-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1085-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
June 1st, 2006
Hi,
THC is the world's first group to release ROM images and memory maps from
Nokia Mobile Phones. This is an invitation for Reverse Engineers and hackers to
discover hidden secrets and backdoors on mobile phones.
http://www.thc.org/thc-rom
The following webpage contains ROM images from
In order to get a ticket you were engaged to give the following information
to the FIFA:
- complete name and surename
- adress
- date of birth
- nationality
- number of passport or Reisepass (travel passport)
- telephone number
- fan of what club (!)
- email-address
- number of bank-
Josh L. Perrymon wrote:
Yeah.. I suppose their would be limitations on the amount of data that
would be on the chip..
Maybe the will just use an ID number that refrences the user info in the
DB
Has anyone successfully performed SQL injections usinf RFID tags? I
looked at a few papers
Whilst using the Tor network to search google, once in a while the
google search results interface changes to the new look, as described
here:
http://arstechnica.com/news.ars/post/20060326-6460.html
But the method used there uses cookies. This means one of two things:
o The decision to
Salut,
On Thu, 2006-06-01 at 14:46 +0100, Naxxtor Security wrote:
Whilst using the Tor network to search google, once in a while the
google search results interface changes to the new look, as described
here:
http://arstechnica.com/news.ars/post/20060326-6460.html
This is due to IP based
I'm aware of that, however, is there any particular reason why the exit
nodes that I've been observing load that version? Are they owned by
Google developers working on the new interface? Or are they just normal
users? Perhaps they are corporate users who have a deal with Google?
There doesn't
This is due to IP based defaults. Google looks different from different
countries. Walk around in the world with your laptop and you'll see what
I mean.
Just do : http://www.google.com/ncr
the /ncr stands for no country recognition. Then you get the default
(english) interface.
/mike.
I'm aware of that, however, is there any particular reason why the exit
nodes that I've been observing load that version? Are they owned by
Google developers working on the new interface? Or are they just normal
users? Perhaps they are corporate users who have a deal with Google?
There doesn't
On Thu, 1 Jun 2006, Josh L. Perrymon wrote:
Has anyone successfully performed SQL injections usinf RFID tags? I looked
at a few papers but know it's not widespread.
I'm thinking about getting an IPAQ and an RFID reader/writer to play around
w/ this stuff.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:094
http://www.mandriva.com/security/
Yes, that is strange. I don't think that it means tor is caching
cookies in exit points, but it is likely that there is a way to bind
that preference to your IP as opposed to the cookie like in the article.
I tried this
1. started tor
2. checked the IP of my exit point
3. did a google search,
rPath Security Advisory: 2006-0089-1
Published: 2006-06-01
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Local System User Deterministic Vulnerability
Updated Versions:
mysql=/[EMAIL PROTECTED]:devel//1/5.0.22-1-0.1
mysql-bench=/[EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- ---
VMware Security Advisory
Advisory ID: VMSA-2006-0001
Synopsis: VMware ESX Server Cross Site Scripting issue
VMware ESX
Joomla/Mambo CMS Component SimpleBoard 1.1.0 Stable XSS-Vulnerabilities
===
Release Date
June 01, 2006
Vendor
---
Two Shoes Mambo Factory
http://www.tsmf.net/
Version
---
SimpleBoard 1.1.0 Stable
Is it illegal if I perform a vulnerability scan on a site without
permission from the owner? How about a simple port scan? thanks..
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
Depends on the Jurisdiction... However If I found out that it was my
site, I'd have to debate on whether or not to sue your ass... But that's
just me... However, you could approach the website to see if they would
like you to do a security audit or port-scan for them...
Just a thought
Wayne
On Fri, 02 Jun 2006 08:54:23 +0800, Nightfall Nightfall said:
Is it illegal if I perform a vulnerability scan on a site without
permission from the owner? How about a simple port scan? thanks.
Rule 0 of a pen test: *ALWAYS* have a *written* Get Out Of Jail Free
card before doing anything,
Depends on the Jurisdiction... However If I found out that it was my
site, I'd have to debate on whether or not to sue your ass... But that's
just me...
You would not sue anyone. Thats just saying that you would sue anyone under the
sun trying to ping or go after some bot trying to scan your
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- ---
VMware Security Advisory
Advisory ID: VMSA-2006-0002
Synopsis: VMware Server sensitive information lifetime issue
Advisory URL:
Title: Files keep appearing
I keep having a phishing website appear on my web server.
They keep showing up in a Resources folder of one of the sites that I host. I have gone through the logs and I am not seeing any connections. I deleted the files this morning and this evening they
Guys,
It is not illegal to port-scan a target IP with or without
authorization. It would be impossible to prosecute someone because they
portscanned you. Hell, it would be near impossible to prosecute someone
who ran nessus against you but never penetrated your systems. From
expereince, the
On 6/2/06, Simon Smith [EMAIL PROTECTED] wrote:
Guys,
It is not illegal to port-scan a target IP with or without
authorization. It would be impossible to prosecute someone because they
portscanned you. Hell, it would be near impossible to prosecute someone
who ran nessus against you but
23 matches
Mail list logo