This method of security through obscurity will not prevent another
hacker from chaning the worm to use one of the modified versions of the
exploit which supports brute forcing. Nor does it trick Solar Eclipse's
scanner which actually overflows and checks to see if the server
response contains our data. All you did was waste your time. :)

peace,
core

-- 
    Charles Stevenson (core) <[EMAIL PROTECTED]>
    Lab Assistant, College of Eastern Utah San Juan Campus
    http://www.bokeoa.com/~core/core.asc



Reply via email to