|
Full Disclosure
mailing list archives
Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F )
From: Pat <hermens.p () gmail com>
Date: Tue, 22 Jan 2008 16:21:18 +1100
Very nice, and no, I will not resort to German. I think the point was made
in my original post.
How silly of me to overlook such common and simple (yes, albeit old)
technologies.
For those of you out there that are a bit lost and want to follow along at
home:
Make a simple file called uu.txt, enter the following into it:
begin 644 temp.txt
C+BXN9&\ () =V4@979E;B!N965D('1O(&=O('1O($=E<FUA;C\
`
end
and then run that through uudecode (You can google for that one!) and open
the resulting temp.txt
On 22/01/2008, reepex <reepex () gmail com> wrote:
On Jan 21, 2008 10:50 PM, Nick FitzGerald <nick () virus-l demon co uk>
wrote:
Think pre-MIME/Base64 and U should be able to suss it out...
nice aol speak noob ;)
it shar would be a pity if people didnt get this
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Eduardo Tongson (Jan 22)
(Thread continues...)
|