[Full-Disclosure] RE: Microsoft Baseline Security Analyzer not seeing KB887742 and KB88 6185 Correction

2005-02-16 Thread Joe Granto
is designed to complement the MBSA and the ODT for security update detection. Whenever MBSA or ODT cannot offer detection, we plan to release an Enterprise Update Scan Tool. Joe Granto, Senior Engineer Intel Engineering, MCI

Re: [Full-Disclosure] NAT router inbound network traffic subversion

2005-01-28 Thread Joe
and run the virus themselves. Most viruses are now also worms, they will attempt to spread both by email and by direct contact with unprotected machines. -- Joe ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure

[Full-Disclosure] Re: Possible apache2/php 4.3.9 worm

2004-12-21 Thread Joe Stewart
=allq=allinurl%3A+%22viewtopic.php%22+%22t%3D2580%22btnG=Search http://www.google.com/search?num=100hl=enlr=as_qdr=allq=allinurl%3A+%22viewtopic.php%22+%22p%3D6653%22btnG=Search If Google were to block this particular pattern of search request it would stop the spread of the worm for now. -Joe

Re: [Full-Disclosure] HOW TO BREAK XP SP2 POPUP BLOCKER: kick it in the nut !

2004-12-14 Thread joe smith
The pop-up does not work with all options relating to ActiveX set to disabled, but most user would not bother to disable it. Another reason to use another browser. J [EMAIL PROTECTED] wrote: Friday, December 10, 2004 Internet Explorer 6 on the gadget commonly known as Windows XP SP2 enjoys a

Re: [Full-Disclosure] amazon security contact

2004-12-01 Thread joe smith
search for B05D70 on amazon.com. Opps, Targets forgot to add description to the item. http://www.amazon.com/exec/obidos/ASIN/B05D70/ or you can get drug and hooker. http://www.target.com/gp/detail.html/?%5Fencoding=UTF8asin=0823916839

[Full-Disclosure] Network Sniffing

2004-11-30 Thread Crehan, Joe \(EM, ITS, Contractor\)
. So the question is more of a poll of what the best of the best use for there networks. M$ and *NIX cheap and free. Joe Crehan Customer Engineer GE Infrastructure Deskside Support Team GE Information Technology solutions, Inc. T 508-698-7567 F 508-698-6940 E [EMAIL PROTECTED]

Re: [Full-Disclosure] Network Sniffing

2004-11-30 Thread joe smith
netcat, ethereal a good list of tools. http://www.insecure.org/tools.html Unknown wrote: On Tue, 2004-11-30 at 14:43 -0500, Danny wrote: On Tue, 30 Nov 2004 13:39:02 -0500, Crehan, Joe (EM, ITS, Contractor) [EMAIL PROTECTED] wrote: Gentleman, I have been having all kinds of quirky

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread Joe Matusiewicz
the lady is writing on the board has some bearing here: hacked by realloc( -- Joe ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-24 Thread joe
changes will make every one happy both because there are some area that just can't be easily fixed and because some people will never be happy no matter what MS does. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-21 Thread joe
LOL, ok you have me on that one. It is something, but very little. :oD Joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: Frank Knobbe [mailto:[EMAIL PROTECTED] Sent: Saturday, November 20, 2004 11:54 AM To: joe Cc: [EMAIL PROTECTED

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-21 Thread joe
because they have a viable *nix alternative have this option now though there is still a discrepency in available commercial packages which I guess could cause an issue. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED

RE: Re: [Full-Disclosure] IE is just as safe as FireFox: Moved to Education

2004-11-21 Thread joe
. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Windows user privileges

2004-11-21 Thread joe
and every user is an administrator. Not on most; on every single one. I would say that is more the fault of the configuration than anything. Probably cheaper for the OEMs to do it that way from a educational perspective, they don't have to teach the user anything, just say go. Joe -- Pro-Choice

RE: joe the expert (was Re: [Full-Disclosure] IE is just as safe as FireFox )

2004-11-21 Thread joe
Windows books (as well as non Windows books such as popular books on DNS and other internet tech) that are available, including several MCSE study guides. Also tools from several large third party vendors such as Quest and SysInternals come from the minds of MVPs who are CTOs and developers. joe

RE: joe the expert (was Re: [Full-Disclosure] IE is just as safe as FireFox )

2004-11-21 Thread joe
Georgi, The may sound harsh, but the day I worry about proving my anything to you is the day after I decide to get the MCSE certification. Further, if I ever get to the point about worrying what you think, I will have to hang my 0 and 1 bits on the rack. joe -Original Message

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-20 Thread joe
Well if hacking Windows cold across a tcp/ip service such as web this may be helpful, but it doesn't require much more than that to figure out what the admin account is for a given machine. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-20 Thread joe
, the Shell is all of what you believe Windows is comprised of. joe [1] Don't get me started on MCSEs. As a whole I think they hurt Windows far more than any other thing. A bunch of people who feel they are experts in Windows because they took a couple of tests that 10 year olds could memorize

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-20 Thread joe
I agree with your initial comment, they can both be changed. I also agree they both do little. I don't agree that the hardcoding in the source does anything for you. -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED]

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-20 Thread joe
and say that the raised levels of access would be process only based, once that process completed, it would revert. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-19 Thread joe
to a completely different level if processing all intranet requests as well as internet requests. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Raoul Nakhmanson-Kulish Sent

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-19 Thread joe
a hydrogen tank by home though, that is perfect for driving around there as long as it handles everything else I need in that space. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: Georgi Guninski [mailto:[EMAIL PROTECTED] Sent: Thursday

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-19 Thread joe
so. :o) joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: john morris [mailto:[EMAIL PROTECTED] Sent: Friday, November 19, 2004 4:32 PM To: joe Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] IE is just as safe as FireFox Dear

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-17 Thread joe
what they are talking about and simply reiterate anything they thought they heard that might be bad that they heard from someone much brighter than them. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-17 Thread joe
, does it make it an ms toy as well? joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of stephane nasdrovisky Sent: Tuesday, November 16, 2004 8:39 AM To: [EMAIL PROTECTED

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-17 Thread joe
So are you saying you truly believe IE to be an integral part of the OS that without it the OS would not be useable or would fail entirely and believe MS implicitly or are you just trying to be a sassy PITA? -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-17 Thread joe
to be stripped down to very bare very basic pieces that disallows and extension or code execution. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric Paynter Sent: Tuesday

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-17 Thread joe
of them do everything right. joe -- Pro-Choice Let me choose if I even want a browser loaded thanks! -Original Message- From: Gary E. Miller [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 17, 2004 5:24 PM To: joe Cc: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] IE is just as safe

RE: [in] Re: [Full-Disclosure] IE is just as safe as FireFox

2004-11-15 Thread joe
on security is. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gregory Gilliss Sent: Sunday, November 14, 2004 12:39 PM To: [EMAIL PROTECTED] Subject: Re: [in] Re: [Full-Disclosure] IE is just as safe as FireFox One comment about XP2 - the company

RE: [Full-Disclosure] MSIE srcname property disclosure

2004-11-15 Thread joe
How is it an example? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Aitel Sent: Monday, November 08, 2004 9:49 AM To: Michal Zalewski Cc: Berend-Jan Wever; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] MSIE srcname property

RE: [Full-Disclosure] MSIE srcname property disclosure

2004-11-15 Thread joe
I don't know how your club works. Do you report to MS as well or just within your club that you charge people to be part of? Has MS responded to you if you did report it? What was their response that makes WINS a classic example? joe -Original Message- From: Dave Aitel [mailto

RE: [Full-Disclosure] XP vs 2K

2004-11-15 Thread joe
What in the event log is telling you Server service not running is causing your BSDs? I run that way on 4 out 6 XP machines here at home. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Monday, November 15, 2004 11:47 AM

RE: [Full-Disclosure] IE is just as safe as FireFox

2004-11-15 Thread joe
and then they or someone else starts bitching that MS isn't back porting the changes. Pick one or the other but keep in mind if things have to keep getting back ported, resources for that aren't moving us forward. I myself, would rather move forward. joe -Original Message- From: [EMAIL PROTECTED] [mailto

