Re: [Full-Disclosure] Bios programming...

2005-03-04 Thread dk
Randall Perry wrote:
The program in question is quite legitimate in nature and already
exists in several forms.
So does porn. Infarct one can replace `program' with `porn' above and 
make the same kind of hollow point.
Mere existence and availability doesn't make it right, even if you make 
the personal choice to do so.

In some instances, it sends the data to 'accountability partners'
who are your chosen peers that monitor your activity.
Sounds benign enough at first glance, and I like the group portion. But 
do you have a study that backs up this method as mentally or emotionally 
sound? Or is this just geeks making up pseudo-science to peddle their code?

Think of it as AA for online porn.  Online porn has become a
real problem for males age 12 to early 40's.
Porn is a human problem mainly due to society's variety in accepting 
and/or suppressing sexual matters in daily life. Religion has done as 
much harm in this area as it has done good. Re-modeling that system of 
"eye-in-the-sky" accountability and personal emotional suppression makes 
me feel we've learned little these past N-thousand years.

And no, this program (alone) is not like AA or NA. I am familiar with 
their methods and it places more open responsibility on the individual 
to learn to control themselves and respond face to face with a group.
This is having someone remotely MONITOR your activity and aggregate it 
however they choose. The direct human contact factor is out of the 
equation, which probably part of the clients original problem to begin with!
To accept that as long-term positive treatment of a condition should be 
appalling to a discriminating scientific mind.
Combine this with planned therapy by a professional (not just some 
divinity grad) and you /may/ make a better case to those of us who disagree.

Properly implemented, solutions to combat porn are good business.
That statement alone is enough to make me pause about your good 
intentions. How is it exactly that you intend to separate this type of 
exploitation of the individual from the exploitation they are trying to 
be rid of? You & the Porn supplier are both doing it for a profit. Since 
the client says they want it it's ok then? That's what got them into 
their mess isn't it?

(mind you, this is not 'spyware' for parents.  this is targeted at
adults who are trying to curb their own behavior).
True. But I would *NEVER* trust a programmer to address a (possible) 
psychological/behavioral problem, that's just silly. A xx$ program to 
"monitor" them is no replacement for Professional Psychotherapy, period.

Those who are not aware of that epidemic should sit quietly and
not scoff at the efforts of others.

(I was going to bite my lip until you said that.)
No, one should not just be quiet Randy; _especially_ because I disagree 
that what you are doing is good for the individual or the society that 
they live within. Though I like how you softly framed the statement to 
reinforce that speaking implied ignorance. I'm rather surprised you've 
the gall to actually type this on a Full-Disclosure list.

Whether this is an "epidemic" as you call it, is debatable as well. This 
just smells like more pious, pseudo-religious proselytizing & labeling 
that I've had to endure in America all my life. Must it infect 'net too? 
 Silly question, I know.

That the Internet (post '95) has cast a wide net to surprise the 
unprepared with pornography is true enough. But that's a problem of how 
each society teaches it's members. Calling it an epidemic just 
sensationalizes it and makes it good for marketing and evangelizing.

I've a feeling social piety and taboo play a large role in the 
individuals dysfunction and attraction to porn. So social treatment and 
education is a better path than hacking up some code over night to make 
a buck. That just stinks Randy.


Good luck with the project,
it sounds noble at root.
The root of many human endeavors seem noble. Yet the unforeseen 
consequences keep bubbling up through history, no?

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Bios programming...

2005-03-04 Thread dk
Bill Humphries wrote:
1) It is easily circumvented.
2) It violates the privacy of other users.
3) It can easily generate false positives.
5) It could be exploited.
6) Who decides what is a 'suspect site'?
7) Trustworthiness of the Monitoring Organization
8) Trust vs. Pervasive Surveillance
I agree completely with 1-8. This project seems very short-sighted and 
ill conceived. Fraught with social and moral repercussions well beyond 
"those who are helped"... I don't care that other projects have claimed 
to provide similar solutions. Emulation does not imply correctness any 
more than a talking myna bird espouses Truth.
I also question that the knowledge/skill set of the O.P is not up to 
task, but that's solely based on his verbiage and lackadaisical 
sentences regarding CMOS, BIOS and the like.

