Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed
On Thu, Apr 05, 2001 at 12:12:07PM -0700, Eric N. Valor wrote:
> Here's a useful URL I have bookmarked:
/usr/share/nmap/nmap-services lists unofficial port numbers that are in
yeti:~$ grep 2064 /usr/share/nmap/nmap-services
distrib-net-losers 2064/tcp # A group of lamers working on a silly
closed-source client for solving the RSA cryptographic challenge. This is
the keyblock proxy port.
It used to be s/losers/assholes/ and s/silly/stupid/, IIRC. I don't know
when it got toned down :) It's always funny when people leave their
opinions in their software.
#define X(x,y) x##y
Peter Cordes ; e-mail: X(firstname.lastname@example.org. , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE