From owner-freebsd-security Wed Aug 12 11:55:49 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA19481 for freebsd-security-outgoing; Wed, 12 Aug 1998 11:55:49 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from anne.crossfields.com (anne.crossfields.com [205.241.85.170]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id LAA19472 for ; Wed, 12 Aug 1998 11:55:39 -0700 (PDT) (envelope-from pparri@crossfields.com) Received: from [207.43.27.33] (dial3.brazoria.tgn.net [207.43.27.33]) by anne.crossfields.com (8.8.8/8.8.5) with SMTP id OAA02223; Wed, 12 Aug 1998 14:06:22 -0500 (CDT) Message-Id: <199808121906.OAA02223@anne.crossfields.com> Subject: Re: UDP port 31337 Date: Wed, 12 Aug 98 13:59:14 -0500 x-mailer: Claris Emailer 1.1 From: Pat Parrinello To: "Brett Glass" , Mime-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >If someone's trying to BO you, they deserve worse. > >How about a daemon that sends fatal packets back TO the machine running BO? >I'm sure that these punks haven't protected their code adequately against >buffer overflows, etc. > >--Brett Yeah, right. "a daemon that sends fatal packets back TO the machine running BO" And now that BO is available for unix... your daemon is a great idea. Care to write one? :) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message