Incident Information:-
Database: d:/lotus/domino/data/mail2.box
Originator: [EMAIL PROTECTED]
Recipients: [EMAIL PROTECTED]
Subject: Test
Date/Time: 05/12/2004 12:31:30 AM
The file attachment doc.zip you sent to the recipients listed above was infected with the W32/[EMAIL PROTECTED] virus and
- Forwarded message from Don Marti [EMAIL PROTECTED] -
From: Don Marti [EMAIL PROTECTED]
Date: Mon, 10 May 2004 18:29:00 -0700
To: Linux Elitists [EMAIL PROTECTED]
Subject: Re: [linux-elitists] Two on RFID from Politech: Hack the tech,
Gilmore's dystopia
User-Agent:
Our virus detector has just been triggered by a message you sent:-
To: [EMAIL PROTECTED]
Subject: Re: Hello
Date: Wed May 12 18:22:06 2004
One or more of the attachments (Nervous_illnesses.cpl) are on
the list of unacceptable attachments for this site and will not have
been delivered.
Hi, my name is Jennifer, Or just Jen for short! ;-)
My friend said you were a really cool person and I should get in contact with you!
I looked at your profile and thought I would contact you.
I love meeting new people, I also love to talk. I just got my videocam working
so you can see me
Chheap softtwares for you, all are original 0EMMajor titles from MICR0S0FT and AD0BE for Rock Bottom prriiceGreat Bargaain Sa1e! Variety discoount softtwares at wholesale chaeap pricing!
Microsoft Wind0ws XP PR0fessional - my priice: $50normal priice: $270.99 ; you saavee $220
Microsoft
Today is a new day for your residence. With levels
at their headline-making historic lows, our programs
are better now than ever before. Even if you've recently
closed on a property, now is the time to check your
numbers.
Our advisors are here to help you decide your options.
In fact, did you
At 06:16 AM 5/13/2004 +1000, Ian Farquhar [EMAIL PROTECTED] wrote:
I would almost bet money that the commercial interests currently
evaluating RFID tags will push for a legislative ban on RFID jamming.
And I'll bet they get it too.
I really won't matter what they prohibit, it will get out into the
RFID jamming should be very easy and a quite amusing DoS attack
on commercial targets. Easy because its not frequency hopping, low
power, and relatively low frequency. Particularly cute would be
transmitting sex-toy codes intermittently.
Considering the transmitting powers of the tags, an
http://www.nytimes.com/2004/05/10/technology/10crypto.html?pagewanted=printposition=
The New York Times
May 10, 2004
Illuminating Blacked-Out Words
By JOHN MARKOFF
European researchers at a security conference in Switzerland last week
demonstrated computer-based techniques that can identify
On Tue, May 11, 2004 at 09:10:35PM +, Jason Holt wrote:
[...] issue [...] would be how you actually get your certs to the
other guy. Hidden credentials, as Ninghui pointed out, assume you
have some means for creating the other guy's cert,
[...]
The OSBE paper, OTOH, assumes we're going
On Tue, May 11, 2004 at 09:10:35PM +, Jason Holt wrote:
[...] issue [...] would be how you actually get your certs to the
other guy. Hidden credentials, as Ninghui pointed out, assume you
have some means for creating the other guy's cert,
[...]
The OSBE paper, OTOH, assumes we're going
At 03:09 PM 5/11/04 +0200, Eugen Leitl wrote:
The second covers a hacking the system concept. I'd considered
something similar myself, though different in approach. Rather than
finding RFID chips and redistributing them, why not create
programmable RFID broadcasters which could spoof other
For immediate release: May 12, 2004
Libertarian Futurist Society announces Prometheus Award finalists, and Hall of Fame finalists.
The Libertarian Futurist Society has chosen finalists for its annual Prometheus Award for Best Novel and its annual Prometheus Hall of Fame for Classic Fiction. The
On Mon, May 10, 2004 at 02:31:18PM -0400, Tyler Durden wrote:
So a HS kid, living with his parents, is able to write a worm that takes
out millions and millions of computers throughout the world running the
latest MS OS. Uhshouldn't we arrest Bill Gates first?
The decision is rational,
On May 12, 2004, at 12:47 PM, Major Variola (ret) wrote:
At 03:09 PM 5/11/04 +0200, Eugen Leitl wrote:
The second covers a hacking the system concept. I'd considered
something similar myself, though different in approach. Rather than
finding RFID chips and redistributing them, why not create
You might want to look at the work RSA Labs is doing on 'blocker tags'.
These are special tags which leverage the mechanism used to disambiguate
the presence of multiple tags to make it look as if you are carrying
2^n (n usually 128) different tags at once.
They propose a protocol to make them
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Major Variola (ret) wrote:
| RFID jamming should be very easy and a quite amusing DoS attack
| on commercial targets. Easy because its not frequency hopping, low
| power, and relatively low frequency. Particularly cute would be
| transmitting sex-toy
ASK any Elmer you happen to see,
what's the best jamming, RFID..
(With apologies to the tuna industry and those too young to
know the jingle. Or to know the RF double meanings.)
Interesting cultural reference that goes entirely above my head with a
cute swooshing sound.
Care to explain,
RFID jamming should be very easy and a quite amusing DoS attack
on commercial targets. Easy because its not frequency hopping, low
power, and relatively low frequency. Particularly cute would be
transmitting sex-toy codes intermittently.
Considering the transmitting powers of the tags, an
http://www.nytimes.com/2004/05/10/technology/10crypto.html?pagewanted=printposition=
The New York Times
May 10, 2004
Illuminating Blacked-Out Words
By JOHN MARKOFF
European researchers at a security conference in Switzerland last week
demonstrated computer-based techniques that can identify
20 matches
Mail list logo