Several people said they felt a legitimate need for this software citing 
"pornography addiction."

I've emailed a few friends who are in grad programs and clinical 
practice to confirm if there's an actual diagnosis of "pornography 
addiction". Sorry, the term feels loaded, like something tossed about 
during a congressional hearing.
I spoke with two Psych PhD. friends about this over lunch today, one 
male one female. They both expressed concern over this approach; 
likening it to medicating a client without proper diagnosis or therapy. 
One commented that if such an observable "pornography addiction" exists, 
is it likely part of a much larger sexual dysfunction that could 
actually be exacerbated by this type of behavior modification. Not to 
mention what it could possibly grow into once the conditions feeding the 
behavior change. i.e. the electronic chastity belt is removed or breaks; 
or the "addiction" takes on a different expressive form; or...

Personally I find outrageous that we continually mis-classify and over 
simplify cultural problems and try to devise such technological 
solutions to limit human behavior. The fact that this was honestly 
posted to Full-Disclosure as a serious question demonstrates the already 
flawed approach being taken.

[snip very good AA comparison]
And when, if ever, do you build trust with the person who you have said 
you have harmed? It strikes me as too easy to leave the secret policeman 
on forever. But now there's a third pillow in that bed, and I get the 
feeling that you do not condone polyamory.
I get the feeling that this may be motivated by a religious association 
with an agenda besides just specific sexual dysfunctions, then again 
perhaps not. The site at www.dynamicanswers.com seems very MS/Win32 
centric, so while I expect the O.P. to be well versed in win32/mfc 
solutions, I do no suspect much else. Which is what this undertaking 
would require. Either way, people tend to over step their bounds of 
experience when providing solutions. To them I would say: Most times you 
are not there 5 or 10 years later to clean up the mess you helped make; 
albeit with misguided good intentions.

How does that old quote go?
That's why I made those remarks comparing your plan to the abuses of 
Mao's Cultural Revolution. You privatize the intrusive, something which, 
until recently, was the domain of totalitarian states.
"Privatize the intrusive" that's very excellent and succinct Bill. 
Though in a way, I'd submit that The Church has had their hands in this 
too (God is watching you, etc...) Though "privatize" may not exactly fit 
that, they construct systems for similar goals: Control.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Bios programming...

2005-03-04 Thread dk
Matt Marooney wrote:
{snip}
> I'll disregard the troll comment as this
is the first time I've NEEDED to post anything to this list.  I've been
reading it for years now.  Thanks.
Aww then, you really have no excuse for this post Matt. It's off-topic 
and the scope of your "problem" covers too much ground. :)

That said: I think you need get off a mailing list, throw down some hard 
cash, hire a EET and someone that can /really/ write code for an OS, 
*PROM chips, embedded systems, etc. But I think this is a rather 
involved scenario that is gonna take a lot to provide a real working 
solution, so I hope you have some funding and patients. Just go hit up a 
hungry DeVry/ITT grad or something if you need a shoe-string budget.

While you do sound sincere Matt -- though a bit naive, if you don't mind 
me saying -- I think the business model for this device is morally & 
socially bankrupt and sets a bad precedent all around. I don't care if 
other people have done it already, it doesn't make it right (see precedent).
I question any ethics of monitoring a person, even with their leave & 
even if it is for an *evil* addiction. They obviously don't have good 
judgment about the consequence of their actions to begin with, no? Why 
do we assume that they are of sound mind about the choice of giving this 
type of consent?

In a light hearted tone:
	This sounds much like all the variety of exercise equipment that is 
pandered out to Fat Americans who just want a quick fix to their 
problem. A but later the expensive machine ends up sitting in a garage, 
unused, until it's thrown away & the person remains fat.

