Full Disclosure mailing list archives
RE: Reverse engineering the Windows TCP stack
From: "Aditya Deshmukh" <aditya.deshmukh () online gateway strangled net>
Date: Fri, 25 Mar 2005 07:06:49 +0530
AD> The win32 tcp stack was stolen from bsd
^^^^^^^^^^ Get your facts right.
Yes bsd lic was used so they dint actually steal it - but as it was 12 am when I send the mail so please excuse me for the mistake.. :) But I say in the lower lines in my that it was not copied properly. Now I will crawl back into my hole ________________________________________________________________________ Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Reverse engineering the Windows TCP stack, (continued)
- Re: Reverse engineering the Windows TCP stack Tim (Mar 24)
- Re: Reverse engineering the Windows TCP stack James Longstreet (Mar 24)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 25)
- Re: Reverse engineering the Windows TCP stack Thierry Zoller (Mar 25)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 25)
- Re: Reverse engineering the Windows TCP stack ADT (Mar 25)
- Re: Reverse engineering the Windows TCP stack Thierry Zoller (Mar 26)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 26)
- Re: Reverse engineering the Windows TCP stack Tim (Mar 24)
- Re: Reverse engineering the Windows TCP stack Georgi Guninski (Mar 28)
- Re: Reverse engineering the Windows TCP stack NSC (Mar 29)
- Re: Reverse engineering the Windows TCP stack Vladamir (Mar 24)
- Re: Reverse engineering the Windows TCP stack Thierry Zoller (Mar 31)