Re: [Full-disclosure] talk.google.com

2005-08-27 Thread n3td3v
Yahoo's current IM application, highly bloated with features more
geared up for a Yahooligans IM client. Yahooligans, The web for kids.
www.yahooligans.com

Yahoo plan to strip their current Yahoo Messenger 7.0 for a new lite
version, to stop half of Yahoo's 20 million IM users from switching to
Google Talk, when Yahoo finally pull the switch on Yahoo's older,
lighter version of Yahoo Messenger.

The version of Yahoo Messenger, 5.6. build 1358 was the last basic,
easy to use IM application released by Yahoo. Since then Yahoo
introduced the All-New Yahoo Messenger. The All-New was all bloated
with features geared up for kids. Users hit out at Yahoo ever since
version 6.0.

Users of Yahoo Messenger wish Yahoo to rollback to 5.6 1358, adding
only the wanted features as listed here:
http://www.geocities.com/n3td3v/ymessenger80lite.html You can call it
Yahoo Messenger 8.0 so you don't look silly for backtracking to a
previous version.

Yahoo will be releasing two versions of Yahoo Messenger soon. One will
be Yahooligans Messenger. This will be indentical to the current Yahoo
Messenger 7.0, just rebranded.

Yahoo's new Yahoo Messenger 8.0 will move direction from versions 6.0
and 7.0 with a rollback to the older Yahoo Messenger feel.

Yahoo Messenger 8.0 LITE is the future of IM...

http://www.geocities.com/n3td3v/ymessenger80lite.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] RE: Example firewall script

2005-08-27 Thread [EMAIL PROTECTED]



=
ORIGINAL MESSAGE:
-
Date: Sat, 27 Aug 2005
From: Exibar 
Subject: Example firewall script

The absolute worse Firewal rule 
you can have:

 Allow ANY ANY

The best:

  Deny ANY ANY
=

REPLY:
---

Actually, that's not true.
I would agree that as a general rule of thumb
you should have a deny statement at the end
of every ACL. In fact, Cisco places an implicit
DENY ANY ANY at the end of their ACL's 
automatically.

However, Access Control Lists are not firewalls.
Yes, we use them as firewalls, but that's not what
they are.

ACL's ARE TRAFFIC SHAPING DEVICES. 

As traffic shaping devices, they can be used for
security, but they are also used for management
purposes. For instance; many Autonomous Systems
are multi-homed. There are decisions to be made
about how traffic will flow in and out of the AS.
You also have to decide if you wish to be a 
transit AS or not. 

ACLs are the tool that you use to control your 
traffic.

While an ACL being used as a security device 
should have a deny statement at the end, proper 
construction of the ACL is more about following 
the proper construction rules.

This is actually a huge subject, far too big 
for an individual e-mail to a list.

But there are some basic rules to keep in mind:

ACL's analyze traffic from top to bottom, so 
keep your most specific entries at the top, 
with more general entries near the bottom; 
and do your permits before your denys.
That means you deal with hosts first, then 
subnets, then  networks, and at each level 
you have your permit statements  before your 
deny statements. The reason for this is because 
once a packet matches a line, it's dealt with 
right then and there. You don't want to have 
a packet thrown away just before a line that 
would have permitted it.

There are also issues of what KIND of ACL to 
use and where  to place them; Inbound or Outbound.

In terms of the original question, the only 
difference between a good line item or a 
bad line item is whether or not the syntax 
is correct.

The only difference between a good ACL 
and a bad ACL is  whether or not it's 
structure is properly designed and whether
or not it's placed in the proper location.


This subject REALLY calls for a book, not 
an e-mail response. I've said very little 
in this post and look at all the room 
it took up.

++


mail2web - Check your email from the web at
http://mail2web.com/ .


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] securityfocus.com outage?

2005-08-27 Thread n3td3v
Securityfocus.com appears to be unreachable.

Anyone else?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] talk.google.com

2005-08-27 Thread Robert Wesley McGrew
On 8/27/05, n3td3v [EMAIL PROTECTED] wrote:
 Yahoo's current IM application, highly bloated with features more
 geared up for a Yahooligans IM client. Yahooligans, The web for kids.
 www.yahooligans.com
 
 Yahoo plan to strip their current Yahoo Messenger 7.0 for a new lite
 version, to stop half of Yahoo's 20 million IM users from switching to
 Google Talk, when Yahoo finally pull the switch on Yahoo's older,
 lighter version of Yahoo Messenger.
snip
 Yahoo Messenger 8.0 LITE is the future of IM...
 
 http://www.geocities.com/n3td3v/ymessenger80lite.html

Is it just me, or are you getting more incoherent with every post? 
It's like you can't decide if you want to make a hacked-up YM client
(ala Kazaa Lite), a fake yahoo press release with witty commentary, an
open letter to yahoo, or something else entirely.  Maybe I missed it,
but I don't even think anyone mentioned yahoo up to this point in a
way that would provoke this.

I guess I just don't get it.  

-- 
Robert Wesley McGrew
http://cse.msstate.edu/~rwm8/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread James Tucker

Screw these arguments.

What you should really do is get a security consultant to teach you the 
basics, and provide you with some exposure to the various different 
options you may have available, and in the case of your request, offer 
you some of the old horror stories.


If your only aim is to learn, the I would suggest starting with your 
firewalls documentation. Most firewall developers do have at least a 
reasonable knowledge of firewall security and rule building. Moreover 
good documentation will leave references to good physical sources 
(books, courses, etc.). Getting back to the original question of BAD 
configurations :) (yep, my ATD is higher today) you may find some 
reasonable examples in high quality documentation too.


You might try looking into any detailed hacking stories and statistics 
you can find, as these may lead to some other interesting conclusions 
about firewalls and their impacts on security too.


Also, forums might be a good place to pick up bad firewall rules, you 
know those places are filled with crap because people just can't resist 
trying to show up the next guy and pretend to be the best.


Just out of interest, why are you looking for Bad rule sets?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: Tool for Identifying Rogue Linksys Routers

2005-08-27 Thread Paul




Thomas, I've taken a look at the signature that you used to sign your 
message, and it says that one of the people it's registered to is [EMAIL PROTECTED]. Now, if I'm 
not mistaken, this is a spyware company. If this is so, and you know developers 
that are writing adware/spyware programs, please do me a favor and burn their 
house down.

Thanks
Paul
Formerly of Greyhats Security

- Original Message - 
From: "Thomas Guyot-Sionnest" [EMAIL PROTECTED]
To: "Martin Mkrtchian" [EMAIL PROTECTED]; "Bugtraq" bugtraq@securityfocus.com; 
"Full-Disclosure (E-mail)" full-disclosure@lists.netsys.com
Sent: Thursday, August 25, 2005 5:52 PM
Subject: RE: Tool for Identifying Rogue Linksys Routers
The right way to fix that is to implement switch-level recurity. 
Limit thenumber of mac and IP address on each ports. No workstation should 
ever havemore that one MAC and IP address...If you don't have the 
budget for that kind of switch, I'd first try toidentify open ports and try 
to recognize services on a linksys router. Nmapand telnet will be your best 
friends.Thomas Guyot-Sionnest,Administrateur de systèmesTél: 
(514) 842-7054Fax: (514) 221-3395Courriel: [EMAIL PROTECTED]  -Original 
Message- From: Martin Mkrtchian [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, August 25, 2005 14:49 To: Bugtraq; 
Full-Disclosure (E-mail) Subject: Tool for Identifying Rogue Linksys 
Routers  Dear Group Members  We are migrating 
from Lucent QIP to MetaIP for DHCP services  and so far we have had two 
issues when MetaIP has been  implemented for VLAN that has an 
unauthorized Linksys router  giving out IP addresses.  
Is there a scanning tool out there that can determine if  there are 
unauthorized Linksys (type) routers in a specific VLAN?  Your 
input is appreciated   Thank You  Martin 
M http://dotsecure.blogspot.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread Paul

Page can't be found for me either. Oh woe is the day :(

Regards,
Paul
Formerly of Greyhats Security

- Original Message - 
From: n3td3v [EMAIL PROTECTED]

To: full-disclosure@lists.grok.org.uk
Sent: Saturday, August 27, 2005 1:18 PM
Subject: Re: [Full-disclosure] securityfocus.com outage?


Ah, me too! Wonder who pulled the wrong switch!



On 8/27/05, adf--at--Code511.com [EMAIL PROTECTED] wrote:

dead for me from europe.

-deepquest
Le 27 août 05 à 18:44, n3td3v a écrit :

 Securityfocus.com appears to be unreachable.

 Anyone else?
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread n3td3v
Proably that big hurricane has done something, somewhere. Thats all I
can think of right now.
Mother nature playing havoc again with one of the biggest security
websites in the entire universe!

On 8/27/05, Andrew R. Reiter [EMAIL PROTECTED] wrote:
 Seems to be the same here in southern california.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread Steve Friedl
On Sat, Aug 27, 2005 at 06:32:30PM +0100, n3td3v wrote:
 Proably that big hurricane has done something, somewhere.

Lots of hurricanes in Canada, eh? :-)

Steve :-)

--- 
Stephen J Friedl | Security Consultant |  UNIX Wizard  |   +1 714 544-6561
www.unixwiz.net  | Tustin, Calif. USA  | Microsoft MVP | [EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread hummer

Actually they are called humicanes when they are inland
- Original Message - 
From: Steve Friedl [EMAIL PROTECTED]

To: n3td3v [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Sent: Saturday, August 27, 2005 11:38 AM
Subject: Re: [Full-disclosure] securityfocus.com outage?



On Sat, Aug 27, 2005 at 06:32:30PM +0100, n3td3v wrote:

Proably that big hurricane has done something, somewhere.


Lots of hurricanes in Canada, eh? :-)

Steve :-)

--- 
Stephen J Friedl | Security Consultant |  UNIX Wizard  |   +1 714 544-6561

www.unixwiz.net  | Tustin, Calif. USA  | Microsoft MVP | [EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread Fergie (Paul Ferguson)
Yep:

%ping www.securityfocus.com

Pinging www.securityfocus.com [205.206.231.15] with 32 bytes of data:

Request timed out.
Request timed out.
Request timed out.
Request timed out.

Ping statistics for 205.206.231.15:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),

%traceroute www.securityfocus.com

Tracing route to www.securityfocus.com [205.206.231.12]
over a maximum of 30 hops:

  [snip]

 1243 ms36 ms35 ms  bb1-p4-0.chcgil.ameritech.net [151.164.42.182]
 1335 ms35 ms35 ms  bb2-p5-1.chcgil.ameritech.net [151.164.191.182]

 1436 ms35 ms41 ms  ex1-p2-0.eqchil.sbcglobal.net [151.164.42.149]
 1535 ms45 ms35 ms  asn852-telus.eqchil.sbcglobal.net [151.164.248.1
22]
 1674 ms73 ms72 ms  clgrab01dr00.bb.telus.com [208.38.16.144]
 1773 ms73 ms73 ms  216.123.211.114
 1872 ms72 ms72 ms  205.206.231.98
 1973 ms73 ms73 ms  205.206.14.145
 20 *** Request timed out.
 21 *** Request timed out.
 22 *** Request timed out.
 23  ^C


- ferg


-- n3td3v [EMAIL PROTECTED] wrote:

Securityfocus.com appears to be unreachable.

Anyone else?


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread Jan Nielsen
I think the rules explained here are not intended to be actual rules in
a firewall, but more of a way to explain what is secure and what is not,
correct me if im wrong. Oh and btw, acl's ARE used in CBAC (cisco ios
fw) they are just a tad more intelligently created than in a regular
acl.


Jan

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: 27. august 2005 18:42
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] RE: Example firewall script 




=
ORIGINAL MESSAGE:
-
Date: Sat, 27 Aug 2005
From: Exibar 
Subject: Example firewall script

The absolute worse Firewal rule 
you can have:

 Allow ANY ANY

The best:

  Deny ANY ANY
=

REPLY:
---

Actually, that's not true.
I would agree that as a general rule of thumb
you should have a deny statement at the end
of every ACL. In fact, Cisco places an implicit
DENY ANY ANY at the end of their ACL's 
automatically.

However, Access Control Lists are not firewalls.
Yes, we use them as firewalls, but that's not what
they are.

ACL's ARE TRAFFIC SHAPING DEVICES. 

As traffic shaping devices, they can be used for
security, but they are also used for management
purposes. For instance; many Autonomous Systems
are multi-homed. There are decisions to be made
about how traffic will flow in and out of the AS.
You also have to decide if you wish to be a 
transit AS or not. 

ACLs are the tool that you use to control your 
traffic.

While an ACL being used as a security device 
should have a deny statement at the end, proper 
construction of the ACL is more about following 
the proper construction rules.

This is actually a huge subject, far too big 
for an individual e-mail to a list.

But there are some basic rules to keep in mind:

ACL's analyze traffic from top to bottom, so 
keep your most specific entries at the top, 
with more general entries near the bottom; 
and do your permits before your denys.
That means you deal with hosts first, then 
subnets, then  networks, and at each level 
you have your permit statements  before your 
deny statements. The reason for this is because 
once a packet matches a line, it's dealt with 
right then and there. You don't want to have 
a packet thrown away just before a line that 
would have permitted it.

There are also issues of what KIND of ACL to 
use and where  to place them; Inbound or Outbound.

In terms of the original question, the only 
difference between a good line item or a 
bad line item is whether or not the syntax 
is correct.

The only difference between a good ACL 
and a bad ACL is  whether or not it's 
structure is properly designed and whether
or not it's placed in the proper location.


This subject REALLY calls for a book, not 
an e-mail response. I've said very little 
in this post and look at all the room 
it took up.

++


mail2web - Check your email from the web at
http://mail2web.com/ .


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread mayhem
On Sat, 2005-08-27 at 12:41 -0400, [EMAIL PROTECTED] wrote:

 However, Access Control Lists are not firewalls.
 Yes, we use them as firewalls, but that's not what
 they are.
 
 ACL's ARE TRAFFIC SHAPING DEVICES. 

ACL identify what traffic you are dealing with. 
what to do with/on that traffic always depends.
you can re-route, shape, filter, crypt, nat and so on

[snip]
 ACL's analyze traffic from top to bottom, so 
 keep your most specific entries at the top, 
 with more general entries near the bottom; 

ok, but ...

 and do your permits before your denys.

this is not always true.
in a nat scenario you may want to crypt all the traffic, exept the one
that will be send in your entreprise vpn. you first need to deny the
specific traffic of your private networks, then allow the remaining..

in a filtering scenario of a bastion router you first refuse
private/reserved addresses from outside, than you allow any to your http
port

 This subject REALLY calls for a book, not 
 an e-mail response. I've said very little 
 in this post and look at all the room 
 it took up.

it's true, so please, do not generalize in this way ...

a still working mayhem :(
-- 
And the Germans killed the Jews, And the Jews killed the Arabs,
And the Arabs killed the hostages, And that is the news RW
https://www.recursiva.org - Key on pgp.mit.edu ID B88FE057


signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Looks fine from Brazil at 8:20PM GMT.

And no news on what happened earlier that I can find.

[]s

On Sat, Aug 27, 2005 at 05:44:00PM +0100, n3td3v wrote:
 Securityfocus.com appears to be unreachable.
 
 Anyone else?
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

- -- 
Rodrigo Barbosa [EMAIL PROTECTED]
Quid quid Latine dictum sit, altum viditur
Be excellent to each other ... - Bill  Ted (Wyld Stallyns)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFDEMwCpdyWzQ5b5ckRAkA/AJ4yM6yMOokqwPofQqCXREIpZY4bWACfUfC6
qnsYO0y/JtGZFSppV9wQxOo=
=kHLq
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] securityfocus.com outage?

2005-08-27 Thread n3td3v
Welcome to Full-Disclosure. We make the news. Beer belly media
representatives are still in bed.



On 8/27/05, Rodrigo Barbosa [EMAIL PROTECTED] wrote:
 And no news on what happened earlier that I can find.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: securityfocus.com outage?

2005-08-27 Thread naveed
main site looks fine but
on a lot of pages i am getting database error
:(
anyone has clue what happened actually to them

On 8/28/05, Rodrigo Barbosa [EMAIL PROTECTED] wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Looks fine from Brazil at 8:20PM GMT.
 
 And no news on what happened earlier that I can find.
 
 []s
 
 On Sat, Aug 27, 2005 at 05:44:00PM +0100, n3td3v wrote:
  Securityfocus.com appears to be unreachable.
  
  Anyone else?
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 - -- 
 Rodrigo Barbosa [EMAIL PROTECTED]
 Quid quid Latine dictum sit, altum viditur
 Be excellent to each other ... - Bill  Ted (Wyld Stallyns)
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.0 (GNU/Linux)
 
 iD8DBQFDEMwCpdyWzQ5b5ckRAkA/AJ4yM6yMOokqwPofQqCXREIpZY4bWACfUfC6
 qnsYO0y/JtGZFSppV9wQxOo=
 =kHLq
 -END PGP SIGNATURE-
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread J.A. Terranson


For the record,  I just got a phone call from this guy - apparently he's
afraid that because I call bullshit on him in public, I'm also going to
fill [his] email box with spam and stuff.

Very entertaining.  He even calls back and leaves messages when you hang
up on him!  Of course, while he's willing to call you on your cell phone
to bitch and moan, he's also a pussy: he hides his calling number.

HEY - ERIC!!!

FUCK OFF.


On Sat, 27 Aug 2005, [EMAIL PROTECTED] wrote:

 Date: Sat, 27 Aug 2005 16:27:14 -0400
 From: [EMAIL PROTECTED] [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-disclosure] RE: Example firewall script


 As does Juniper, as does.

  Your Point?



 Uh... No.  Traffic shaping may make use of ACLs, but ACL != Shaping.

 Sorry, but...
 By definition, ACLs are a traffic shaping device.




 Bzzzt.  *All* Autonomous Systems are multihomed.  Thats the definition
 of AS.

  That's completely wrong. The definition of an AS is not that it's
 multihomed, and not all AS's are multihomed.



 Again, wrong.  ACLS are involved, but what you are talking about are
 called ROUTING DECISIONS, and ACLS != Routing Decisions.

  Sorry, but that's EXACTLY what they are. They are a set of instructions
 by which a routing device DECIDES where to route packets.


 This is true for *most* ACL implementations, but NOT for all.  Again, you
 are trying to paint the entire world with your only available [Cisco]
 brush, and it is making you look like a self-important fool.

  Sorry, but... you're wrong again. The very nature of how ACL's work mean
 that you move from specific to general.


 I can probably find a few good ones to recommend - if you will promise to
 read them prior to spewing more of this.

  Based on your statements so far, I would not be inclined to follow your
 suggestions.



 And still managed to screw up most of what you said.

  Actually, what I said is entirely correct.


 That's expected: hot gas expands.

  You would know.






 
 mail2web - Check your email from the web at
 http://mail2web.com/ .




-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Eric Scher - Ball-less Poster Boy

2005-08-27 Thread J.A. Terranson

So this maniac is willing to cal peoples cell phones to complain that he's
been somehow mischaracterized in public, but at the same, he does it from
behind a caller-ID blocker.  This would be merely annonying if this
weren't the same asshole who has posted here previously (Tue, 16 Nov 2004
18:33:50 -0500) complaining that some guy sending him anonymized email was
some zipperhead without the courage to use his real e-mail address.

HEY ERIC!!!  WHATS YOUR FUCKING PHONE NUMBER, ZIPPERHEAD???

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Synopsis

2005-08-27 Thread J.A. Terranson

In 2000, we had Gary Burnore.  Look what happened to him.
In 2004, we had Savvis.  'nuff said.

For 2005, we get Eric Scher.  Hang On Eric - The Ride Is Just Beginning.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] talk.google.com

2005-08-27 Thread n3td3v
Do you get this? http://news.bbc.co.uk/2/hi/americas/4190926.stm

You have a moron as a president.

Some things will never be understood.


On 8/27/05, Robert Wesley McGrew [EMAIL PROTECTED] wrote:
 
 I guess I just don't get it.
-- 
http://www.geocities.com/n3td3v
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread Jason Coombs
The problem with knowing a thing or two about a thing or two is that you're 
constantly arguing with other people who know nothing about things that nobody 
else can possibly understand, and that nobody will be forced to learn about or 
consider carefully until it's too late for the knowledge to save them from harm.

This is yet another reason that full disclosure is crucial to everyone's 
readiness and to our ability to defend ourselves... Discussion and analysis of 
complex subjects, with real-world study and disclosure of failures and 
mistakes, prepares us to understand new risks and classify new threats 
according to actual significance in our situations.

So, thank you both for sharing your debate and thereby calling attention to an 
area of uncertainty in practice, but if you're going to argue about definitions 
of routing tables vs. ACLs, why not do it in a way that mere mortals are able 
to understand some day in the future when they find your debate archived 
somewhere because their Cisco router's ACL ruleset failed to consider the fact 
that they had routes and multihomed interfaces configured dynamically by an 
attacker who knew better than the victim just how ACLs are parsed and precisely 
what the difference is between a good ACL and a bad one -- or where an attacker 
knew there was another interface physically attached to the Cisco device where 
a small wireless access point could be attached, which WAP would automatically 
assign the Cisco device another endpoint address in the WAP's address space.

Fuck off doesn't add to the substance of the technical arguments, and even 
trying to understand why you are debating at all there does not appear to be 
any reason -- other than that you are both feeling stressed because the stock 
market keeps falling and you're counting on Wall Street to make you wealthier 
than your hard-working but lesser-compensated friends and neighbors.

Don't worry, you'll figure out when you're unemployed and broke that all the 
time you spent being upset about little things distracted you from living life 
well, and you'll really only regret not having done more to make sure other 
people had as much opportunity as you did to do good work and document then 
publish details about the things they found important at the time, and to share 
your knowledge publicly for the benefit of everyone who comes after you.

Regards,

Jason Coombs
[EMAIL PROTECTED]

-Original Message-
From: J.A. Terranson [EMAIL PROTECTED]
Date: Sat, 27 Aug 2005 15:38:11 
To:[EMAIL PROTECTED] [EMAIL PROTECTED]
Cc:Full-Disclosure Full-Disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] RE: Example firewall script



For the record,  I just got a phone call from this guy - apparently he's
afraid that because I call bullshit on him in public, I'm also going to
fill [his] email box with spam and stuff.

Very entertaining.  He even calls back and leaves messages when you hang
up on him!  Of course, while he's willing to call you on your cell phone
to bitch and moan, he's also a pussy: he hides his calling number.

HEY - ERIC!!!

FUCK OFF.


On Sat, 27 Aug 2005, [EMAIL PROTECTED] wrote:

 Date: Sat, 27 Aug 2005 16:27:14 -0400
 From: [EMAIL PROTECTED] [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-disclosure] RE: Example firewall script


 As does Juniper, as does.

  Your Point?



 Uh... No.  Traffic shaping may make use of ACLs, but ACL != Shaping.

 Sorry, but...
 By definition, ACLs are a traffic shaping device.




 Bzzzt.  *All* Autonomous Systems are multihomed.  Thats the definition
 of AS.

  That's completely wrong. The definition of an AS is not that it's
 multihomed, and not all AS's are multihomed.



 Again, wrong.  ACLS are involved, but what you are talking about are
 called ROUTING DECISIONS, and ACLS != Routing Decisions.

  Sorry, but that's EXACTLY what they are. They are a set of instructions
 by which a routing device DECIDES where to route packets.


 This is true for *most* ACL implementations, but NOT for all.  Again, you
 are trying to paint the entire world with your only available [Cisco]
 brush, and it is making you look like a self-important fool.

  Sorry, but... you're wrong again. The very nature of how ACL's work mean
 that you move from specific to general.


 I can probably find a few good ones to recommend - if you will promise to
 read them prior to spewing more of this.

  Based on your statements so far, I would not be inclined to follow your
 suggestions.



 And still managed to screw up most of what you said.

  Actually, what I said is entirely correct.


 That's expected: hot gas expands.

  You would know.






 
 mail2web - Check your email from the web at
 http://mail2web.com/ .




-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly 

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread J.A. Terranson

On Sun, 28 Aug 2005, Jason Coombs wrote:

 The problem with knowing a thing or two about a thing or two is that
 you're constantly arguing with other people who know nothing about
 things that nobody else can possibly understand, and that nobody will be
 forced to learn about or consider carefully until it's too late for the
 knowledge to save them from harm.

Slow day Jason?

 This is yet another reason that full disclosure is crucial to everyone's
 readiness and to our ability to defend ourselves... Discussion and
 analysis of complex subjects, with real-world study and disclosure of
 failures and mistakes, prepares us to understand new risks and classify
 new threats according to actual significance in our situations.

 So, thank you both for sharing your debate and thereby calling attention
 to an area of uncertainty in practice, but if you're going to argue
 about definitions of routing tables vs. ACLs, why not do it in a way
 that mere mortals are able to understand some day in the future when
 they find your debate archived somewhere because their Cisco router's
 ACL ruleset failed to consider the fact that they had routes and
 multihomed interfaces configured dynamically by an attacker who knew
 better than the victim just how ACLs are parsed and precisely what the
 difference is between a good ACL and a bad one -- or where an attacker
 knew there was another interface physically attached to the Cisco device
 where a small wireless access point could be attached, which WAP would
 automatically assign the Cisco device another endpoint address in the
 WAP's address space.

Heartily agreed.  In spite of that agreement, thank you for providing that
wonderful tidbit.


 Fuck off doesn't add to the substance of the technical arguments, and
 even trying to understand why you are debating at all there does not
 appear to be any reason

Actually, I accept responsibility for the ambiguity: the FUCK OFF was
not directed at the technical pseudodebate, it was directed at the lunatic
telephone calls.  So, for the sake of clarity and in the spirit of Full
Disclosure, allow me to be clearer the second time around:

Eric: FUCK YOU.  (As opposed to FUCK OFF).

There.  I feel better now :-)

//Alif

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] talk.google.com

2005-08-27 Thread y0himba
Bah,that's old news.  You are right however, he is a complete moron.  But
hey, he's power hungry! :-/(Sarcasm)

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of n3td3v
Sent: Saturday, August 27, 2005 8:33 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] talk.google.com

Do you get this? http://news.bbc.co.uk/2/hi/americas/4190926.stm

You have a moron as a president.

Some things will never be understood.


On 8/27/05, Robert Wesley McGrew [EMAIL PROTECTED] wrote:
 
 I guess I just don't get it.
--
http://www.geocities.com/n3td3v
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

--
No virus found in this incoming message.
Checked by AVG Anti-Virus.
Version: 7.0.344 / Virus Database: 267.10.16/83 - Release Date: 8/26/2005
 

-- 
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.344 / Virus Database: 267.10.16/83 - Release Date: 8/26/2005
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Is this a phishing attempt?

2005-08-27 Thread wac
Hi:

I have3 a couples of stories to talk about this.

Jejej I have even interchanged mail with those guys doing that. Do the following. If they are a prince or a king or a pressident or whomever wants to give you millions. Jejej tell them to pay you the airplane ticket that you have no money at all. Jajaja is only a couple of thousands that compared to a million is nothing. If they do jeje you take a free vacations. Beleive meyou will receive an excuse. The intention behind those mails is to steal your money getting your data and make someone similar to you to for instance make bank transactions etc. Beware in such case you could later become a problem that needs to be erradicated so by all means never give your personal data.When you find someone owning a fortune beleivme it worth it to do that. They ask personal information as well as pictures of you. You could even follow themwith the gameand give them fake picturesor fake data. I remember that once one of them said he was from my country. Jejej instead of a message in english I made the guy to translate the mail if he wanted to answer me. And he/she did and also investigated. He complainted about the language that heleft tha country a long time ago.Jajajaj it was very funny to look at him/her doing mistakes. Finally he/she gave up with me. Another one also told me to scan my passport and later to send it using a fax or e-mail. Jejej I told him that I didn't have one and that I didn't have the money to get it that if he could send me that it was all right. I received an excuse and never knew about that guy again.


Regards
Waldo Alvarez
On 8/24/05, winsoc [EMAIL PROTECTED] wrote:
Hi,has anyone else received this?I seriously cannot believe that someone would be so mundane in
thinking that people would reply to this.QUOTE :-Original Message-From: prince josey [mailto:[EMAIL PROTECTED]]Sent: Wednesday, August 24, 2005 4:11 AM
Subject: - TREAT AS URGENT -ATTN: Dear Friend,How are you doing with your family?I presume that all is well withyou.I am Prince Jocelyn, the manager of audit and accounting department (LaBanque De L'Afrique) Ouagadougou, Burkina 
Faso.I got your contact from theinternational business directory when i was searching a foreigner who willassist me in a profitable business deal that will yeild us life success.Before I wrote you,I prayed that you will be a honest and reliable person
whom i can work with to achieve this deal of our life.From my section in thebank, I discovered an abandoned sum of FOURTEEN MILLION UNITED STATESDOLLARS ($USD14M) thatbelongs to one of our customer who died along with his entire
famillies,on 25TH JULY,2000 CONCORDE PLANE CRASH[Flight AF4590 ] with thewhole passengers on board.The name od the deceased man was (MR. ANDREASSCHRANNER from Munich,Germany.You have to understand that I come across this
huge amount of fund when i was balancing an Internal Audit account of thedepartmental customers file tosubmit to the bank management for the annual audit of the year.Since the bank got information about the death of the deceased man, the bank
have been expecting his next of kin to apply and claim this fund because thebank cannot release the fund to any a person unless a foreigner apply forthe transfer of the fund as the next of kin or relation to the deceased
relating to this inheritance, but unfortunately i learnt throughinvestigations that no one has come up for the claim.This is the reason why I am making this business proposal to you so that youwill apply to the bank for them to wire this fund to your nominated account
as the next of kin or relation to the deceased customer.For us to achieve this businesss immediately,the percentage ratio forsharing the fund when the bank release the fund for you must bearranged accordingly upon your confirmation of your intent.
Thereafter I will visit your country for sharing modalities ofpercentages indicated above.So for the immediate transfer of this fund intoyour bank account as arranged, you must apply first to the bank as the only
existening next of kin to the deceased customer by indicating in theapplication the bank account information where you will request the bank towire the fund.So if you accept to help me in order to achieve this great
business,i will send to you through email or by fax an application form ofclaim which you will fill with your account information and send to the bankfor the transaction to start immediately.Please i would like you to
know the following information.(1.) This business is completely free fromrisk while your personality and reputation will be protected.(2.)You will not face any circumstances beyond our control because theapplication will bear the brief information of the deceased which the bank
may like to know.(3.) If you will follow my directives,this transactionwill be completed within a short time.(4.)You should keep this businessCONFIDENTIAL or SECRET until the completion of this deal.Please contact me through my email address 

RE: [inbox] Re: [Full-disclosure] Is this a phishing attempt?

2005-08-27 Thread Dagmar d'Surreal
On Sat, 2005-08-27 at 00:55 -0400, Exibar wrote:
 It's not just people giving them bank routing info.  They have people
 sending them thousands of dollars in cash in hopes of getting millions for
 nothing.  The 419'ers wind up either kidnapping or killing the person they
 scammed and assume their identity abroad.  The 419'ers have even been known
 to go after family members as well.
 
   It's too risky to try and scam the scammers, perhaps we on this list could
 cover our tracks well enough to not be found by these criminals, but most
 people couldn't.

Scam the scammers?  I'm not suggesting people try anything like that.
For one, it would be attempting to defraud someone who's probably been
spending a lot more time thinking up ways to defraud people.  ...and
moral issues notwithstanding, there's probably not that much money to be
taken from people so desperate for money as to try to trick the old and
mentally infirm out of their cash.

I just want to be a _complete and utter waste of their time_.  My
thinking is that this is a 4 teh win scenario since for every one of
them, there's hundreds of thousands if not millions of us.  If those of
us who happen to be interested in wasting the time of 419'ers even
matches the number of people who fall for their stunts (which I'd like
to think is a really small fraction) we'll have doubled the amount of
work they have to do to get anything--reducing their profit margin by
half.  If lots and lots of us started acting like retarded citizens who
can't properly copy down a routing number, we could pretty much bring
them to a screeching halt.

The serendipitous thing is that it's absolutely trivial to get tools to
help you make up perfectly legitimate looking profiles to waste a
spammer's time with.  There's still tons of leftover parts from AOHell
and utilities for rolling up phony (but kosher as far as a modulus check
is concerned) credit card numbers that you can pull off the 'net in mere
moments.  What might take someone thirty seconds to generate will take a
419 spammer quite a bit more time (and with any luck, some fee money as
well) to figure out is complete bullshit.


signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [inbox] Re: [Full-disclosure] Is this a phishing attempt?

2005-08-27 Thread Steve Friedl
On Sat, Aug 27, 2005 at 09:23:37PM -0500, Dagmar d'Surreal wrote:
 I just want to be a _complete and utter waste of their time_.

Subscribe them to FD, perhaps? :-)

Steve

--- 
Stephen J Friedl | Security Consultant |  UNIX Wizard  |   +1 714 544-6561
www.unixwiz.net  | Tustin, Calif. USA  | Microsoft MVP | [EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] J. A. Terranson

2005-08-27 Thread [EMAIL PROTECTED]
I did a dumb thing today.

I decided to be nice to someone who didn't deserve it and correct his
mistakes offline so that he wouldn't have to look like a dumbass in public.
In return, I got an earful of profanity. Honestly, I should have known
better.

I've watched Terranson participate on this list long enough to know that
he's not merely rude and obnoxious, he's mean. Bottom line, when you're
dealing with someone who isn't a particularly good person; there's no point
in trying to treat them like a human being. Like the man said; it wastes
your time and annoys the pig.

I get it. This is a place where he gets to feel like a big man. A tough
guy. Fine. Whatever floats his boat.

HOWEVER, that's no excuse for:

a) Acting like a JackAss. (Is that what the J.A. stands for?)
b) PUTTING OUT BAD INFORMATION.

For the record, Kid... (Act like a child, you'll get treated like one.)

1) An Autonomous System is a network or group of networks under the control
of a single administrator and/or administrative policy.

2) A Multihomed network is one which has more than one WAN connection to
one or more service providers.

3) The one has nothing to do with the other. ALL Autonomous systems are NOT
multihomed. In fact, the vast majority are not. If you actually understood
what an autonomous system was, you'd know that. But then, you wouldn't have
put your foot in your mouth.

4) Access Control Lists ARE traffic shaping devices. A device is a
contrivance, invention or technique serving a particular purpose. In this
case, the purpose being served is the movement of packets. The packets may
be moved to another port or they may be moved to the trash. The ACL tells
the machine to examine the packet based on certain defined criteria that
the administrator chooses and make decisions about the movement of the
packet based on that criteria. This may serve a security purpose or it may
not. 

