[2014] in WWW Security List Archive
Re: Hacking a Personal Computer via E-mail
daemon@ATHENA.MIT.EDU (Fisher Mark)
Wed May 8 17:02:20 1996
From: Fisher Mark <FisherM@is3.indy.tce.com>
To: www-security <www-security@ns2.rutgers.edu>
Date: Wed, 08 May 96 07:52:00 PDT
Errors-To: owner-www-security@ns2.rutgers.edu
Rolf Weber writes in <9605080814.AA16983@spibm02>:
>another true story is that any protocol can be used to tunnel another,
>will say email can be used to tunnel for example telnet. but this requires
>help from inside.
Yeah, but the response time is a *killer*! From my old .signature:
"Just as you should not underestimate the bandwidth of a station wagon
traveling 65 mph filled with 8mm tapes, you should not overestimate
the bandwidth of FTP by mail."
Unfortunately, I can testify as to the latter...
======================================================================
Mark Leighton Fisher Thomson Consumer Electronics
fisherm@indy.tce.com Indianapolis, IN