In a heavier tone:
	I ask you to please, _please_ question who you are working for and how 
else they could use this after you are gone. Swords cuts both ways Matt, 
as I'm sure you know. Would you like this used against you to stop you 
from practicing religion online? Politics? What if the technology gets 
exported and helps a regime to monitor it's citizens to maintain control?

Anyway. I think this is the wrong solution to the actual problem. I 
would much rather these clients spend money on a good psychoanalyst than 
some half-baked technological chastity-belt solution. Especially if this 
money is derived from Tax's. The problem lies WITHIN THE PERSON, not 
within the device delivering the porn. Do you have hard stats that this 
approach really works for the client and community? Or do you just want 
to profit off of their problems while believing you are helping?
It smacks of like letting a recovering Alcoholic keep beer in his/her 
house, but with some $3000 filter on the lid to only provide H20 when 
drank? AA would be cheaper and more effective.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] New Internet Explorer Beta

2005-02-16 Thread dk
William Lefkovics wrote:
--[snip of Gartner babble]--
Will,
	You know (as a comparison) one could argue that much of what gartner 
says is a good "backup source" for the masses to listen to when one 
lacks the experience to form their own opinion. Of course I'm joking a 
bit here; but personal experimentation reveals more than corporate 
quotation for sure, no?

I'm absolutely delighted that the decision to tie IE releases to Windows has
been reversed.
As I'm sure we all are... But do not confuse this with a good faith 
corporate gesture, or a dedication to improve the quality of their 
development for the community. This was purely a business decision with 
the consumers "quality-of-use" only weighed in $$'s.

And Firefox is no panacea.  
Very true, but it was not the goal of the project to be one. It is 
self-evident that no piece of software has ever been, nor ever will be 
completely bug-free. Aside from serving the needs on the individual user 
better, the Mozilla Foundation seems to have help effect a policy change 
in our planet's wealthiest & most ambivalent corporation; no small task.

Besides, I'd rather help a local farmer pick the bugs off his crops than 
blindly eat the bugs of Monsanto's.

> It is just another browser with a different set
of issues.  A good backup browser, really.  
Bah, I've used many other browsers on many OS's since ~94. IE has never 
been a first choice for many people. It did not facilitate the creation 
of the WWW & the web's purpose shall outlive it & others no doubt. IE's 
problems have always been exacerbated because of it's designed context & 
end purpose; making it easy for site developers & windows developers to 
deliver content with as little thought or time as possible. Depriving 
them from learning valuable lessons on responsibility and consequence.
Naturally this ease of use applies to the malware authors as well. Hence 
this constant use of IE as an exploitation vector, regardless of market 
share held.
I believe the latter is demonstrated well enough through the spam 
phenomena we all suffer. Though the perpetrator clearly knows only a 
small share will ever even see the spam, they continue in mass-volume to 
reach those few until true diminishing returns are hit.

One thing that can help you distinguish a similar program from another 
is the developers timely response to bug reports, vulnerabilities, and 
the vested interest in the use/creation of the software to begin with.
Not to mention the availability to easily read & modify the source code. 
Little is hidden from you with some breed of apps; you can be in full 
control if you so desire. In this, IE and Firefox diverge greatly.

In the end, things can thrive with diversity. I welcome a future where 
many browsers, servers, programs, os's (etc) are used by the internet 
populace... If merely for an aesthetic reason, mono-culture is rice cake 
drab.
:)

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Slackware Security updates

2005-01-26 Thread dk
KF (lists) wrote:
There is nothing yet for this year but this would be a good start...
[snip]
This is not to say that all of the slack packages are updated, or secure 
of course. Just nothing has been released recently. :)
Slack is mainly a one-man-show these days. As it seems that Pat's been 
pretty sick recently, the distro has slowed down on patch releases a lot.

