Re: [Full-Disclosure] Things that make you go Hmmm

2005-03-03 Thread Jason Coombs
verified the contents of the applications on your web servers? Are your customers safe from attacks? Are you un-knowing as to the status of your system automations such as updates and the current state of information flow out of the company? Whilst it is true from this point that Jason Coombs may

Re: [Full-Disclosure] Things that make you go Hmmm

2005-03-03 Thread Jason Coombs
is presented with variables and circumstances with which to contend, not a policy playbook to follow. I agree that it would be nice if we could schedule and plan all of our emergencies according to policy. :-) Cheers, Jason Coombs [EMAIL PROTECTED

Re: [Full-Disclosure] Things that make you go Hmmm

2005-03-01 Thread Jason Coombs
And you missed the part about my resume still indicating 'Director of Forensic Services' of PivX Solutions, and the other evidence of my affiliation with the company in the very recent past. There is something very wrong, and I'm doing the right thing. Regards, Jason Coombs [EMAIL PROTECTED

Re: [Full-Disclosure] Things that make you go Hmmm

2005-03-01 Thread Jason Coombs
-imaged. This makes me go Hmmm... Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: Mark Remington [EMAIL PROTECTED] Date: Tue, 1 Mar 2005 18:07:04 To:'Jason Coombs' [EMAIL PROTECTED], 'Burke N. Hare' [EMAIL PROTECTED] Cc:full-disclosure@lists.netsys.com Subject: RE

[Full-Disclosure] Seeking anyone harmed by PivX Solutions

2005-02-28 Thread Jason Coombs
Regarding PivX Solutions: I would like to make contact with anyone who has been harmed by PivX Solutions. If you have been harmed by PivX Solutions, please contact me as soon as possible. Thanks. Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure

[Full-Disclosure] Seeking anyone harmed by PivX Solutions

2005-02-28 Thread Jason Coombs
Regarding PivX Solutions: I would like to make contact with anyone who has been harmed by PivX Solutions. If you have been harmed by PivX Solutions, please contact me as soon as possible. Thanks. Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure

[Full-Disclosure] PivX Solutions

2005-02-25 Thread Jason Coombs
Regarding PivX Solutions, Anyone who has any information about PivX Solutions, please contact me as soon as possible. Thanks. Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure

Re: [lists] Re: [Full-Disclosure] Administrivia: List Compromised dueto MailmanVulnerability

2005-02-13 Thread Jason Coombs
to abandon a perfectly good key pair in favor of another. Regards, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] some interresting project i just stumbledacross...

2005-02-04 Thread Jason Coombs
What we really need is click-through contracts for e-mail messages. Somebody write an RFC, quick. -Original Message- From: Jeremy Bishop [EMAIL PROTECTED] Date: Fri, 4 Feb 2005 12:25:38 To:full-disclosure@lists.netsys.com Subject: Re: [Full-Disclosure] some interresting project i just

Re: [Full-Disclosure] PoC to be released on 01/20/05

2005-01-10 Thread Jason Coombs
. America still welcomes you, but it isn't going to save you from yourself. Regards, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread Jason Coombs
=SCOX%60 Regards, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-24 Thread Jason Coombs
Paul, In the case in point, even with the variables you mention, the entire technical problem can be reduced to observing how the election officials in various places have historically constructed ballots and influence just those that can be influenced in just those states where it will

Re: [Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-23 Thread Jason Coombs
. Teamed with the fact that partisan, interested voters are in charge of the process this is very plausible... Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: joe the expert (was Re: [Full-Disclosure] IE is just as safe as FireFox )

2004-11-21 Thread Jason Coombs
Anyone know how many cents of MSFT valuation are a direct result of and attributable to MVPs? I was lucky... I escaped before anyone threatened to make me into an MVP. -Original Message- From: Georgi Guninski [EMAIL PROTECTED] Date: Sun, 21 Nov 2004 22:01:12 To:Micheal Espinola Jr

[Full-Disclosure] University Researchers Challenge Bush Win In Florida

2004-11-18 Thread Jason Coombs
University Researchers Challenge Bush Win In Florida According to researchers at the University of California, Berkeley, counties with electronic voting machines were significantly more likely to show increased support for President Bush compared to counties with paper ballots or optical scan

Re: FW: [Full-Disclosure] Shadowcrew Grand Jury Indictment

2004-11-17 Thread Jason Coombs
to be something of a crime against humanity to begin with. Crimes against computers pose an unusually complicated ethics puzzle, and at times are clearly beneficial to everyone. Regards, Jason Coombs ___ Full-Disclosure - We believe in it. Charter: http

[Full-Disclosure] Airport x-ray software creating images of phantom weapons?

