Re: [Full-disclosure] Filezilla's silent caching of user's credentials

2010-10-14 Thread silky
27;re > any better. I accept this point. I will not engage further as I'm adding to the uselessness. I will leave you with one thought. Shouldn't the default be encrypt? -- silky http://dnoondt.wordpress.com/ "Every morning when I wake up, I experience an exquisite joy — the joy of

Re: [Full-disclosure] Filezilla's silent caching of user's credentials

2010-10-14 Thread silky
s opinion other than the developer on the issue of the nature of stored passwords on a local machine is meaningless. If their position is *influenced* by yours, then I will comment, otherwise, I don't see the point. -- silky http://dnoondt.wordpress.com/ "Every morning when I wake up, I

Re: [Full-disclosure] Filezilla's silent caching of user's credentials

2010-10-13 Thread silky
reat. If it's so simple that it can be done in under 10 mins, go complain > to them. This email thread *is* a direct complaint to them, after bugs have been closed for years. I didn't start this thread. Do you even understand what is going on here? Your emails suggest you do not.

Re: [Full-disclosure] Filezilla's silent caching of user's credentials

2010-10-13 Thread silky
rds, and it is a good and appropriate policy). > Chris. -- silky http://dnoondt.wordpress.com/ "Every morning when I wake up, I experience an exquisite joy — the joy of being this signature." ___ Full-Disclosure - We believe in it. Charter: ht

Re: [Full-disclosure] Filezilla's silent caching of user's credentials

2010-10-13 Thread silky
t; have it. > > Stop logging into your FTP server from a public terminal with Filezilla. Rubbish. The passwords should be encoded so-as to avoid trivial searching. End of story. It takes 10 minutes to do from a development point of view, and there is no excuse. -- silky http://dnoondt.wordpre

Re: [Full-disclosure] answer

2010-02-13 Thread silky
On Sun, Feb 14, 2010 at 3:12 PM, RandallM wrote: > answer me this riddle: > > Why do you chose to > > Hack IT? > > Defend IT? Shut IT > -- > been great, thanks > RandyM > a.k.a System -- silky GUERILLA TOP?

Re: [Full-disclosure] [Code-Crunchers] a simple race condition and how you'd solve it

2009-07-02 Thread silky
be computing, and, at the end of computation, if your data is still "wanted". >        Gadi. > -- > Gadi Evron, > g...@linuxbox.org. > > Blog: http://gevron.livejournal.com/ -- noon silky http://lets.coozi.com.au/ _

Re: [Full-disclosure] Major Greek bank sites with SSL vulnerable to XSS and open redirects

2009-05-11 Thread silky
On Mon, May 11, 2009 at 5:59 PM, wrote: > On Mon, 11 May 2009 16:19:49 +1000, silky said: > > On Mon, May 11, 2009 at 10:33 AM, Paul Schmehl > > wrote: > > > > Everything is insecure by default. There is no such thing as secure by > > > default. Those that

Re: [Full-disclosure] Major Greek bank sites with SSL vulnerable to XSS and open redirects

2009-05-10 Thread silky
by > default.  Those that assume there is are the first to be hacked. cute (old) opinion, but fairly useless in practice. > Paul Schmehl, If it isn't already > obvious, my opinions are my own > and not those of my employer. > ** &g

Re: [Full-disclosure] Google Chrome Browser Vulnerability

2008-09-03 Thread silky
gt; -END PGP SIGNATURE- > -- > "Fergie", a.k.a. Paul Ferguson > Engineering Architecture for the Internet > fergdawg(at)netzero.net > ferg's tech blog: http://fergdawg.blogspot.com/ -- noon silky http://www.themonkeynet.com/armada/ __

Re: [Full-disclosure] Google Chrome Browser Vulnerability

2008-09-02 Thread silky
on't release something publically only later to claim "oh it wasn't really ready, that's why that's not done". it's just pathetic. can't have it both ways. if you put up, expect to be shot down if there is an angle. -- noon silky http://www.themonkeynet.com

Re: [Full-disclosure] Google Chrome Browser Vulnerability

2008-09-02 Thread silky
gs.pcmag.com/securitywatch/ > Contributing Editor, PC Magazine > [EMAIL PROTECTED] -- noon silky http://www.themonkeynet.com/armada/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Linus summarizes state of the "security industry" with precision and accuracy.