[Full-Disclosure] Troj/Banker-AJ

2004-11-11 Thread joe smith
Has anyone seen this in the wild? I'm looking for a sample for analysis. Please contact me off list. http://www.sophos.com/virusinfo/analyses/trojbankeraj.html http://news.com.com/Trojan+horse+spies+on+Web+banking/2100-7349_3-5448622.html?tag=nefd.top TIA J

[Full-Disclosure] Win32.Grams - E-Gold Account Siphoner

2004-11-06 Thread Joe Stewart
://www.lurhq.com/grams.html -Joe -- Joe Stewart, GCIH Senior Security Researcher LURHQ http://www.lurhq.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Windows Time Synchronization - Best Practices

2004-10-22 Thread joe
to tell if the time daemon is doing the right thing. Incorrect on all accounts except you are using SNTP and you still haven't shown a valid reason why that is bad. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gary E. Miller Sent: Thursday

Re: [Full-Disclosure] Will a vote for John Kerry be counted by aHartInterCivic eSlate3000 in Honolulu? - OT

2004-10-21 Thread Joe Hood
We can only pray that al-quaeda isn't as successful as they were in Spain. It would have seemed there was enough controversy in the news about the electronic voting machines for people not to use them but hey, people probably still use IE. It's interesting what is needed to sway a people. Joe

RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-21 Thread joe
previously posted and it is well under 128 characters and the web site reported: Password: not found! joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric Paynter Sent: Monday, October 18, 2004 1:32 PM To: [EMAIL PROTECTED] Subject: Re: [Full

Re: [Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-19 Thread Joe Random
On Mon, 18 Oct 2004 10:28:39 -0400, Clairmont, Jan M [EMAIL PROTECTED] wrote: Hire the burgler to secure your home, yeah right? Doh! Sheessh what a stupid idea? How is it a stupid idea? *Looks confused*. ___ Full-Disclosure - We believe in it.

[Full-Disclosure] Re: Stupid idea

2004-10-19 Thread Joe Random
On Tue, 19 Oct 2004 12:11:04 -0600, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Just wanted to help you out in no-flame mode. The reason no one hires known burglars to secure their homes is that the occupation of burglars is to break into buildings and steal things. If this still seems

Re: [Full-Disclosure] Re: Stupid idea

2004-10-19 Thread Joe Random
On Tue, 19 Oct 2004 17:52:54 -0400, Byron L. Sonne [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Carolyn Meinel! Hahaha... is she on this list? Nar, it was a private e-mail... :-) ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-18 Thread joe
on things and just run them. Whether they are done at the click or have to type in three passwords and hop on one leg doesn't matter, some people will just do it so they can see that picture of Brittany Spears or get those instructions on how to re-enable their account. joe [1] This can also be done

Re: [Full-Disclosure] EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability

2004-10-13 Thread Joe Stewart
, eEye says that the dunzip32.dll overflow is an issue for XP, yet I am unable to find dunzip32.dll on a stock XP SP1 system. Is it possible that the eEye release and the MS04-034 bulletin are talking about two separate issues? -Joe -- Joe Stewart, GCIH Senior Security Researcher LURHQ http

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-25 Thread joe
make the admins or coders switching (or just using in tandem) any better simply because they switched. -Original Message- From: Ron DuFresne [mailto:[EMAIL PROTECTED] Sent: Friday, September 24, 2004 11:25 PM To: joe Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: [Full

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
in disrepair and everyone blaming the weather instead of poor road building skills. In the meanwhile the Dept of Transpotation keeps hiring inexperienced road workers for some poor salary and using lowest bidder to build the roads and expecting them to miraculously get better. joe -Original

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
of people out there that just like to beat on MS regardless of what is said. joe -Original Message- From: Georgi Guninski [mailto:[EMAIL PROTECTED] Sent: Friday, September 24, 2004 10:47 AM To: joe Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Windoze almost managed to 200x

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
worked out the details of those functions. Anyway, many coders avoid them because they don't like working with 64 bit INTs. joe -Original Message- From: Barry Fitzgerald [mailto:[EMAIL PROTECTED] Sent: Friday, September 24, 2004 10:15 AM To: joe Cc: [EMAIL PROTECTED] Subject: Re: [Full