2004-11-16 Thread Jason Coombs
security as in any other industry. (Not) If quality is the true objective, then perhaps we should adopt exceptions to intellectual property laws to force into the public domain any creative work that has the capability to impact the security of anything important... Regards, Jason Coombs [EMAIL

Re: [Full-Disclosure] Advisory: Design flaw in human communication

2004-10-22 Thread Jason Coombs PivX Solutions
Hugo van der Kooij wrote: I would like to point out a design flaw in human communication. What you describe is an implementation bug, not a design flaw. FD'ers in particular also appear to have a Reply To All defect whereby every thought that enters one's head while reading FD is compulsively

[Full-Disclosure] Will a vote for John Kerry be counted by a Hart InterCivic eSlate3000 in Honolulu?

2004-10-20 Thread Jason Coombs PivX Solutions
and the eSlate3000, please contact me directly. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] RE: Disclosure policy in Re: RealPlayervulnerabilities

2004-10-09 Thread Jason Coombs PivX Solutions
0. (The primordial sin) The vulnerable product is released ... ... Vendors must work much harder to avoid releasing ... code ... Absolutely correct. Vendors who release code are the core problem. Vendors should not release code, they should release its source. Where this is not done,

Re: [Full-Disclosure] House approves spyware legislation

2004-10-07 Thread Jason Coombs PivX Solutions
they are causing to people. ... Just another terrible abuse of people's ignorance of complex technical subject matter like spyware and complex, highly-evolved, often arbitrary, social systems such as the law. Sincerely, Jason Coombs [EMAIL PROTECTED

Re: [Full-Disclosure] RE: Disclosure policy in Re: RealPlayer vulnerabilities

2004-10-07 Thread Jason Coombs PivX Solutions
of exposure and the Total Risk of Ownership needlessly. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Re: Images being pulled in Outlook 2003 even though don't download pictures is set?

2004-08-24 Thread Jason Coombs PivX Solutions
, Jason Coombs Director of Forensic Services PivX Solutions, Inc. [EMAIL PROTECTED] -Original Message- From: CHRIS GRABENSTEIN [EMAIL PROTECTED] Date: Mon, 23 Aug 2004 15:20:39 To:[EMAIL PROTECTED] Subject: RE: Images being pulled in Outlook 2003 even though don't download pictures is set

Re: [Full-Disclosure] Re: Anyone know IBM's security address? + Google Hack

2004-08-07 Thread Jason Coombs PivX Solutions
vulnerability in a closed-source software product. If you're not going to share it with the rest of us, please consider keeping it to yourself. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full

Re: [Full-Disclosure] Question for DNS pros

2004-07-25 Thread Jason Coombs PivX Solutions
not long ago. See: Forensic Data Validation and Integrity Logging http://www.ddj.com/documents/s=9207/win1069286014914/ Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: Paul Schmehl [EMAIL PROTECTED] Date: Fri, 23 Jul 2004 17:11:10 To:[EMAIL PROTECTED] Subject: Re: [Full

Re: [Full-Disclosure] Information Week: 2/3 of pros want immediate disclosure

2004-07-09 Thread Jason Coombs
to their customers without the global hacking community learning about that disclosure? Any answer other than No. would prove the respondant is not qualified to give answers to such questions. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We

[Full-Disclosure] [Fwd: A FINFlash from the Freedom to Innovate Network]

2004-07-09 Thread Jason Coombs
. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Re: [ISN] E-Mail Snooping Ruled Permissible

2004-07-06 Thread Jason Coombs
testimony is in court, and how little effort is put into clarifying the reality behind technical issues. When the parties stipulate to things that are not the truth, or when either side is technically inept, it causes courts to make errors. Then we end up with bad precedent. Sincerely, Jason

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-04 Thread Jason Coombs
that the end result was in fact beneficial to you. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Slowly down the drain

2004-05-19 Thread Jason Coombs
with a reason to worry that things might get worse. There's no reason to fear that our work here will be permanently upstaged by world geopolitical events -- and no reason that I can see to complain that the list hasn't excited you lately. Do something exciting. And cheer up. Sincerely, Jason

Re: [Full-Disclosure] KDE was hacked

2004-05-09 Thread Jason Coombs
a reasonable business practice? We know about hacking before it happens! Then you are complicit and should be prosecuted. Sincerely, Jason Coombs [EMAIL PROTECTED] Richard Johnson wrote: If you had been subscribed to our iAlert services, you would have known about this specific hacker threat

Re: [Full-Disclosure] Re: rfc1918 space dns requests

2004-03-16 Thread Jason Coombs
http://www.linuxsecurity.net/articles/network_security_article-5514.html martin f krafft wrote: Then again, I would be happy to be proven wrong. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Show me the Virrii!

2004-01-05 Thread Jason Coombs
of the biggest frauds going in the software industry. You really don't want to go there. Consider something useful instead: (from http://www.windevnet.com) Antivirus Software Turned Upside Down by Jason Coombs ([EMAIL PROTECTED]) Antivirus software exists because viral code and malware exist

Re: [Full-Disclosure] Bugtraq Security Systems XMAS Advisory 0001

2003-12-26 Thread Jason Coombs
John Sage wrote: I would respond, but I'm currently busy being dead. In case you need inspiration: The Voluntary Human Extinction Movement http://www.vhemt.org/ ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Jason Coombs
Aloha, Jim. What in particular makes it immediately clear to you why it was never published? Not publishing the book saves Microsoft from sending out conflicting messages when they launch new deceptive advertising campaigns like this one that will assert that Windows poses less of a security

Re: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Jason Coombs
Aloha, Russ! Honey attracts ants, and they're much harder to get rid of than are flies. Ants also set into motion that whole food web thing, bringing in larger and larger pests over time. You should allocate a few more CPU cycles to understanding the real reason that Microsoft has been nice to

Re: [Full-Disclosure] No Subject (re: openssh exploit code?)

2003-10-21 Thread Jason Coombs
Aloha, Mitch. Your essay on the immorality of releasing exploit code was very well thought out, and I commend you for it and for standing up for something that you believe in -- particularly in a venue that is openly hostile to your viewpoint. That having been said, your conclusions are

Re: [Full-Disclosure] No Subject (re: openssh exploit code?)

2003-10-21 Thread Jason Coombs
Aloha, Mitch. Your essay on the immorality of releasing exploit code was very well thought out, and I commend you for it and for standing up for something that you believe in -- particularly in a venue that is openly hostile to your viewpoint. That having been said, your conclusions are

Re: [Full-Disclosure] Re: [ISN] Technology Firm With Ties to Microsoft Fires Executive Over Criticism

2003-10-01 Thread Jason Coombs
article. Since you appear to be an ally of hers, perhaps you'll forward my comments to her personally. 10/1/2003: Jason Coombs says: Roberta has been so badly compromised by her own bias that she isn't aware that she completely missed the point of the report. The Microsoft monopoly is causing

[Full-Disclosure] Re: [ISN] Technology Firm With Ties to Microsoft Fires Executive Over Criticism

2003-09-29 Thread Jason Coombs
. There was a time in the past when there was little doubt that we had freedom. Freedom must be one of the costs of monopoly. CyberInsecurity: The Cost of Monopoly How the Dominance of Microsoft's Products Poses a Risk to Security http://www.ccianet.org/papers/cyberinsecurity.pdf Sincerely, Jason Coombs

RE: [Full-Disclosure] EXPLOIT : RPC DCOM (MS03-039)

2003-09-16 Thread Jason Coombs
FYI it's [EMAIL PROTECTED] not [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Elv1S Sent: Tuesday, September 16, 2003 9:53 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: [Full-Disclosure] EXPLOIT : RPC DCOM (MS03-039) RPC DCOM

RE: [Full-Disclosure] RE: Symantec wants to criminalize security info sharing

2003-09-11 Thread Jason Coombs
this potential for financial reward of malware authors. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Thursday, September 11, 2003 12:25 PM To: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] RE

[Full-Disclosure] RE: Symantec wants to criminalize security info sharing

2003-09-11 Thread Jason Coombs
is their reward but who instead have learned how to hack the stock market. All limits imposed on full disclosure of security vulnerability information serve the personal financial interests of the few at the expense of the many. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From

[Full-Disclosure] FW: Tim recommended you

2003-09-08 Thread Jason Coombs
Does anyone know of a law in any jurisdiction that allows us to lynch spammers? Maybe a few public executions would solve the problem. -Original Message- From: Sammie Dye [mailto:[EMAIL PROTECTED] Sent: Sunday, September 07, 2003 4:14 PM To: [EMAIL PROTECTED] Subject: Tim recommended you