I have always read other distro's announcements and then rebuilt the 
affected apps on slack from source if there was to "official" patch.
But recently I've been moving mission critical servers to more "active" 
distros to better follow security fixes on stock packages
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] 2 vulnerabilities combine to auto execute received files in Nokia series 60 OS

2005-01-24 Thread dk
Paul Kurczaba wrote:
Wouldn't the phone try to open the jpg file as a picture, and not execute
it. Just like on desktop PCs: if you rename a .exe (application/program) to
a jpg (picture file), and try to open the file, your image program will open
the file, thinking it is a image file. The application code will not be
executed.
Just because one peculiar desktop OS for PC's (MS' variety) chooses this 
action does not indicate that others do; especially where embedded 
systems are concerned.
There are many ways it can be done.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] harddisk encryption

2005-01-20 Thread dk
dk wrote:
Indeed, crypto, sans re viewable source, is questionable if for no other 
reason. Am I (or you) personally capable of reviewing all that source? 
Maybe, maybe not. But it offers that opportunity to a community that I 
can become familiar with to make and informed decision.
Forgot to mention:
http://sourceforge.net/projects/loop-aes/
...if you ever decide to use Linux as a host OS.
No kernel patches required (optional).
Just the stipulation of module loading & the internal LOOP driver 
(loop.c) to be a module. So a Kernel recompile is necessary if this is 
not set already and a patch-n-recompile of some net-utils files 
{mount,umount,losetup & swapon)

Very nice, very flexible, well maintained.
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] harddisk encryption

2005-01-20 Thread dk
Mike Klein wrote:
but you get source code too (which is usually
the case with truly proven crypto technologies).
Indeed, crypto, sans re viewable source, is questionable if for no other 
reason. Am I (or you) personally capable of reviewing all that source? 
Maybe, maybe not. But it offers that opportunity to a community that I 
can become familiar with to make and informed decision.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Amazon.com is down

2005-01-14 Thread dk
Jianqiang Xin wrote:
It seems that Amazon.com is down. Is it related to any attack?
FYI, to remove local routing or DNS issues you should really check 
things like this (via IP) from >2 geo-locations before mailing, then 
post the relevant trace-routes, etc.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Possible apache2/php 4.3.9 worm

2004-12-27 Thread dk
DanB UK wrote:
Do read the code carefully though Dan. Right off hand I can see errors
that were also in the code posted to bugtraq on the 20th; K-OTik may
have added more, dunno.

It is probable that they have added errors in. To curb the script
kiddies picking things up and modifying it and releasing it.
Yeah, I think it has been mentioned here that K-otik does this with 
their posted code, which is fine by me. :)

I have a bit of a worry about that and my talk, whether or not to
release my sample code. It could be used quite evilly if the intention
was there. I probably won't.
I have had concern about this as well, but remain a staunch supported of 
the Full Disclosure concept sprinkled with some common sense. With the 
time to live for virii/worms/exploits this year (from disclosure of bug 
to malware exploiting it) it's obvious that the "bar" is getting 
progressively lower each year in regards to the skill set it takes to 
develop this code. Which is a shame, as developing that skill over time 
lends itself to a better understanding of the responsibility that comes 
with it.

So a PoC or code that is missing key parts (that a skilled person could 
decipher), or an Advisory that informs the author(s) before the general 
public seems a socially responsible way to address bugs in our current 
climate. It /is/ hard not to share your work with others, and ultimately 
 does everyone a disservice in the end not to disseminate the knowledge. :)

	There has been an interesting discussion regarding this on Bugtraq in 
regards to Prof D. J. Bernstein's class "MCS 494: Unix
Security Holes" at UofI @ Chicago.
I was a bit surprised how vocal both he and one of his students, 
Jonathan Rockway, were in the thread(s) concerning disclosure; but it 
was nice to see them participate in it (and disclose the bugs they found 
in the first place of course).
Yet they both seemed to disassociated themselves with many of the 
real-world effects their disclosure decisions have. It would seem the 
comfort of Academia colors things to those within it's walls. It was a 
shame to see an obviously intelligent, skilled & adept math/cs professor 
miss the mark on some of the social implications his work has on the 
world -- outside of the constrained scope of his coursework.