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
, it was a matter of the resetting the tick count for the application. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Frank Knobbe Sent: Friday, September 24, 2004 11:01 AM To: Barry Fitzgerald Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
of implication implies to me is the vendor knew how to code UNIX apps and didn't know how to code Windows apps. I think you are absolutely incorrect on why the reboot was needed. It wasn't to clear memory, it was to reset the system counter so that gettickcount doesn't overflow the DWORD. joe

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
for it. :o) joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Frank Knobbe Sent: Friday, September 24, 2004 10:09 AM To: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11 On Fri, 2004-09-24 at 06:21

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
count for the application itself. If it is because the app is eating all the memory up, that is one hellacious memory leak they need to work on in the app. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michal Zalewski Sent: Friday, September 24

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
to throw out and redo. On the MS puppet piece, you once again have no clue of what you speak. joe -Original Message- From: Georgi Guninski [mailto:[EMAIL PROTECTED] Sent: Friday, September 24, 2004 3:58 PM To: joe Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Windoze almost

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
) many times in the past when manipulating 64 bit numbers associated with QueryPerformanceCounter would have been overkill. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of bashis Sent: Friday, September 24, 2004 3:35 PM To: [EMAIL PROTECTED

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
dealt in the newsgroups with another vendor who ran into the exact same problem with clock(). The issue is no or incomplete understanding of basic data types. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michal Zalewski Sent: Friday, September 24

RE: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread joe
that. That function can't return more than 49.7 days without breaking every app that currently uses it. MS can not do that. That is why there is another function to get the info with a different datatype. See my other posts. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL

Re: [Full-Disclosure] unknown backdoor: 220 StnyFtpd 0wns j0

2004-09-23 Thread joe smith
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KIBUV.BVSect=T Ryan Sumida wrote: I've been finding a few compromised Windows systems on our campus that have a random port open with a banner of 220 StnyFtpd 0wns j0. All the systems seem to be doing SYN scans on port 445 and

Re: [Full-Disclosure] unknown backdoor: 220 StnyFtpd 0wns j0

2004-09-23 Thread joe smith
You can try scanning it if you have the file. http://virusscan.jotti.dhs.org Ryan Sumida wrote: Thank you all for the help, I definitily appreciate it. The last system I checked had ftp running on port 15708 which makes me believe it is not the WORM_KIBUV.B but a similar variant. Sorry for

Re: [Full-Disclosure] [VirusTotal] Scan result (fwd)

2004-09-03 Thread joe smith
Unless for (a purely theretical) example the website would use your submission to infect others Right, that is what I'm concern about. I do not know the intension of virustotal.com, and their policy on binaries they received. The parent site (http://www.hispasec.com/) does not offer more

Re: [Full-Disclosure] Microsoft Update Loader msrtwd.exe

2004-09-02 Thread Joe Stewart
server.exe 2004/08/29 - 2004/08/30 nortoanavap.exe 2004/08/29 - 2004/09/02 syswin32.exe 2004/08/30 - 2004/09/02 rsvc32.exe 2004/08/30 - 2004/09/02 vsmons.exe 2004/08/31 - 2004/08/31 winsrv.exe 2004/09/02 - 2004/09/02 sslwina.exe 2004/09/02 - 2004/09/02 winxpini.exe -Joe -- Joe Stewart, GCIH

Re: [Full-Disclosure] [VirusTotal] Scan result (fwd)

2004-09-02 Thread joe smith
Does anyone have more information about http://www.hispasec.com/; who runs virustotal. I don't feel comfortable sending binary to some company that I have no information about. J bashis wrote: Thx for the tip with VirusTotal guys! =) Here is the result. /bashis Forwarded message: From

Re: [Full-Disclosure] Microsoft Update Loader msrtwd.exe

2004-09-01 Thread Joe Stewart
with the same exe name. I've also seen other Rbot variants using a similar registry key name. Kaspersky does a pretty good job of spotting unknown Rbot variants with a generic signature Backdoor.Rbot.gen. -Joe -- Joe Stewart, GCIH Senior Security Researcher LURHQ http://www.lurhq.com

Re: [Full-Disclosure] Microsoft Update Loader msrtwd.exe

2004-09-01 Thread joe smith
You can run it through http://www.virustotal.com and if it catch anything. J S.A. Birl wrote: Hello all: Recently discovered a trojan(? - possibly a virus) called msrtwd.exe. It's listed in the Registry as Microsoft Update Loader Does anyone know anything about this? Google doesnt offer much.

RE: [Full-Disclosure] MSInfo Buffer Overflow

2004-08-30 Thread joe
I think at best you could succeed in crashing the process or executing code in the context of the user running msinfo32. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of E.Kellinis Sent: Monday, August 30, 2004 11:17 PM To: [EMAIL PROTECTED] Subject:

RE: [Full-Disclosure] Windows Update

2004-08-25 Thread joe
would be surprised to hear a number greater than 15-20% but I am taking a wild guess. The folks that don't want auto-updates are probably of the more technical realm so they shouldn't have tremendous issues disabling the updates. joe -Original Message- From: Über GuidoZ [mailto

RE: [Full-Disclosure] Windows Update

2004-08-24 Thread joe
afterward. No big hoo hoo. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Barry Fitzgerald Sent: Monday, August 23, 2004 4:35 PM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Windows Update It's a little bit more

RE: [Full-Disclosure] Windows Update

2004-08-23 Thread joe
of choice in how things can be deployed, I certainly wouldn't want to be railroaded into a single methodology like you misunderstand WU to be. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Darren Reed Sent: Monday, August 23, 2004 6:52 AM To: Security

RE: [Full-Disclosure] The 'good worm' from HP

2004-08-22 Thread joe
that wouldn't be nearly as new and daring. They could do a good thing by making it fully supported by a big name, stable, quick, and part of an overall framework for protecting the network environment. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf

RE: [Full-Disclosure] Windows Update

2004-08-22 Thread joe
the next worm type attack and see if XP SP2 is safer we can't for sure say anything. If the biggest issues end up requiring some sort of people interaction, then that is quite a win in and of itself. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf

RE: Re[2]: [Full-Disclosure] Security aspects of time synchronization infrastructure

2004-08-20 Thread joe
breaking here, so you focus on authentication which would fall on kerberos. joe [1] I am still not entirely confident would occur, I think the downstreams would reject the time source but have no solid testing to prove this. -Original Message- From: 3APA3A [mailto:[EMAIL PROTECTED

RE: [Full-Disclosure] Windows Update

2004-08-20 Thread joe
on the launch so they can get some testing done and if necessary get a registry change in place to block WU auto updates of SP2 until later. You obviously still can manually go download it. It will not be available for Pro on WU until at least 8/25/2004. joe -Original Message- From: [EMAIL

RE: [Full-Disclosure] Microsoft Windows XP SP2

2004-08-19 Thread joe
machines patched as possible. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Thursday, August 19, 2004 11:35 AM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] Microsoft Windows XP SP2 Let's commence by giving credit

RE: [Full-Disclosure] Security aspects of time synchronization infrastructure

2004-08-19 Thread joe
trusts and non-MS kerberos clients unless they have the Vintela or Centrify *nix/Win integration software (or other software configured to do the same) that forces a timesync with the Forest. If you would prefer to discuss offline, that is fine as well. Thanks, joe -Original Message- From

RE: [Full-Disclosure] lame bitching about xpsp2

2004-08-18 Thread joe
maintain customers by making a better product, that certainly is a monopoly and hurting the consumers. THEY MUST BE STOPPED! joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Barry Fitzgerald Sent: Tuesday, August 17, 2004 2:34 PM To: joe Cc: [EMAIL

RE: [OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-18 Thread joe
the license and said NFW. There is open source outside of GNU. Nothing GNU has/does would have helped with the issues I had with source I shared. Thanks, joe -Original Message- From: Barry Fitzgerald [mailto:[EMAIL PROTECTED] Sent: Wednesday, August 18, 2004 11:56 AM To: joe Cc: [EMAIL

