The opinions expressed below are my personal and professional opinions,
and not the official position of my employer
Apologies in advance for the long posting.
What is this thing you believe in, an 'electronic crime against a
child' ?
Well, if you had actually taken the time to quote me
Thus spake luka.research ([EMAIL PROTECTED]) [02/09/05 11:53]:
: How about using FIPS-55.
: Thanks
:
: In my modest opinion I think that with approach like FIPS-55 you can spread
: precious information .to attackers.
:
: e.g: wich is the major link that connect two city ? ...ok let to see the
On 2005-09-02 09:37, Michael L Benjamin wrote:
Here is a simple script I've coded up that I use on 3 of my RedHat
Enterprise Linux 3 (RHEL3) servers. I decided to do this after seeing the
amount of activity from places like China/Korea/Taiwan in relation to
SSH brute force probes. I'll throw
Hi List,
I read Maximum Security many years ago, when it was still rated a
moderately good book on hacking as there weren't many books in the
market.
But this question nags me all the time. Who really wrote Maximum Security?
Who is the Anonymous guy?
I think, it's not much of an issue to
Did you really like that book
El dom, 04-09-2005 a las 02:16 +0530, Joshua Russel escribió:
Hi List,
I read Maximum Security many years ago, when it was still rated a
moderately good book on hacking as there weren't many books in the
market.
But this question nags me all the time.
Dear security community,
Design flaw for Yahoo Messenger service:
http://groups.google.com/group/n3td3v/browse_thread/thread/29a2c7942057022b
Another random thread to grab your attention. Courtesy of n3td3v.
--
http://www.geocities.com/n3td3v
___
On Sat, 3 Sep 2005, Pablo Fernandez wrote:
Did you really like that book
It is great background, though some of the tools he suggests are now
dated. A good cover-to-cover read and allows you to think in terms of
breaking existing security. I do suggest it.
-Eric
--
Eric Wheeler
Vice
--
-[[ Fetcho Security Advisory ]]-
--
Overview:
=
My name is Dennis Fetcho, also known ass TheFeltch. I'm a fond supporter of
Hi!
If anyone wants to play, then:
hxxp://www.darkfxp.net/dl/rootkit.exe
rar archive, inside is those files:
install.bat
xnet.exe
ssdpcl.dll
ssdpcl.exe
ssdpcl.exe creates the service SSDPCL, description
Provides Control for the SSDP Discovery Service,
display name SSDP Controller
As i have
Oh yea. The is book is slightly fabled, but was good for its time though.
On 9/4/05, Pablo Fernandez [EMAIL PROTECTED] wrote:
Did you really like that book
El dom, 04-09-2005 a las 02:16 +0530, Joshua Russel escribió:
Hi List,
I read Maximum Security many years ago, when it was
Steve,
Inline..
Hate to play alwyer here but doesn't all of this get shot down by 3rd
Circuit Federal Court of Appeals decisions regarding the FBI's
Innocent Images project? It basicly shot down the concept of you
clicked on a chold porn link therefore you're guilty.
Well that applies to
dave kleiman wrote:
Jason,
You are definitely off here.
"""Companies and their lawyers who fail to keep up with child pornography
law do so at their peril. The bipartisan resolve of state and federal
legislators to combat child pornography has led to laws that put the fate of
those who
Steve,
Inline..
Hate to play alwyer here but doesn't all of this get shot
down by 3rd Circuit Federal Court of Appeals decisions
regarding the FBI's Innocent Images project? It basicly
shot down the concept of you clicked on a chold porn link
therefore you're guilty.
Well that applies
dave kleiman wrote:
Steve,
Inline..
Hate to play alwyer here but doesn't all of this get shot down by 3rd
Circuit Federal Court of Appeals decisions regarding the FBI's
Innocent Images project? It basicly shot down the concept of "you
clicked on a chold porn link therefore
14 matches
Mail list logo