-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Thursday 03 January 2002 11:14 am, Scott Harney wrote:
> Joey Kelly <looseduk@ductape.net> writes:
>
> eggdrop/irc stuff is notoriously hackable targetted kinda stuff. I
> would hesitate to assume that a packet sniff occurred to aquire
> access to that bot. Reading the note below, I'd be far quicker to
> assume that the eggdrop bot itself was compromised. Let's face it,
> eggdrop bot security holes are not real high on your average security
> priority list. do they even list such things on securityfocus.com ?
Is there a more secure IM server? Jabber, maybe? Is *IRC*
needed, or could any IM technology be used?
- --
+------------------------------------------------------------+
| Ron Johnson, Jr. Home: ron.l.johnson@home.com |
| Jefferson, LA USA http://ronandheather.dhs.org:81 |
| |
! "Fair is where you take your cows to be judged." !
! Unknown !
+------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE8NJXajTz5dS9Us5wRAr53AJ95tUtiDzo0Gk1DSp2EtPdWPMp6LQCeK79W
BXCOuXsKPoAzyccsfzH22DQ=
=RmCQ
-----END PGP SIGNATURE-----
___________________
Nolug mailing list
nolug@nolug.org
Received on 01/03/02
This archive was generated by hypermail 2.2.0 : 12/19/08 EST