proper A/B testing
to get your ROI.
I guess, now you are wondering how to and where to start.
It’s easy! You can reply me back for a *free website analysis report* or
contact me on below mentioned numbers to discuss further.
*Best Regards,*
*Robert Wesley*
*Digital Marketing
I am a new user of Scid, so I suspect this has been discussed before.
I really wish that the score displayed in the tree window could update to show
black's score when black is to move.
It seems imprecise to me to always display the score for white. In the current
setup, it would seem that one s
When will the next SCID update be released?
Thank you
>>> 2/24/2011 2:42 PM >>>
Send Scid-users mailing list submissions to
scid-users@lists.sourceforge.net
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.sourceforge.net/lists/listinfo/scid-users
or, via email, send a
Alex,
Wow, I guess I had my head in the sand. I didn't notice the release of 4.3.
Thank you!
>>> Alexander Wagner 2/24/2011 3:41 PM >>>
On 02/24/11 20:58, Robert Wesley wrote:
Hi!
> When will the next SCID update be released?
4.3 is just up for some days.
h
.071607.pdf
http://www.politechbot.com/docs/fbi.cipav.sanders.search.warrant.071607.pdf
--
Robert Wesley McGrew
http://mcgrewsecurity.com
___
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a
As far as your code is concerned any number that suits
(real_vuln_protocol)+256*n should crash the machine. However, this is
meaningless, since, as you say, the IP header's protocol field is only 8
bits, so you can generate larger numbers all day, but only your
least-significant 8 bits are being
Good of a point as any to jump into this, with a couple of questions to
steer conversation towards something resembling productivity ;). For the
record, I support full-disclosure with "reasonable" vendor notification,
taking into account a time to acknowledge and a time to patch, and I also
suppo
vchost.exe process"
On Mon, 28 Jul 2003, Robert Wesley McGrew wrote:
> 2) For this DCOM RPC problem in particular, everyone's talking about
> worms. How would the worm know what return address to use? Remote OS
> fingerprinting would mean it would be relatively large, slow, an
On Mon, 28 Jul 2003, Schmehl, Paul L wrote:
> > 2) For this DCOM RPC problem in particular, everyone's
> > talking about worms. How would the worm know what return
> > address to use? Remote OS fingerprinting would mean it would
> > be relatively large, slow, and unreliable (compared with
> >
Just got around to looking at it, and from where I sit, it appears to be
merely an annoyance, apart from fringe circumstances where discernable
audio output from a workstation is critical and is disrupted by this. In
that case, any bgsound, remote or local, is undesirable.
The file accessed is l
n for legitimate purposes. I believe
that anything that would prove to be as nice of a chat setup for
legitimate users, would be just as convenient for illegitimate
purposes.
--
Robert Wesley McGrew
http://cse.msstate.edu/~rwm8/
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
n flaws of their own:
>
> POC:
>
>
> POST http://www.0x90.org/passwd/index.php?password=";>Oh
> Noooeeess!!!
>
>
> doh..
>
> ___
> Full-Disclosure - We believe in it.
> Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
> Hoste
do know how to check
> some of these things but am looking for someone who is very knowledgeble and
> is willing to answer questions about this OS.
>
> Gene Smith
> Federal Reserve Bank of Minneapolis
> IT/ Telecom 612 204 6355
I know I feel like the Federal Rese
Shameless self-promotion:
http://cse.msstate.edu/~rwm8/googlesweep/-- Robert Wesley McGrewhttp://cse.msstate.edu/~rwm8/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
--
Robert Wesley McGrew [EMAIL PROTECTED]
CCE GREM SSP-CNSA GWAS
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
nt to poke at the ports a little more by sending
some data.
I've posted some pcap dumps illustrating the difference, in case
anyone wants to see without having to go through all the set-up:
http://www.mcgrewsecurity.com/blog/?p=8
So, awesome work! It's a shame you
be I missed it,
but I don't even think anyone mentioned yahoo up to this point in a
way that would provoke this.
I guess I just don't get it.
--
Robert Wesley McGrew
http://cse.msstate.edu/~rwm8/
___
Full-Disclosure - We believe in it.
te:
> Do you get this? http://news.bbc.co.uk/2/hi/americas/4190926.stm
>
> You have a moron as a president.
>
> Some things will never be understood.
>
>
> On 8/27/05, Robert Wesley McGrew <[EMAIL PROTECTED]> wrote:
> >
> > I gu
http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
--
Robert Wesley McGrew
http://cse.msstate.edu/~rwm8/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
nux, as this was one way to
exploit it.
--
Robert Wesley McGrew
http://mcgrewsecurity.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 5/24/07, Suzuki Kawasaki <[EMAIL PROTECTED]> wrote:
> Was OpenBSD owned ... http://www.openbsd.org
It's just 403'ing for me at the moment. Why? Did you see something
more interesting?
--
Robert Wesley McGrew
http://mcgrewsecurity.com
_
On Thu, May 13, 2010 at 10:26 AM, Ben Greenfield wrote:
> This may stir the political pot some, but Takedown by John Markoff and
> Tsutomu Shimomura is an outstanding read as well. In my opinion it's
> really the next logical step after The Hacker Crackdown by Bruce
> Sterling (which is required
On Thu, May 13, 2010 at 9:44 AM, Rob Fuller wrote:
> Cuckoo's Egg was probably the best book I ever read on the subject, would
> probably make for an awesome audio book as well. Kinda skirting the
> Non-Fiction requirement though.
Excellent book. I handed my wife a war-torn paperback of it soon
On Wed, May 19, 2010 at 9:48 PM, Rob Fuller wrote:
> Experiment over. thanks, and sorry for the inconvenience. If, as you say,
> you combed your spam and found the email, you should have known who to talk
> to. But I understand the detriment to the list, as there might be others
> also missing out
Just make sure that he knows that if the "anonymous" report angers them in the
way that you fear, it will likely be a trivial matter for them to review their
logs and figure out what user has been poking around in that specific feature.
--
Wesley McGrew
On Thursday, January 12, 2012 at 3:2
Are there similar messages arriving at nonexistent email addresses at
your company? Is the CEO's email address a common, simple format
n...@example.com?
Maybe respond to it with a link that appears to be something
deep/internal to the company, see if they'll take the bait and reveal
something abou
ia.
>
> --chuck
It would be interesting to take a look at the .doc to see if they
stripped out the author/who-office-is-registered-to information, as
well as any other interesting meta-data.
--
Robert Wesley McGrew
http://mcgrewsecurity.com
__
27 matches
Mail list logo