on 16/7/02 10:40, Eagle at [EMAIL PROTECTED] wrote: > That would be true for an automated worm, but the possibility of gaining > remote access through an Apache (or BIND, or sendmail, or whatever) > exploit still exists. Even though the exact exploit might be different > (it might not - I don't know with certainty), a buffer overflow is a > buffer overflow.
Any chance you could explain a buffer overflow to us? (I'm hoping) Thanks, Eric. -- G-List is sponsored by <http://lowendmac.com/> and... Small Dog Electronics http://www.smalldog.com | Refurbished Drives | -- We have Apple Refurbished Monitors in stock! | & CDRWs on Sale! | Support Low End Mac <http://lowendmac.com/lists/support.html> G-List list info: <http://lowendmac.com/lists/g-list.shtml> Send list messages to: <mailto:[EMAIL PROTECTED]> To unsubscribe, email: <mailto:[EMAIL PROTECTED]> For digest mode, email: <mailto:[EMAIL PROTECTED]> Subscription questions: <mailto:[EMAIL PROTECTED]> Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/> Using a Macintosh? Get free email and more at Applelinks! <http://www.applelinks.com>
