typed in "AT s0=1" multiple }times, } }Generally it means that the xyplex is just overloaded... But that }works for }me. You might try sending the modems thier full init strings too. } }UNIXer *+* Yep... thier it goes again, whaddya thing SIGEV - Core Dump }means? Well, My turn to ask a stupid question. Why is UNIXer using a windoze front-end? Same one I'm using, but I'm starting to wonder what else it can do. ObMinorKillSpamHack: Have you figured out how to make it cancel a post when the originator used an invalid address? Regards, The Gentleman