RE: [Full-Disclosure] FW: Tim recommended you

2003-09-08 Thread Jason Coombs
study the history of spam and put a little effort once in a while into trying to stop it, just to really understand the most important generic truth about security of any kind (go ahead and quote me on this): Quash the threat here and it will pop up over there. Sincerely, Jason Coombs [EMAIL

[Full-Disclosure] Random SoBig.F Thoughts

2003-09-02 Thread Jason Coombs
Consider the following creative interpretation of the spread of SoBig.F -- 1. View each e-mail address found by the virus that it used to send forged e-mail (From:) as a universe of potential re-infection. 2. Consider that some electronic social circles are more or less clueless, and that

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-30 Thread Jason Coombs
of the MS Blaster.* alarm? Some people do leave the building when it's on fire, without waiting for an alarm to tell them to do so... A few of us will even pick up a fire extinguisher and put the small blaze out before it grows instead of running around spreading fear and panic. Sincerely, Jason

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-30 Thread Jason Coombs
of the MS Blaster.* alarm? Some people do leave the building when it's on fire, without waiting for an alarm to tell them to do so... A few of us will even pick up a fire extinguisher and put the small blaze out before it grows instead of running around spreading fear and panic. Sincerely, Jason

RE: [Full-Disclosure] Authorities eye MSBlaster suspect

2003-08-30 Thread Jason Coombs
of the MS Blaster.* alarm? Some people do leave the building when it's on fire, without waiting for an alarm to tell them to do so... A few of us will even pick up a fire extinguisher and put the small blaze out before it grows instead of running around spreading fear and panic. Sincerely, Jason

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-22 Thread Jason Coombs
the likelihood that the oblivious real end-user will be spewing non-spam, non-worm communications and getting themselves profiled and logged all over the place as the demonstrable temporary owner of the IP address in question during the time period of interest... Just think doubleclick. Sincerely, Jason

RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-22 Thread Jason Coombs
3. Do nothing If it 'aint broke, don't fix it. My vote is #3. The first time I heard about BugTraq it wasn't explained to me in terms of infosec and my reaction was that's the stupidest idea for a mailing list I've ever heard, a bunch of people whining about software bugs in programs they don't

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-21 Thread Jason Coombs
in order to manipulate the market price of certain A/V vendors' stock. You gotta love the free market... Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Nick FitzGerald Sent: Thursday, August 21, 2003 3:45 AM To: [EMAIL

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-21 Thread Jason Coombs
in order to manipulate the market price of certain A/V vendors' stock. You gotta love the free market... Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Nick FitzGerald Sent: Thursday, August 21, 2003 3:45 AM To: [EMAIL

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-21 Thread Jason Coombs
in order to manipulate the market price of certain A/V vendors' stock. You gotta love the free market... Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Nick FitzGerald Sent: Thursday, August 21, 2003 3:45 AM To: [EMAIL

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-20 Thread Jason Coombs
attachment -- it's the least he could do after intentionally covering up for these people. Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] RE: [ISN] The sad tale of a security whistleblower

2003-08-20 Thread Jason Coombs
to the extent that anyone else believes in it. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of InfoSec News Sent: Tuesday, August 19, 2003 2:10 AM To: [EMAIL PROTECTED] Subject: [ISN] The sad tale of a security

RE: [Full-Disclosure] MS should point windowsupdate.com to 127.0.0.1

2003-08-15 Thread Jason Coombs
a six figure boat anchor. Buy a seven figure yacht. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] east coast powergrid / SCADA [OT?]

2003-08-15 Thread Jason Coombs
I can't image that anything really important would be connected to the internet. Then again who knows right. remember that 'connected to the Internet' means, at a minimum, that the device communicates at some point in time with another device that had the ability to communicate with the

RE: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-14 Thread Jason Coombs
people of the opportunity for self-defense are complicit in acts of crime that exploit those secrets. Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] rpc worm

2003-08-14 Thread Jason Coombs
It appears that the exploit and bindshell portion of the msblast worm is vanilla, off-the-shelf oc192-dcom.c The only novel code is likely the scripted commands sent to the remote shell via port -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Jordan

