Re: [Full-Disclosure] Erasing a hard disk easily
http://dban.sourceforge.net (boot floppy, works nicely) signature.asc Description: This is a digitally signed message part
Re: [Full-Disclosure] Temporary Files and Web Sites (swp, ~, etc)
Here's another thing: Don't put your db usernames/passwords in any file that is accessable from the web. (the don't have to be)If some other bonehead admin happens to replace your http.conf with a generic one, you don't want all your blocked files showing up automagically. Secondly, be aware that if you've got embedded usernames/passwords for db access on your system, they are generally not safe from other users of the system. -Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
RE: [Full-Disclosure] Electronic Voting Machines - WinVote by Adv anced Voting Solutions
Using 802.11 for anything remotely critical is outright STUPID. FCC regulations are such that these part 15 devices (802.11, cordless phones, baby monitors) have no legal protection from interference from licensed services (amateur radio, TV stations, etc). If I'm running a high powered (10-100 watt) maybe signal at 2.4 ghz for amateur radio TV and happen to be living across the street from an election center, they're basically screwed. As a matter a fact, if their 802.11 is interfering with my licensed operation, it is they who must shut down. -Michael > Without even commenting on the "security" of WEP, it seems to me that a > massive DDOS attack against the voting machines could prevent vote tallies > from being counted in a timely manner. signature.asc Description: This is a digitally signed message part
Re: [Full-Disclosure] Electronic Voting Machines - WinVote by Adv anced Voting Solutions
> > > Perhaps they need to invest in some of this... > > > > > > http://www.theregister.co.uk/2004/08/12/wifi_wallpaper/ > > > > Perhaps they need to invest in some of this... > > > > http://www.amazon.com/exec/obidos/tg/detail/-/B0J1V3 > > Definitely a better solution ;) > Or even better, one of these http://sprott.physics.wisc.edu/neural/BRAIN.GIF signature.asc Description: This is a digitally signed message part
Re: RE: [Full-Disclosure] Electronic Voting Machines - WinVote by Adv anced Voting Solutions
These power ranges are perfectly legal in (some of) the amateur radio bands. The 2.4 ghz ISM band partially overlaps the 2.4 ghz amateur band. Dangerous? Very. One use: Moonbounce communications. I've heard of people running 1.5kw into very high gain antenna arrays producing ERP's in the 1/4 megawatt range for moonbounce. This is still perfectly legal. (but using it as a weapon isn't) Now pointing the thing around and intentionally blowing the front end off of everything somewhat resonant (and popping eyeballs) with it would be illegal, but I'm only discussing incidental interference. -Michael On Fri, 2004-08-20 at 07:50, James Tucker wrote: > Of course the power ranges you quote are also illegal, not to mention > extremely dangerous. > signature.asc Description: This is a digitally signed message part
Re: [Full-Disclosure] The 'good worm' from HP
There are much better alternatives to using exploit code to install patches.The security folk at TAMU have come up with an in-line network sniffer automagically blocks infected machines and notifies them via an internal webserver of their infection. After a set time it allows them back on. (clever...motivates _user_ to clean/patch) http://netsquid.tamu.edu/ This is a _lot_ more responsible than running exploit code of any sort, even for a good purpose. I admin one particular windows server that I must actually wait for vender approval before applying any hotfixes. I'd be extremely pissed if some do-gooder net admin tried to patch my box via sploit code and ended up breaking it. (it is that fickle) -Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] The 'good worm' from HP
> Except that the scenario you describe isn't near complete. What will happen > is either it will get attacked by a benign worm (possibly breaking something) > or a malicious worm (definitely breaking something) only a short while later. > Which would you prefer then ? I'd prefer to not have to deal with systems built on house cards, but sometimes that's just not avoidable nor realistic. I can't deal with too much downtime either. > I think it is _your_ responsibility to shield your box from the internet the box _is_ fairly well shielded. > if it is that fickle and that important to you. I'm really wanting phase this P.O.S. out, but I will mention this sort of crap is not that uncommon of "turnkey solutions" in the windows world. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] Sending remote procedure calls through e-mail (RPC-Mail)
Someone could use an email scheme like this to to trigger an outbound secure shell connection with ports forwarded from the machine its connecting to back to the machine making the connection. In this way any firewall that allows SSH can be perforated. (now replace the afformentioned email sceme with dumb users)...I how much spyware already does stuff like this? This sure does demonstrate how _useless_ NAT really is for security. -Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] Sending remote procedure calls through e-mail (RPC-Mail)
I agree, but you'd be surprised how often it is used as such... I think this really applies to any network firewall that allows for outbound ssh. > Possibly because NAT isn't a security mechanism. signature.asc Description: This is a digitally signed message part
Re: [Full-Disclosure] Show me the Virrii!
> Saying Windows is to blame for the mess that we're in is like saying the > gun is what causes a murder and not the person that pulled the trigger. Well, it doesn't help things when the gun has the safety removed... Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] sco.com Press Release
> ...if they spent an average of 30 minutes cleaning the crap out > of their mailboxes... I'd say they need to consider a better mail client. I mean, really now... Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] InfoSec sleuths beware ...
And you think this could be reliably implemented on a mickeysoft platform? On Thu, 2004-02-19 at 08:07, Exibar wrote: --snip-- >I would think that a more controllable environment would be a laptop that > must phone home every 5 minutes of activity or gets securely wiped. Better > yet, an encrypted laptop where access to the sourcecode is limited to 5 > minutes and then you must FOB authenticate back into it. After 30 minutes > of activity and no FOB re-entry you must call back to Microsoft for a new > software FOB. After one hour of activity and no FOB authentication the > whole laptop becomes irreversibly encrypted and must be sent back to > Microsoft to be re-built. > >Ok maybe that's TOO secure :-) --snip-- Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
RE: [Full-Disclosure] Coming soon: CPU fix for buffer overflows
On Mon, 2004-02-23 at 20:38, Mike Barushok wrote: > (Note to the non-mathematically inclined: Yes, it might seem > difficult to believe, but a 4004 processor combined with > unlimited (countable) storage, can emulate the fastest super > computer, just not in 'real time'). What about a quantum computer? ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
[Full-Disclosure] mozilla firefox 0.8 - linux (probably mozilla too) cut/paste (semi) vulnerability
This isn't as much a typical vulnerability as it is poorly-designed behavior. I've noticed when cutting/pasting data (unix style, w/middle mouse button) into a Web form, any attempt to paste into an area without first clicking on the input will result in firefox doing a google search on the contents of the paste. If I happen to be cutting/pasting confidential data, this is bad. Michael ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] mozilla firefox 0.8 - linux (probably mozilla too) cut/paste (semi) vulnerability
> ..please. Do you paste confidential data into webforms often? :D Sure, Sometimes. I have a few in-house (intranet) Web-based utilities I use. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Re: [Full-Disclosure] Cisco IOS Source Code For Sale
Wow, this will be very useful in our world domination, err, I mean global marketing plans. Yeah. Here's all my Info...I'll pay you later in software licenses. We will embrace and extend IOS and provide features never before thought of. I can't tell you what these features will be because most will be a surprise (for us both). William H. Gates One Microsoft Way Redmond, WA 98052 US 425 882 8080 fax: 206 703 2641 (sorry guys, couldn't resist -- Michael) ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
[Full-Disclosure] lists, autoresponders, and netiquette
Every time I post to a list I get these "out of office" auto-responses. Can these responders be configured to not respond to stuff from a list? -Michael signature.asc Description: This is a digitally signed message part