Peter Cordes wrote: > yeti:~$ grep 2064 /usr/share/nmap/nmap-services > distrib-net-losers 2064/tcp # A group of lamers working on a silly > closed-source client for solving the RSA cryptographic challenge. This is > the keyblock proxy port. > > It used to be s/losers/assholes/ and s/silly/stupid/, IIRC. I don't know > when it got toned down :) It's always funny when people leave their > opinions in their software. And I've seen more than one of those free web based port scanner utilities that run on nmap underneath reporting that exact output when it finds a server =) mike -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Lindsey Simon
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit ... Noah L. Meyerhans
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit ... Eric N. Valor
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Nathan E Norman
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Lindsey Simon
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Peter Cordes
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Eric N. Valor
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Peter Cordes
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed Lindsey Simon
- Re: [SECURITY] [DSA 045-1] ntp remote root exploit ... Noah L. Meyerhans