RE: [Full-Disclosure] DCOM

2003-08-12 Thread Jason Coombs
Is this what you're seeing? 6 66.859375 BEFC2500 XEROX 00 MSRPC c/o RPC Bind: UUID 01A0---C000-0046 call 0x7F assoc grp 0x0 xmit 0x16D0 recv 0x16D0 67.30.174.214 WIN2KDEV IP Frame: Base frame properties Frame: Time of capture = 8/11/2003 9:25:11.405

RE: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-09 Thread Jason Coombs
Hmm. A lock is a permissive measure, to permit you to more easily enter a room, for instance, without having to destroy a portion of one of its four walls. The lock is installed in a door. The door is a vulnerability. The lock attempts to compensate for the door vulnerability. Without the lock

[Full-Disclosure] Call for discussion

2003-08-07 Thread Jason Coombs
, but without some automated mechanism to catalog everything that exists, the cost to build and maintain such things may keep the really valuable ones closed source indefinitely. Jason Coombs [EMAIL PROTECTED] -- Vendor coalition touts file validation plan as security measure The goal is to help

[Full-Disclosure] RE: [Full-Disclosure] ¿Bruce Schneir no intelligente?

2003-08-05 Thread Jason Coombs
I no think Bruce Schneir smart. This error made by kids. ¿Matt Murphy right? Bruce Schneier is plagued by the same vulnerability that plagues most of the industrialized world: employees. ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-Disclosure] Microsoft win2003server phone home

2003-08-04 Thread Jason Coombs
overflows to be mounted by a MITM, right? And surely you *must* realize that we can spend days making lists of known threats and *still* fail to identify *all* possible threats. No communication that crosses organizational boundaries should *ever* be automated. Least of all code updates. Jason Coombs

RE: [Full-Disclosure] Guideliens for Security Vuln reporting and response process

2003-08-01 Thread Jason Coombs
. Not that OISAFETY.ORG is going to disband because of my petty criticism and name-calling. They'll disband when people ignore them. Sincerely, Jason Coombs [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure

RE: [Full-Disclosure] Guideliens for Security Vuln reporting and response process

2003-07-31 Thread Jason Coombs
such Vulnerability Reporting and Response Process; but the economic interests of the few do not outweigh the interests of the many. We've already been down that path, and the result is Microsoft. Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED

RE: [Full-Disclosure] Microsoft wins Homeland Security Bid ( Reuters)

2003-07-16 Thread Jason Coombs
, and it has no place in government computing paid for by taxpayers. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Brad Bemis Sent: Wednesday, July 16, 2003 6:22 AM To: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure

RE: [Full-Disclosure] Microsoft wins Homeland Security Bid ( Reuters)

2003-07-16 Thread Jason Coombs
Hopefully, they wont learn the hard way like the FBI did (to a lesser extent) with CALEA. The CALEA device is based on Solaris, not Windows. The FBI's Carnivore (a.k.a. DCS1000) is based on Windows. http://www.epic.org/privacy/carnivore/ ___

[Full-Disclosure] Disclosure Debate FW: [ISN] When to Shed Light

2003-06-19 Thread Jason Coombs
full disclosure then what you are saying is that you want somebody else to tell you when you are safe. Good luck, you'll need it. Sincerely, Jason Coombs [EMAIL PROTECTED] IIS Security and Programming Countermeasures http://www.forensics.org/IIS_Security_and_Programming_Countermeasures.pdf

[Full-Disclosure] FW: FEEDBACK: Testing Microsoft and the DMCA

2003-04-18 Thread Jason Coombs
-Original Message- From: Jason Coombs [mailto:[EMAIL PROTECTED] Sent: Friday, April 18, 2003 4:58 PM To: [EMAIL PROTECTED] Subject: FEEDBACK: Testing Microsoft and the DMCA I'm an author and computer forensics/infosec expert who recently authored a book about information security

RE: [Full-Disclosure] Microsoft's new warning about the old SQL server/MSDE problem

2003-03-20 Thread Jason Coombs
I for one would really like to see patches that also patch an installer You'd think vendors would stop distributing software known to be vulnerable due to severe security flaws. After a critical vulnerability is disclosed publicly, the vendor should be legally liable for any damage caused by

[Full-Disclosure] AOL's Billion SPAM March on Cyberspace

2003-03-16 Thread Jason Coombs
issues. Sincerely, Jason Coombs [EMAIL PROTECTED] -- A Report on SPAM Blackholes, Blocking/Filtering, and AOL For the last month I have purposefully used AOL for SMTP server mail relay in order to analyze the real-world impact of blackhole lists. AOL not only does not block outbound SMTP from

[Full-Disclosure] A response to Bruce Schneier on MS patch management and Sapphire

2003-03-15 Thread Jason Coombs
-Original Message- From: Jason Coombs [mailto:[EMAIL PROTECTED] Sent: Sunday, February 16, 2003 10:31 AM To: Bruce Schneier Subject: RE: CRYPTO-GRAM, February 15, 2003 Aloha, Bruce. This is in response to your Crypto-Gram discussion of the Sapphire/SQL Slammer worm that struck

RE: [Full-Disclosure] Hackers View Visa/MasterCard Accounts

2003-02-19 Thread Jason Coombs
of merchants who are incompetent at risk management to begin with and just stop filling orders or choose to ignore orders where AVS doesn't report a full match. Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of David Barnett

[Full-Disclosure] Hackers View Visa/MasterCard Accounts

2003-02-18 Thread Jason Coombs
for the benefit of script kiddies -- anyone looked into this before? If so, will you share some references? Jason Coombs [EMAIL PROTECTED] -- Hackers View Visa/MasterCard Accounts Mon February 17, 2003 11:17 PM ET NEW YORK (Reuters) - More than five million Visa and MasterCard accounts

RE: [Full-Disclosure] Hackers View Visa/MasterCard Accounts

2003-02-18 Thread Jason Coombs
lucky for cc fraudsters, issuers opt to create cards in batches where all of the neighboring card numbers share the same expiration date (month/year). -Original Message- From: Kevin Spett [mailto:[EMAIL PROTECTED]] Sent: Tuesday, February 18, 2003 11:02 AM To: [EMAIL PROTECTED]; Richard

RE: [Full-Disclosure] [sean@donelan.com: Symantec detected Slammer worm hours before]

2003-02-13 Thread Jason Coombs
Whether or not DeepSight fielded a few nibbles from Sapphire before its first successful penetration occurred, one has to ask the question who cares? If DeepSight couldn't tell administrators that their boxes exposed a critical remote exploitable well-known buffer overflow vulnerability then what

RE: [Full-Disclosure] CERT, Full Disclosure, and Security By Obscurity

2003-01-30 Thread Jason Coombs
organization. It should be dismantled. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Len Rose Sent: Thursday, January 30, 2003 4:22 AM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] CERT, Full Disclosure

[Full-Disclosure] FW: Response to David Litchfield on Responsible Disclosure and Infosec Research

2003-01-29 Thread Jason Coombs
-Original Message- From: Jason Coombs [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 29, 2003 12:52 PM To: David Litchfield [[EMAIL PROTECTED]] Cc: [EMAIL PROTECTED] Subject: Response to David Litchfield on Responsible Disclosure and Infosec Research Aloha, David. Please continue

[Full-Disclosure] RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!

2003-01-27 Thread Jason Coombs
of infosec experts who would probably have agreed to write this worm if approached by their nations' government with proof that an adversary was planning to cause severe harm by exploiting the W32/SQLSlammer vulnerability. Sincerely, Jason Coombs [EMAIL PROTECTED

RE: [Full-Disclosure] Sapphire worm POC that fulldisclosure policies hurt everyone

2003-01-26 Thread Jason Coombs
Hogwash. When your box gets destroyed mysteriously and you call your vendor to ask why, you're going to be happy with the answer you don't need to know, and we're not going to tell you because it's a secret ?? Ridiculous drivel. But thanks for sharing. -Original Message- From: [EMAIL

RE: [Full-Disclosure] Sapphire worm POC that fulldisclosure policies hurt everyone

2003-01-26 Thread Jason Coombs
disclosure to decide which approach they prefer and follow it. Sincerely, Jason Coombs [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of [EMAIL PROTECTED] Sent: Saturday, January 25, 2003 1:10 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure

[Full-Disclosure] RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!

2003-01-25 Thread Jason Coombs
of a government agency as my speculation suggested. Jason Coombs [EMAIL PROTECTED] -Original Message- From: Richard M. Smith [mailto:[EMAIL PROTECTED]] Sent: Saturday, January 25, 2003 1:11 PM To: [EMAIL PROTECTED]; 'Jay D. Dyson'; 'Bugtraq'; 'Full-Disclosure' Subject: RE: MS SQL WORM IS DESTROYING