Full Disclosure mailing list archives

Re: -ADVISORY- % =Thu Mar 16 13:23:37 EST 2006= % Buffer Overflow in Microsoft Access


From: Valdis.Kletnieks () vt edu
Date: Thu, 16 Mar 2006 20:50:22 -0500

On Thu, 16 Mar 2006 22:43:04 +0100, "Christian \"Khark\" Lauf" said:

I know the owner. And it's definetly not an open proxy.

If you have read http://unixgu.ru/?go=tor you would have known, that
he's running a Tor Node on this machine.

And the *visible difference* between a Tor node and an open proxy, is what,
exactly? Other than it's harder to put a sniffer on the other side and see
where the traffic inbound to the proxy is coming from?

Attachment: _bin
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: