[Full-disclosure] RE: Computer forensics to uncover illegal internet use

2005-09-03 Thread Craig, Tobin \(OIG\)
The opinions expressed below are my personal and professional opinions, and not the official position of my employer Apologies in advance for the long posting. What is this thing you believe in, an 'electronic crime against a child' ? Well, if you had actually taken the time to quote me

Re: [Full-disclosure] Re: router naming

2005-09-03 Thread Damian Gerow
Thus spake luka.research ([EMAIL PROTECTED]) [02/09/05 11:53]: : How about using FIPS-55. : Thanks : : In my modest opinion I think that with approach like FIPS-55 you can spread : precious information .to attackers. : : e.g: wich is the major link that connect two city ? ...ok let to see the

Re: [Full-disclosure] SSH Bruteforce blocking script

2005-09-03 Thread Gerald Holl
On 2005-09-02 09:37, Michael L Benjamin wrote: Here is a simple script I've coded up that I use on 3 of my RedHat Enterprise Linux 3 (RHEL3) servers. I decided to do this after seeing the amount of activity from places like China/Korea/Taiwan in relation to SSH brute force probes. I'll throw

[Full-disclosure] Who wrote Maximum Security?

2005-09-03 Thread Joshua Russel
Hi List, I read Maximum Security many years ago, when it was still rated a moderately good book on hacking as there weren't many books in the market. But this question nags me all the time. Who really wrote Maximum Security? Who is the Anonymous guy? I think, it's not much of an issue to

Re: [Full-disclosure] Who wrote Maximum Security?

2005-09-03 Thread Pablo Fernandez
Did you really like that book El dom, 04-09-2005 a las 02:16 +0530, Joshua Russel escribió: Hi List, I read Maximum Security many years ago, when it was still rated a moderately good book on hacking as there weren't many books in the market. But this question nags me all the time.

[Full-disclosure] Bush unready for terrorist attack, says Katrina

2005-09-03 Thread n3td3v
Dear security community, Design flaw for Yahoo Messenger service: http://groups.google.com/group/n3td3v/browse_thread/thread/29a2c7942057022b Another random thread to grab your attention. Courtesy of n3td3v. -- http://www.geocities.com/n3td3v ___

Re: [Full-disclosure] Who wrote Maximum Security?

2005-09-03 Thread fd
On Sat, 3 Sep 2005, Pablo Fernandez wrote: Did you really like that book It is great background, though some of the tools he suggests are now dated. A good cover-to-cover read and allows you to think in terms of breaking existing security. I do suggest it. -Eric -- Eric Wheeler Vice

[Full-disclosure] Multiple PBX Systems Vulnerable to BBQ Overflows

2005-09-03 Thread nick
-- -[[ Fetcho Security Advisory ]]- -- Overview: = My name is Dennis Fetcho, also known ass TheFeltch. I'm a fond supporter of

[Full-disclosure] undetected stuff downloaded by pnp worm

2005-09-03 Thread Willem Koenings
Hi! If anyone wants to play, then: hxxp://www.darkfxp.net/dl/rootkit.exe rar archive, inside is those files: install.bat xnet.exe ssdpcl.dll ssdpcl.exe ssdpcl.exe creates the service SSDPCL, description Provides Control for the SSDP Discovery Service, display name SSDP Controller As i have

Re: [Full-disclosure] Who wrote Maximum Security?

2005-09-03 Thread Joshua Russel
Oh yea. The is book is slightly fabled, but was good for its time though. On 9/4/05, Pablo Fernandez [EMAIL PROTECTED] wrote: Did you really like that book El dom, 04-09-2005 a las 02:16 +0530, Joshua Russel escribió: Hi List, I read Maximum Security many years ago, when it was

RE: [Full-disclosure] RE: Computer forensics to uncover illegal internet use

2005-09-03 Thread dave kleiman
Steve, Inline.. Hate to play alwyer here but doesn't all of this get shot down by 3rd Circuit Federal Court of Appeals decisions regarding the FBI's Innocent Images project? It basicly shot down the concept of you clicked on a chold porn link therefore you're guilty. Well that applies to

Re: [Full-disclosure] RE: Computer forensics to uncover illegal internet use

2005-09-03 Thread Steve Kudlak
dave kleiman wrote: Jason, You are definitely off here. """Companies and their lawyers who fail to keep up with child pornography law do so at their peril. The bipartisan resolve of state and federal legislators to combat child pornography has led to laws that put the fate of those who

RE: [Full-disclosure] RE: Computer forensics to uncover illegal internet use

2005-09-03 Thread dave kleiman
Steve, Inline.. Hate to play alwyer here but doesn't all of this get shot down by 3rd Circuit Federal Court of Appeals decisions regarding the FBI's Innocent Images project? It basicly shot down the concept of you clicked on a chold porn link therefore you're guilty. Well that applies

Re: [Full-disclosure] RE: Computer forensics to uncover illegal internet use

2005-09-03 Thread Steve Kudlak
dave kleiman wrote: Steve, Inline.. Hate to play alwyer here but doesn't all of this get shot down by 3rd Circuit Federal Court of Appeals decisions regarding the FBI's Innocent Images project? It basicly shot down the concept of "you clicked on a chold porn link therefore