RE: [Full-Disclosure] RE: [Full-Disclosure]MS should re-write code with security in mind. lame bitching about xpsp2

2004-08-18 Thread joe
I think you meant your first line to be All OS vendors should bite the bullet and re-write their code with security in mind. Not sure why you singled MS out for that statement. Especially considering the rest of the post. joe -Original Message- From: [EMAIL PROTECTED] [mailto

RE: [Full-Disclosure] lame bitching about xpsp2

2004-08-17 Thread joe
again, what are your specific gripes about XP SP2? Did it work for you when you loaded or not? Do you even have a Windows machine to load it on to have an opinion? joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of ktabic Sent: Tuesday, August 17

RE: [Full-Disclosure] SP2 is killing me. Help?

2004-08-17 Thread joe
at to see what it is doing is a good thing, having source so you can modify it to suit your needs is less so. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of ktabic Sent: Tuesday, August 17, 2004 12:22 PM To: [EMAIL PROTECTED] Subject: Re: [Full

RE: [Full-Disclosure] lame bitching about xpsp2

2004-08-16 Thread joe
I am trying to figure out from all of your posts if you are just a troll or truly think you are saying something that can help. You complain about the past and then complain about SP2 in the same breath like you are saying, I don't like what they did, so I don't like what they will ever do. This

RE: [Full-Disclosure] lame b!tching about xpsp2

2004-08-16 Thread joe
people that their Windows machine is more secure with it than without it. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of devis Sent: Friday, August 13, 2004 11:39 PM To: Joshua Levitsky; Full-disclosure Subject: Re: [Full-Disclosure] lame b

RE: [Full-Disclosure] lame bitching about xpsp2

2004-08-16 Thread joe
- From: devis [mailto:[EMAIL PROTECTED] Sent: Monday, August 16, 2004 3:23 PM To: joe; Full-disclosure Subject: Re: [Full-Disclosure] lame bitching about xpsp2 joe wrote: ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full

RE: [Full-Disclosure] SP2 is killing me. Help?

2004-08-12 Thread joe
do both. There will be issues, no one writes perfect code. No one will EVER write perfect code. Doesn't matter if it some guy in his basement working on some open source project or some guy in Building 41 on Microsoft's Redmond Campus working on an MS OS kernel. joe -Original Message

Re: [Full-Disclosure] (no subject)

2004-08-09 Thread joe smith
Kaspersky detect it as I-Worm.Bagle.al Todd Towles wrote: I am seeing a lot of them too. Just had a call from my e-mail people. I have one that is new_price.zip (5KB) There appears to be some people on FD that are infected and we are getting a lot on my end. -Original Message- From: [EMAIL

RE: [Full-Disclosure] SP is here (soon) !

2004-08-06 Thread joe
XP SP2 Final is up on MSDN Downloads for the MSDN Subscribers. English and German as of right now. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Marc Rees Sent: Friday, August 06, 2004 12:59 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure

[Full-Disclosure] New IE patch

2004-07-30 Thread joe smith
Perfect timing for System Admin Day, a new IE patch http://www.microsoft.com/technet/security/bulletin/ms04-025.mspx ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Re: Automated SSH login attempts?

2004-07-29 Thread joe smith
you can decompile using REC. http://www.backerstreet.com/rec/rec.htm Andrei Galca-Vasiliu wrote: By the way, you have to be root to use ss: [EMAIL PROTECTED]:~/ssh$ ./go.sh 82.77.45 scanning network 82.77.*.* usec: 3, burst packets 50 using inteface eth0 ERROR: UID != 0 Intr-un mail de pe data

Re: [Full-Disclosure] Automated SSH login attempts?

2004-07-27 Thread Joe Hickory
. if anybody wants to analyse the data, contact me offlist. joe -- 250 MB Mailbox, 100 FreeSMS/Monat, 1000 MB Online-Festplatte Jetzt GMX TopMail kostenlos testen http://www.gmx.net/de/go/topmail ___ Full-Disclosure - We believe in it. Charter

RE: [Full-Disclosure] IE

2004-07-20 Thread joe
IBM doesn't actually offer support or at least didn't when we spent 18 months researching it last couple of years. I consulted for a company that was looking at IBM heavily because the current CIO previously worked for IBM. The 18 months was spent going over the various offerings and statements

RE: [Full-Disclosure] How big is the danger of IE?