2008-08-15 Thread silky
sons, and both > camps point fingers at each other as a way to cement their own reason > for existence," Torvalds asserts. > """ > > 0. Torvalds Interview with Network World , 08/14/2008 > http://www.networkworld.com/news/2008/081408-torvalds-security-circus.html

Re: [Full-disclosure] (:

2008-06-12 Thread silky
one of these posted hashes yet. like in the "see i told you so" fashion. maybe i've missed it. > -- > I)ruid, C²ISSP > [EMAIL PROTECTED] > http://druid.caughq.org -- silky http://www.boxofgoodfeelings.com/ http://www.themonkeynet.com/ http://lets.coozi.com.au/ _

Re: [Full-disclosure] n3td3v says don't let EUSecWest Cisco IOS presentation go ahead

2008-05-20 Thread silky
ave to deal with (like why their BGP > feeds keep creating BGP Wedgies at two remote sites, or why they're having > performance issues on one of their trans-ocean lines, or...) , and the company > gets pwned by somebody with a rootkit. -- silky http://www.boxofgoodfeelings.com/ ht

Re: [Full-disclosure] Ureleet

2008-05-01 Thread silky
On Fri, May 2, 2008 at 10:31 AM, Pat <[EMAIL PROTECTED]> wrote: > Was there any reason for the both of you to include the mailing lists on > your petty personal rants heretofore? dude, they're the same person. > 2008/5/2 Ureleet <[EMAIL PROTECTED]>: -- http://lets.coozi.com.au/ __

Re: [Full-disclosure] Gmail 0day

2007-11-08 Thread silky
ability to steal data. > On Nov 8, 2007 10:00 PM, silky <[EMAIL PROTECTED]> wrote: > > > > On 11/9/07, pdp (architect) <[EMAIL PROTECTED]> wrote: > > > well this XSS can lead to so much data being stolen that it is not even > > > funny! > > > >

Re: [Full-disclosure] Gmail 0day

2007-11-08 Thread silky
On 11/9/07, pdp (architect) <[EMAIL PROTECTED]> wrote: > well this XSS can lead to so much data being stolen that it is not even > funny! orly? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

Re: [Full-disclosure] Gmail 0day

2007-11-08 Thread silky
worked for me minutes after it was posted. seems fixed now. On 11/9/07, crazy frog crazy frog <[EMAIL PROTECTED]> wrote: > i tested it on gmail latest version,itsnot working for me? > > On Nov 8, 2007 7:04 AM, Scripter Hack <[EMAIL PROTECTED]> wrote: > > There is a html injection vulnerability in

[Full-disclosure] an open letter to kevin bacon: hello, how's it going?

2007-11-01 Thread silky
please, if you know kevin bacon, can you forward this mail to him, and have him reply to me? or at least if you know someone who you think might then know him, please send it on. i'm testing something. thanks. == hi kevin! it's mike! how

Re: [Full-disclosure] Is this sane?

2007-10-15 Thread silky
mmhmm. quick, now someone bring up full disclosure vs responsible disclosure. On 10/16/07, Daniel Sichel <[EMAIL PROTECTED]> wrote: > > >My question is the following: does this sound sane to you? Do you > >really believe that someone will let you do all that, without causing > >chaos? Laptops a

Re: [Full-disclosure] !!! W4RN1NG N1GS und P1GZ !!!

2007-10-14 Thread silky
next week on animal planet: the mating habits of security noobs ... On 10/15/07, Dude VanVinkle <[EMAIL PROTECTED]> wrote: > MISS DUDE VAN WINKLE, VALDIS KINIETIKZ AND GAY EVRON OFF OF THIS LIST > NOW. GTFO PLZ U R RUINING THE INTERNET. -- mike http://lets.coozi.com.au/ ___

Re: [Full-disclosure] extension for Firefox to force HTTPS always?

2007-10-13 Thread silky
on the google sites; customisegoogle lets you force them into ssl. but obviously that's not all sites. On 10/13/07, Kristian Erik Hermansen <[EMAIL PROTECTED]> wrote: > So one example is that you are in a wifi cafe and you want to browse > sites which may be available on both http and https. One

Re: [Full-disclosure] List of security conferences

2007-10-10 Thread silky
maybe this is of some use; i don't know https://www.google.com/calendar/embed?src=pe2ikdbe6b841od6e26ato0asc%40group.calendar.google.com&gsessionid=BinzC1HQmHc On 10/10/07, Bernd Marienfeldt <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > [EMAIL PROTECTED] wrote:

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-22 Thread silky
On 9/22/07, Geo. <[EMAIL PROTECTED]> wrote: > > pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > > Is this the way responsible disclosure works these days ? > > "Adobe?s representatives can contact me from the usual place." > > > > Wow, now that's coordinated release. Knowing the bugs tha

Re: [Full-disclosure] In ur server-status

2007-07-21 Thread silky
wow. coolest thing ever. can't blame people. apache don't even disable it. http://www.apache.org/server-status nice find! On 7/22/07, Todd Troxell <[EMAIL PROTECTED]> wrote: > Noticing lots of admins tend to forget about /server-status, I typed at > random: > > http://www.cnn.com/server-sta