To me, it just highlighted the very problem he was trying to address. 
Namely, that some individuals or teams do not take responsibility for 
their actions outside of the limited issues they directly identify with; 
whether that be application coder or bug hunter. :(

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] OpenSSH is a good choice?

2004-12-24 Thread dk
Willem Koenings wrote:
On Wed, 22 Dec 2004 02:40:25 -0600 (CST), Ron DuFresne
<[EMAIL PROTECTED]> wrote:

I'd disagree in that the tools are getting to be well enough defined that
we are all targets.  Best game is to restrict who has access to the ports
being served whenever possible, openssh has a history that makes this a
good service to limit this way.  Little need to hide what's not openly
allowed to all.
take a recent phpBB worm Santy for an example. worm seaches
automatically targets via google - it searches
viewtopic.php. if, for an example, you change that file name to
something else (and also all the referrings inside the phpBB so that
everything still works), then Santy does not find you phpBB as a
target. this is only an illustration to my point.
(Hi there. sorry for butting in.)
This concept does work for a little bit... As it is exactly what I did: 
using the same highlight hole to rename viewtopic.php to viewtopic1.php 
for a friend who was unreachable during the worms first hit. But it also 
took me only a few minutes messing with the query that the worm used to 
mod it to make /some/ schemes like this into account on the next google 
indexing - and my current perl 5killz are not uber. ;-/
I just mention it because non-std mods to anything can breed a different 
sort of complacently. In the end it's the same ole' game I guess.

i wrote my post because you say "the non std port advice is not worth
much". i have lot of cases, when non standard configuration reduces
first impact greatly. of course you shouldn't rely only to non
standard ports/configuration, but it is not totally worthless - it
often helps you a lot.
I too agree that it's not worthless for certain usages, especially as 
you mention: on first impact. But depending on context it _can_ create 
more burden on the admin later when you must recall what non-standard 
changes /you/ made to the application or source package when upgrade 
time comes around. Files may not be patched/removed due to name changes 
and could be left available for future exploits. These custom changes 
may also open you to other issues in the future... like putting ssh on a 
high port that turns into a popular p2p port in a years time and it 
hammers your logs or some such. 

Anyway - In this specific case, if the OP wanted to further restrict ssh 
from pre-auth bugs a system like fwknop[1] or SAdoor[2] would work 
better to open the std port 22 (or what ever) than simple port knocking.

[1] http://www.cipherdyne.org/fwknop/
[2] http://cmn.listprojects.darklab.org/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Possible apache2/php 4.3.9 worm

2004-12-22 Thread dk
Barrie Dempster wrote:
On Wed, 2004-12-22 at 09:03 +, DanB UK wrote:
Hi,
I was wondering if anyone has a sample of this.
I'm giving a talk at 21c3 and would like to provide some analysis on it.
Cheers,
Daniel.
http://www.k-otik.com/exploits/20041222.sanityworm.pl.php
Do read the code carefully though Dan. Right off hand I can see errors 
that were also in the code posted to bugtraq on the 20th; K-OTik may 
have added more, dunno.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] I'm calling for LycosEU heads and team to resign or be sacked

2004-12-07 Thread dk
[EMAIL PROTECTED] wrote:
On Fri, 03 Dec 2004 21:52:30 GMT, n3td3v said:
I think heads should roll over this. I think its the worst act a
corporation has ever undertaken in the history of the internet.