2004-07-08 Thread joe
http://www.kb.cert.org/vuls/id/713878 The link above is the advisory that theregister is talking about. I know it is unusual for theregister but they seemed to have missed a hefty part of the whole advisory when reporting it. Here is the specific section: III. Solution Until a complete

RE: [Full-Disclosure] How big is the danger of IE?

2004-07-08 Thread joe
applications thereby more easily putting them together (instead of saying building a spreadsheet in excel working on formatting it, print it separate, then take a word doc and print it separate and then collate the sheets together). Thanks, joe -Original Message- From: [EMAIL PROTECTED] [mailto

RE: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-07 Thread joe
on the VT-52 when I handed it in. I always had a feeling he didn't really know what he was reading when looking at code, especially MASM, that was the final proof. :o) joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Horsfall Sent: Wednesday, July

RE: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-07 Thread joe
any companies we were friendly with that we knew were running the same thing. I guess we weren't quite as religious then. If we wanted religion, we went to church. We simply used computers to do our jobs. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED

RE: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-07 Thread joe
already built up your own lib. There are many embedded and POS and other machines running Windows and not using the Explorer shell. They are still called Windows machines. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Barry Fitzgerald Sent

RE: [Full-Disclosure] What a difference a char makes...

2004-07-07 Thread joe
Thanks Nick, you should find this corrected now. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nick FitzGerald Sent: Saturday, July 03, 2004 1:00 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: [Full-Disclosure] What

RE: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-07 Thread joe
://lsdocs.shellfront.org/ , http://www.lsdev.org/news.php , and http://www.litestep.net It has build instructions available for VS6/7.1 and Dev-c++/MinGW. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of joe Sent: Wednesday, July 07, 2004 12:20 PM To: [EMAIL PROTECTED

RE: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-06 Thread joe
of how jumpy it is. :o) joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Barry Fitzgerald Sent: Tuesday, July 06, 2004 10:28 AM To: joe Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] IE Web Browser: Sitting Duck joe wrote: Couple of things

RE: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-04 Thread joe
. Work to live, don't live to work. BTW, it is joe, not JOE - I am case sensitive and you hurt my feelings. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Saturday, July 03, 2004 4:45 PM To: [EMAIL PROTECTED] Subject: Re

RE: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-03 Thread joe
place wet and deep. The legal world is not, in my opinion, making this a better world to live in. Just more lawsuit prone. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gilbert Pilz Sent: Thursday, July 01, 2004 9:52 PM To: [EMAIL PROTECTED

RE: [Full-Disclosure] Name One Web Site Compromised by Download.Ject?

2004-07-03 Thread joe
telling the neighborhood you are an idiot and did that? Sure it might help some people comply to security for fear of embarassment but I don't see that as a viable solution long term. It doesn't work, look around. joe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL

RE: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-01 Thread joe
are expecting. You want to look at cars, look at the RollsRoyce, the Bentley, the Aston. What do they cost in relation to your Chevy or Ford or Honda? You very rarely hear about RollsRoyce recalls... They must be perfect, especially with how much you pay... Ummm nope. joe -Original

RE: [Full-Disclosure] New malware to infect IIS and from there jump to clients

2004-06-25 Thread joe
For the IIS side http://www.microsoft.com/security/incident/download_ject.mspx Microsoft teams are investigating a report of a security issue affecting customers using Microsoft Internet Information Services 5.0 (IIS) and Microsoft Internet Explorer, components of Windows. Important

Re: [Full-Disclosure] New Worm Discovery - Potential Korgo Variant

2004-06-24 Thread joe smith
Kaspersky detect it as Backdoor.Agobot.gen. So another one of the many other Agobot variants. Michael Young wrote: Yesterday a large client of ours was taken down by what appears to be a Korgo variant, but I have been unable to locate any information on this worm. From what we have

  1   2   >