On 03/10/2011 16:16, Laurelai wrote:
> that html makes my eyes want to bleed
The site is obviously commercial, hence getting the below revoked
should be a doddle via a complaint to enom.
Registrant:
Andrew Wallace
Registrant type:
UK Individual
Registrant's address:
On 02/10/2011 18:38, Stefan Jon Silverman wrote:
> oy, list newbie meets n3td3v -- this should be fun
Just looked at this site. Shudder.
FYI: this is PART of one sentence!
This site should be linked to within the wikip definition of "tag soup" :-)
is a professional consu
ltancy
o
On 20/09/2011 06:04, James Fife wrote:
> I noticed a recent flaw in Facebooks security resolution process recently.
> After being asked to confirm my identity simply because I was using a
> different computer, I apparently took too long to
> identify my friends in their photos. However, I was abl
is running wordpress 3.2.1
This lahore based spammer is running a PPC link blog and is pushing his crap
all over the social networks right now and has just appeared in my work
spamtraps from botnett'd systems.
Anyone know if the above site has any known exploits?
Note the hosting company has bee
On 27/08/2011 23:12, Dan Dart wrote:
> Looks like it's freeWARE but not free per se.
> With the added disadvantage that it runs on none of the platforms I use.
> How sad. 0/5 review from me then.
http://www.insecurityresearch.com/files/download/
From the readme's its an old version of metasploit
On 20/07/2011 14:19, Dave wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> OK This is not new, but it happened to me just an hour ago.
>
> A stranger on the end of a phone call tells you your PC is infected, and you
> should download and install a RC server so it can be fixed.
SOP.
>
On 13/07/2011 19:47, r...@segfault.net wrote:
> The technical details are available at http://wiki.thc.org/vodafone.
Much more importantly it allows you to avoid the insane VF roaming charges...
Hacking one of these to use via openvpn when abroad means you could
take your UK mobile whereever you
"I need some real internet whizzes in order to do cyber ..."
"I probably have to do better than I am doing at the moment, or else my
internet whizzes are not going to stay… and we do have a steady drip, I am
afraid. "
http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8635959/Whizz-kids-
On 07/07/2011 11:34, Ed Carp wrote:
> Smart ass... :p
My hubs says I have a nice ass :-)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 07/07/2011 11:00, William Reyor wrote:
> Webalizer?
>
> Sent from my ATmega128
>
> On Jul 7, 2011, at 5:44 AM, Jacqui Caren-home
> wrote:
>
>> On 07/07/2011 08:03, 김무성 wrote:
>>> Is there a system or program which presents HTTP response count?
>>
>
On 07/07/2011 08:03, 김무성 wrote:
> Is there a system or program which presents HTTP response count?
Yes.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secun
On 29/06/2011 02:40, Nick FitzGerald wrote:
> The kind of problems that scream "Why would anyone in their right mind
> use it?"
The official line.
http://forum.joomla.org/viewtopic.php?f=432&t=335090
and a good example of how CVE's are handled
http://forum.joomla.org/viewtopic.php?f=432&t=63139
On 29/06/2011 02:40, Nick FitzGerald wrote:
> Christian Sciberras wrote:
>
>> Rather than that, I'd say the dev team is out of sync with the security
>> team..
>
> Assuming that that may be a reasonable one-sentence encapsulation of
> how Joomla development is organized...
>
> The fact such a sente
On 28/06/2011 07:25, YGN Ethical Hacker Group wrote:
> Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities
FYI 1.5.21 seems to be AOK.
IMHO The Joomla team do not seem to grok the concept of regression testing and
keep
re-introducing the same XSS problems over and over
On 27/06/2011 09:15, YGN Ethical Hacker Group wrote:
> Mambo CMS 4.6.x (4.6.5) | Multiple Cross Site Scripting Vulnerabilities
>
I thought these were found in Joomla ages ago?
Did you really test a code base that is a version of an old Joomla base
or did you look at the code, and test old Joomla
On 03/05/2011 12:11, Cal Leeming wrote:
> Eww, what a horrible acronym.
I thought it was common usage!
The reason for the acronym?
I keep getting stupid rejections from members on this list from a certain
clueless US ISP
who sends backscatter to whoever is in the envelope from address.
Yes folk
Does this moron not understand "FOAD"...
Anyone else getting this (repeat) crap?
Original Message
Subject:Reminder about your invitation from Rain Liu
Date: Tue, 3 May 2011 10:20:18 + (UTC)
From: Rain Liu (LinkedIn Invitations)
To:
LinkedIn
This is a r
On 25/04/2011 16:31, Steven Pinkham wrote:
> It's entirely possible that is all there is to it.
> Let me be perfectly clear: For people in the real world to trust your
> tool,
This stupid f-wit is now sending linkedin invites to full-disclosure
posting addresses - following his abusive adverts fo
On 25/04/2011 11:29, Jacqui Caren-home wrote:
> On 25/04/2011 06:51, Beatyou Man wrote:
>> I tried Pangolin 2.5.2 and the latest one. No data will be transfered to the
>> server you mentioned in
>> "http://laramies.blogspot.com/2009/05/pangolin-and-your-data.html";
On 25/04/2011 06:51, Beatyou Man wrote:
> I tried Pangolin 2.5.2 and the latest one. No data will be transfered to the
> server you mentioned in
> "http://laramies.blogspot.com/2009/05/pangolin-and-your-data.html";
>
> Why don't you trust your eyes and try this one?
OK let have a bash - literall
On 31/03/2011 13:13, BlackHawk wrote:
> to close with a semi-serious joke: put all this together and you will
> know why black market selling of exploit is increasing his size: at
> least someone will appreciate your work and eventually recompensate
> you for it..
Everyone makes mistakes. Being un
On 15/02/2011 16:55, Michele Orru wrote:
> 2011/2/14 MustLive:
>> Hello Michele!
>>
>> Few days ago I saw your advisory about Drupal's captcha. It's interesting
>> advisory, but I have one note concerning it - your research is very close to
>> mine ;-) (it concerns similar holes which I found befor
On 15/01/2011 01:53, Glenn Everhart wrote:
>
>
> If you have a system that is built well secured in the first place (existence
> proof: VMS)
> then patches are comparatively rare.
This is a joke right?
When I first used VMS there was a bug that when a directory was deleted all
files within the
Fionnbharr wrote:
> Thanks for the marketing spam
>
> On 2 June 2010 20:11, Laurent OUDOT at TEHTRI-Security
> wrote:
>> There, we will release more than 13 remote pre-auth zero-days against
>> many different products (yes: 13 0days...).
Hmm a company that can predict 13 new infections roughly t
PsychoBilly wrote:
> The_UT went to jail because his Gonzales m8 kindly supplied irc logs
A *long* time ago I found a buffer overflow issue with a MAC web server
reported to devs but no takeup. With only a few hundred web requests I
could take down a web server. Noddy stuff today but in those day
25 matches
Mail list logo