5) Access Control Lists are constructed in a particular manner; complex to
simple. Specific to general. They don't HAVE to be written that way, but
they should be and there is a damned good reason for it. Once a packet
matches a particular line, the packet is moved. It may go to another port
or it may get dropped; but the point is that it doesn't stick around for a
second analysis. If you put a deny statement about a particular subnet
ABOVE a permit statement for a particular host FROM that subnet, it's too
late. The packet from that host has already been dumped. But hey, if you
don't mind having a buggy network because you insist on doing things YOUR
way, go ahead and write your ACL's any way you want. Not my problem.


As has already been pointed out, this is a subject better addressed in a
textbook. Whether you want to learn Cisco ACLs, iptables or whatever; you
need some in depth subject matter. This is a complex subject and one in
which you CLEARLY need remedial study.


One last thing, Kid...

You said that you could suggest some books for me?

If those are the same books that you got YOUR monumentally incorrect
information out of, no thanks.

I actually know something about this subject, and I'd like to keep it that
way.


You may now feel free to have the last word. I'd know that sort of thing is
important to someone like you.


mail2web - Check your email from the web at
http://mail2web.com/ .


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] J. A. Terranson

2005-08-27 Thread KF (lists)
Great... thanks for the extra commentary. Now how about you both shut 
the fuck up and disclose something, other than the fact that you are 
both douche knobs.

-KF


[EMAIL PROTECTED] wrote:


I did a dumb thing today.

I decided to be nice to someone who didn't deserve it and correct his
mistakes offline so that he wouldn't have to look like a dumbass in public.
In return, I got an earful of profanity. Honestly, I should have known
better.

I've watched Terranson participate on this list long enough to know that
he's not merely rude and obnoxious, he's mean. Bottom line, when you're
dealing with someone who isn't a particularly good person; there's no point
in trying to treat them like a human being. Like the man said; it wastes
your time and annoys the pig.

I get it. This is a place where he gets to feel like a big man. A tough
guy. Fine. Whatever floats his boat.

HOWEVER, that's no excuse for:

a) Acting like a JackAss. (Is that what the J.A. stands for?)
b) PUTTING OUT BAD INFORMATION.

For the record, Kid... (Act like a child, you'll get treated like one.)

1) An Autonomous System is a network or group of networks under the control
of a single administrator and/or administrative policy.

2) A Multihomed network is one which has more than one WAN connection to
one or more service providers.

3) The one has nothing to do with the other. ALL Autonomous systems are NOT
multihomed. In fact, the vast majority are not. If you actually understood
what an autonomous system was, you'd know that. But then, you wouldn't have
put your foot in your mouth.

4) Access Control Lists ARE traffic shaping devices. A device is a
contrivance, invention or technique serving a particular purpose. In this
case, the purpose being served is the movement of packets. The packets may
be moved to another port or they may be moved to the trash. The ACL tells
the machine to examine the packet based on certain defined criteria that
the administrator chooses and make decisions about the movement of the
packet based on that criteria. This may serve a security purpose or it may
not. 


5) Access Control Lists are constructed in a particular manner; complex to
simple. Specific to general. They don't HAVE to be written that way, but
they should be and there is a damned good reason for it. Once a packet
matches a particular line, the packet is moved. It may go to another port
or it may get dropped; but the point is that it doesn't stick around for a
second analysis. If you put a deny statement about a particular subnet
ABOVE a permit statement for a particular host FROM that subnet, it's too
late. The packet from that host has already been dumped. But hey, if you
don't mind having a buggy network because you insist on doing things YOUR
way, go ahead and write your ACL's any way you want. Not my problem.


As has already been pointed out, this is a subject better addressed in a
textbook. Whether you want to learn Cisco ACLs, iptables or whatever; you
need some in depth subject matter. This is a complex subject and one in
which you CLEARLY need remedial study.


One last thing, Kid...

You said that you could suggest some books for me?

If those are the same books that you got YOUR monumentally incorrect
information out of, no thanks.

I actually know something about this subject, and I'd like to keep it that
way.


You may now feel free to have the last word. I'd know that sort of thing is
important to someone like you.


mail2web - Check your email from the web at
http://mail2web.com/ .


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] talk.google.com

2005-08-27 Thread Robert Wesley McGrew
Okay, at least before, you were posting about an instant messenger
client (albeit the wrong one) in a thread about an instant messenger
client.  But when I ask what on earth you are talking about, you
respond with something that makes even less sense.

Whether or not I like the president, I don't think any of my posts
have had a political slant, and I don't see how what you've responded
with has anything to do with what I said.  If anything it proves my
point that your posts are getting more surreal and off-topic every
time.

On 8/27/05, n3td3v [EMAIL PROTECTED] wrote:
 Do you get this? http://news.bbc.co.uk/2/hi/americas/4190926.stm
 
 You have a moron as a president.
 
 Some things will never be understood.
 
 
 On 8/27/05, Robert Wesley McGrew [EMAIL PROTECTED] wrote:
 
  I guess I just don't get it.
 --
 http://www.geocities.com/n3td3v
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 


-- 
Robert Wesley McGrew
http://cse.msstate.edu/~rwm8/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/