Full Disclosure mailing list archives
Re: Reverse engineering the Windows TCP stack
From: Tim <tim-security () sentinelchicken org>
Date: Thu, 24 Mar 2005 20:07:42 -0500
The win32 tcp stack was stolen from bsdNobody stole anything... read the BSD license
Last I read, the license requires credit be given where credit is due. Maybe I missed it, but I haven't ever seen that credit be given in the documentation shipped with Windoze. Otherwise, yeah, you are right. tim _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Reverse engineering the Windows TCP stack Vladamir (Mar 24)
- RE: Reverse engineering the Windows TCP stack Aditya Deshmukh (Mar 24)
- Message not available
- RE: Reverse engineering the Windows TCP stack Wade Woolwine (Mar 24)
- Re: Reverse engineering the Windows TCP stack Nicolas RUFF (lists) (Mar 31)
- Message not available
- RE: Reverse engineering the Windows TCP stack Aditya Deshmukh (Mar 24)
- <Possible follow-ups>
- RE: Reverse engineering the Windows TCP stack Kyle Quest (Mar 24)
- Re: Reverse engineering the Windows TCP stack Tim (Mar 24)
- Re: Reverse engineering the Windows TCP stack James Longstreet (Mar 24)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 25)
- Re: Reverse engineering the Windows TCP stack Thierry Zoller (Mar 25)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 25)
- Re: Reverse engineering the Windows TCP stack ADT (Mar 25)
- Re: Reverse engineering the Windows TCP stack Thierry Zoller (Mar 26)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 26)
- Re: Reverse engineering the Windows TCP stack Tim (Mar 24)
- Re: Reverse engineering the Windows TCP stack Georgi Guninski (Mar 28)
- Re: Reverse engineering the Windows TCP stack NSC (Mar 29)