Hmm.. I don't know.  Verisign's hijacking of *.com wildcards and several
different Microsoft stunts may very well outweigh this one.. 
Well put. Excellent point (verisign).
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Network Sniffing

2004-11-30 Thread dk
Kyle Maxwell wrote:
Also etherape.
Just to round the 'eth*' out.
ettercap
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Lycos Europe organizing a DDoS attack against spammers

2004-11-30 Thread dk
Andrew Smith wrote:
This seems to have annoyed quite a few people, makelovenotspam.com is
randomly responding to GETs.
How long untill someone gets a domain in their list and points it at
the lycos servers?
Yes, the site in question seems to have drawn more than a few eyes to 
it. ;/ It's been up & down all day.
While I don't really think "lycos Europe" methods are sound or 
sustainable; I'm not surprised that frustration with spam leads to a 
measure of corporate vigilantism. I suspect we may see more of this 
various venues to come. Though I doubt it will really help cure whatever 
cause the reaction. Hopefully the p2p clients won't pick up on the scent 
and throw a few GETs out for each search done, etc.  >:)

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Lycos Europe organizing a DDoS attack against spammers

2004-11-30 Thread dk
Feher Tamas wrote:
Lycos Europe organizing a DDoS attack against spammers
OT but:
This hit slashdot 4 days ago, and it would seem many noticed that it is 
not "really" a DDoS as they claim to throttle the B/W. Anyway -- the 
expected discussion ensued This was the best to cover the point at 
hand. :)
http://it.slashdot.org/comments.pl?sid=130908&cid=10928977

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: AW: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread dk
Robert Marquardt wrote:
IBM court case, where SCO claimed certain rights over *periferic* 
parts of the

A Hungarian record label contributed to the Linux Kernel? awesome...
:D
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread dk
Elia Florio wrote:
 I remember the "Ducky Adobe" strings in the
crafted JPEGs of GDI+ bugs.maybe just a coincidence?
 

Dunnoo about that  but it would lend credence to the idea that 
`they' are windows users (at least for image editing) or we'd see a 
"Created with The GIMP" or some such, no?  ;)

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Why is IRC still around?

2004-11-20 Thread dk
james edwards wrote:
It is not IRC that is the problem, it is the people on IRC that cause
problems.
Guns don't kill people all by by themselves; people kill people.
 

but it's the holes they make that really do 'em in, no?   %-)
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Why is IRC still around?

2004-11-19 Thread dk
Danny wrote:
Sorry to offend those that use IRC legitimately (LOL - find something
else to chat with your buddies), but why the hell are we not pushing
to sunset IRC?
 

Many people use IRC; and still do. It's a legitimate medium I've used 
since the 80's for it's intended purpose. Your "abolish" idea is, to be 
honest, a bit simplistic don't you think?  Let's just cut through the 
proselytizing and ban this whole "Internet" thing, that'll stop 'em. :)

What would IT be like today without IRC (or the like)? Am I narrow
minded to say that it would be a much safer place?
 

Path of least resistance. If not IRC another venue would be used.
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: U.S. 2004 Election Fraud.

2004-11-11 Thread dk
[EMAIL PROTECTED] wrote:
Depending on your state/county/whatever, your vote did count a LOT LESS
than other votes. It all depends on how many electoral college votes your
state has.
How does that feel? Knowing that someone elses vote is more important 
than
yours?
 

The US is a federal republic governed by _representative democracy_, so 
this is they way it is /supposed/ to work it would seem.
US citizens need to be more active in choosing the state Senators & 
Representatives that allow them electoral votes, and more careful about 
what types of people are choosing the actual electors. In the end 
though, these electors /are/ free to vote as they wish in many states, 
regardless of what The People voted for. :(

So I could feel fine that it is working as designed... It's of course 
flawed, but it possibly beats a "Mob Rules" popular vote majority that a 
direct democracy provides, especially for a diverse nation of former 
immigrants like the U.S.

Hell who knows... this is all OT anyway.
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Moox firefox/thunderbird builds. Anyone looked at these yet?

