From: Ka-Ping Yee (firstname.lastname@example.org)
Date: Thu May 11 2000 - 00:59:39 PDT
On Tue, 9 May 2000 email@example.com wrote:
> From: Seth McGann <firstname.lastname@example.org>
> Self-Replication Using Gnutella
> Team RAZOR - Seth McGann <email@example.com>
Most of the exploits described in this message involve
corrupting or replacing requested content. I believe such
problems can be largely eliminated if files are sought
according to a secure hash of their content, rather than
simply by name.
"This code is better than any code that doesn't work has any right to be."
-- Roger Gregory, on Xanadu
This archive was generated by hypermail 2b29 : Thu May 11 2000 - 01:08:46 PDT