[cod] exploits

Mark J. DeFilippis defilm at acm.org
Tue Nov 1 08:20:52 EST 2005


It would be really hard to crash a single HTML page on a
patched apache server that does nothing else but run that
page.  The intention was well meaning.  If things go as
expected with COD2, it will have been a waste of money,
which was a lot less than 3 copies of COD2 for sure.
I will be glad to throw it away and let it expire.

Also on the positive side, I don't see any major disasters
popping up as we had with UO's linux binaries, which is
an excellent sign.

MD


At 01:47 PM 10/31/2005, you wrote:
>From: Geoff Goas <gitman at gmail.com>
>Subject: Re: [cod] exploits
>In-reply-to: <8CB128E2DC04974FBEEB9FAE8BD4755D01FF970D at ABGEX02E.abg.fsc.net>
>To: cod at icculus.org
>Reply-to: cod at icculus.org
>Message-id: <20c320390510311047k576c3b3bpa1c28bf3a7527ce8 at mail.gmail.com>
>MIME-version: 1.0
>Content-type: text/plain; charset=ISO-8859-1
>
>Original-recipient: rfc822;defilm at optonline.net
>
>not really crap steve, just letting everyone know why their server
>will be crashing.

S1,-------------------------------------------------------------------------------
Mark J. DeFilippis, Ph. D EE          defilm at acm.org
                                       defilm at ieee.org


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://icculus.org/pipermail/cod/attachments/20051101/05bfeddc/attachment.htm>


More information about the Cod mailing list