On Wed, 17 Nov 2004 17:49:12 -0600, Paul Schmehl wrote
>
> When you do an "ls", you are making a call that the *os* has
> to respond to. The os is *not* vulnerable, so it (properly)
> rejects the request as malformed.
i think i get it now. as someone else explained is "wildcard expansion"
also a
I want to say how flattered I am to have generated so much discussion
from my little 2600 article. I welcome all corrections and additions.
Information should be free!
=;^)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Wrangler - hijacking
Excuse me, but I take exception to the phrase "...making them expert
hackers and mailbox thieves" in the above cited story. Either you or your
editor has insulted the security community, whether you realize it or
not. Probably not the smartest thing to do for a journalist.
Either you have never be