2004-11-10 Thread dk
Eric Paynter wrote:
I wonder why somebody would branch just to do performance improvements?
Why not just work with the mozilla team and apply the changes to the
source tree?  

Well a cursory look at the forums suggest that there is indeed a 
performance gain, and a bit of a following to these builds as well. I 
gather then that it's a stability issue (etc) with the Official Mozilla 
team not using his compiler flags, etc for optimization, which makes 
complete sense in a number of area's (QA for one).
There is also suggestions by other posts [1] that he takes patches not 
integrated into the "official builds", so I gather that he's adding to 
the code himself in places. All of which is fine and dandy by me; the 
guy looks respectful of Mozilla trademarks, (etc) and rather helpful in 
providing this resource.
But as I couldn't find the source he compiles from, (post patches) or 
work he's done /other/ than binary files -- it just smelled a bit funny.

Or maybe I'm just a super paranoid security professional.
 

Nothing wrong with that now is there?  :)
[1]   http://www.moox.ws/forum/viewtopic.php?t=29
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Moox firefox/thunderbird builds. Anyone looked at these yet?

2004-11-10 Thread dk
Aside from all the (TM) issues with Mozilla I was wondering if anyone 
has scrutinized these builds from Moox?

http://www.moox.ws/tech/mozilla/
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Beta Advisories

2004-07-08 Thread dk
System Outage wrote:
I don't think it's garbage. I bring up a valid point here.  If you 
must, filter me out.. don't be lazy.
 
This brings up the question of guidelines the OIS wish people to follow.
Gads *I* thought filtering your "old topic" ramblings for 24 hours would 
be good enough. Move on and quick acting like a fscking troll already. 
You obviously have some skill. Use it to evangelize your belief's 
instead of your droning words, they're only interesting to yourself.

shit.. I just fed you didn't I? Damn me.
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-09 Thread dk
mark wrote:
I found the fix for it.
http://tinyurl.com/37p35
 

Failing that, there is always the old trusty:
http://www.fiftythree.org/etherkiller/
Which, like yours, is a holistic solution..
--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Breaking Laws Cisco's stolen code

2004-05-28 Thread dk
[EMAIL PROTECTED] wrote:
Charlie...
Put down the crack pipe and back away slowly.  You are surely not 
suggesting that this issue of Cisco's code has anything...at 
all...remotely...in common with the people and actions you 
listed...seriously...you're kidding...right??

Bart Lansing
Manager, Desktop Services
Kohl's IT
CONFIDENTIALITY NOTICE:
This is a transmission from Kohl's Department Stores, Inc.
and may contain information which is confidential and proprietary.
If you are not the addressee, any disclosure, copying or distribution 
or use of the contents of this message is expressly prohibited.
If you have received this transmission in error, please destroy it and 
notify us immediately at 262-703-7000.

CAUTION:
Internet and e-mail communications are Kohl's property and Kohl's 
reserves the right to retrieve and read any message created, sent and 
received. Kohl's reserves the right to monitor messages by authorized 
Kohl's Associates at any time
without any further consent.

Wow.
Well Charlie's post was - at minimum - entertaining. Not to mention a 
bit thought provoking on where different peoples of similar ilk may take 
different turns on the morality (or duty) they apply to modern technical 
issues aside from what they are instructed to do by black-letter law. It 
also speaks to the wonder of issues we may have to face in the future 
with situations that indeed *will* have much in common with the souls 
mentioned. "We" always repeat the same old mistakes in each new venue we 
create. At some point laws & regulations should always be questioned, 
they don't just change themselves. These questions seem to come at the 
oddest times, over the oddest things sometimes...

Anyway: The body of his message was filled with interesting content. In 
the future, perhaps you might restrain from mocking messages that are at 
least shorter than your overly-broad, vague, fear-clad corporate 
boilerplate sig. Are you actually required by corp policy to include 
this most droll thing *every* time you send mail?

