Hi ppl:
Thanks to all those that tried to help me. I just can't read that much
mail. But thanks to almost all responses (except the ironic one please
save us both some time next time)
Since most answers are like this one I'll use this as reply (sorry
folks I guess this is the most optimized way f
Made a Zotob Worm Remover that removes the processes/files/registry entries
from variants A through G. includes MASM source code.
http://illmob.org/0day/Zotob_Killer.rar
- illwill
http://illmob.org
___
Full-Disclosure - We believe in it.
Charter: http:/
Not to mention this is hardly even assembly. This is like really ghetto
assembly. In REAL assembly, there would be no ".if" statements. It's all cmp
blah blah, jz, jnz, etc. Lot's more work. Also, there is no such thing as
.invoke MessageBox. Give me a break. In real assembly, that code would be
aco> btw illwill made something to block it, havent tested it myself but this
aco> might be useful to post it here:
aco> http://illmob.org/files/0day/msdds.dll_deactivator.rar
It sets the killbit that's all. A .reg file would have been enough but
then of course doing that in asm makes it all l33t
btw illwill made something to block it, havent tested it myself but this
might be useful to post it here:
http://illmob.org/files/0day/msdds.dll_deactivator.rar
KEY: 0xA7C69C5F
PRINT: 694C 3495 BCC4 2F8B D794 6BD4 AF8B 457B A7C6 9C
"Microsoft is concerned that this new report of a vulnerability in
Internet
Explorer was not disclosed responsibly, potentially putting computer users
at risk. We continue to encourage responsible disclosure of
vulnerabilities.
We believe the commonly accepted practice of reporting vulnerabilit
===
Ubuntu Security Notice USN-171-1August 20, 2005
php4 vulnerabilities
CAN-2005-1751, CAN-2005-1759, CAN-2005-2498
===
A security issue affects the following Ubuntu release
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 779-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 20th, 2005
Elm ( http://www.instinct.org/elm/ ) is a console-based e-mail
application. It suffers from a remotely exploitable buffer overflow
when parsing the Expires header of an e-mail message.
The attacker only needs to send the victim an e-mail message. When
the victim with that message in his or her inb
MS said:
"Microsoft is concerned that this new report of a vulnerability in Internet
Explorer was not disclosed responsibly, potentially putting computer users
at risk. We continue to encourage responsible disclosure of vulnerabilities.
We believe the commonly accepted practice of reporting vulne
10 matches
Mail list logo