Gads, step away from the Memorial Day "Bonus Buys", get out of the 
cubicle and turn off the fluorescent lights. Go check out your 
reflection in a pond, go for a walk, stare at some fish Bart.

--
dk
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] A rather newbie question

2004-05-03 Thread dk
Harlan Carvey wrote:

> While I think you have a point I also think Ethan has one too. It
> is important to remember that users are generally clueless and/or
> unconcerned with security. Of course I'm grossly generalizing but I
> think you get my point.
 Yes, I can agree with that...I do get the point. But who are the
 users? Say you're an admin at a law firm...if the users are supposed
 to be security-conscious (face it, a great many admins lack even the
 most rudimentary security awareness), then shouldn't the admins be
 required to have a law degree, also? How about a hospital...shouldn't
 each admin then have to have a medical degree?
Degrees? No. This is impractical for most business models.  But to be 
motivated
by the modern day necessity of user awareness and responsibility that comes
with the power of our computing machines - defiantly.

Barring that, they *must* be made aware of the risks they place on their
organization by using technology that they can easily mishandle. If they 
feel
this risk is acceptable, or even necessary given the current economic woes,
then that is the CEO's or B.O.D's call. Our job is to make (and keep) them
aware.

I admin a small Architectural Firm with a mix of OS's, mailservers, 
webservers,
specialized applications, workstations, laptops, plotters, printers... 
etc...
Basically anything that has electrons move through it I am expected to have
knowledge of or at least have the number to someone who does (I don't do
Copiers).  I am also to create and manage the electronic document 
standards for
the CAD applications and electronic document submittal, research new 
means and
methods, etc, etc, on and on.

Point of my rambling here is: When I am not doing one of the above (My
primary job description) I am fully expected to fill in for 
Architectural Design
and do the job of a 1st or 2nd year Architectural Intern that has a 4 year
degree in Architecture.  I do all of this, for less than 30k yr and neither
posses a Degree in any of the Computer Sciences nor in any of the 
Architecture
fields. (And for bonus points, if you carefully read my sentances you 
will see
that I do not possess a Degree in English either! :)   ) I am never 
given time
to research or practice the Architecture side of my job, but I am 
expected to
do it to a degree FAR greater than most admins ask the users to educate
themselves about "The Computer" or "Windows" when they have spare time.

I would love to trade shoes with them for a week and see how we'd both fare.

 I agree that harmless joking is fine...but I've seen instances in
 which that harmless joking became part of the admin's vocabulary,
 even in front of those same users.
Well I think this may come from the frustrations of the modern American
Business outlook that the "Computer" is nothing but a big typewriter 
glued to a
Fax machine that produces money when the right keys are pressed
And perhaps in part because most "Admin's" are expected to fill many
more shoes than the co-workers they support.

So I've called my users, lusers for years to ease the frustrations that 
I must
endure daily in slowly repeating attachment mantra's, how to sync your palm,
how to change your background, why the "internet" is broke on their 
laptop (hint:
plug in the blue cable Boss)

If *I* handled myself in an equal but opposite manner in regards to my 
assumed
"Architecture responcibilities", I'd be out of a job.

I just want that door to swing BOTH ways. Until then, they are the 
Lusers and I am
the Long Haired Freak giving up another Sunday evening tweaking the 
Bayesian filter
so sweet Edna over in Accounting can get her Amway newsletter.

But Edna ain't so sweet
when late is my timesheet,
or even incomplete.
:)

--
Dave
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] stenagrophy software recommendations

2004-03-25 Thread dk
[EMAIL PROTECTED] wrote:

hi people
i'm looking for a very simple,reliable, small (certainly less the 1mb),
must-have gui, windows,  stenographic encryption program. i'd appreciate
any recommendations.
thanks
xlop
If your gonna go to the trouble of using steg, do it right. Drop the GUI, get 
a shell account and use steghide.

http://steghide.sourceforge.net/

--
Dave
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html