Thierry Zoller wrote:
Dear Jared,
My opinion :
but some folks don't like the idea of selling directly to the
vendor.
It reads a bit like the mob, extorion style. I have a bug, you want it
? Pay me money.
Ps. Nice presentaion @BH
because getting it entirely safe is
2007/8/6, Paul Schmehl [EMAIL PROTECTED]:
--On August 6, 2007 12:16:37 AM -0700 Morning Wood
[EMAIL PROTECTED] wrote:
What I'm looking for is an intrusion kit, a ZIP file that contains
common tools like: vnc, nmap, pwdump, ssh client, etc. That have all
dependencies in the zip file,
Hey there,
I'm so very frustrated with Microsoft and went on a search to see if anyone
else has had the same issue and low and behold, I came across you're article
of sorts.
Its been over a month now, since I was hacked. I woke up on a Sunday
morning, check my email as I do everyday. I had 4
As far as the moral/immoral issue goes I don't think there's an easy
answer to that one.
Is it immoral to get paid for your effort? I don't think so. On the
other hand I don't think
I'd be really proud of myself if I sold a bug to someone and they turned
around and
released a worm that exploited
Hi Ashley... I can certainly understand your frustration. Although my
account was taken care of and I was ultimately given some things to
quiet me down, I never got an explanation of what *really* happened,
I never got any information about who I could prosecute or anything
like that. As
Is it morally right, wrong, don't know, don't care, good business, bad
business, etc.? Either way we're moving away from that model, but I was
just curious how others on FD see it.
It's lame, as I see it. IMO, as soon as a bug/vuln is found it should be
released into the public domain, with
grade to Version 5.3.333.0 or higher
Please see
http://www.cisco.com/warp/public/707/cisco-sr-20070808-mp.shtml for
details.
SecureTest for all your PCI requirements- PCI workshops, PCI Scoping,
Assistance with Self Assessment questionnaires, Gap Analysis, ASV Scanning,
PCI-DSS Audits
When someone fraudulently charges your credit card you should immediately
complain to the card issuer in writing so the charge can be reversed and
charged back to the merchant who accepted the fraudulent credentials. That is
one of the advantages of a credit card - the loss can be charged back,
Hi,
For some work i need a l2tp/ppp packet generator.is there any L2TP Packet
generator? or how should i proceed with writing one?
thanks for any help.
--
_code
___
Full-Disclosure - We believe in it.
Charter:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Response: Cisco Unified MeetingPlace XSS Vulnerability
http://www.cisco.com/warp/public/707/cisco-sr-20070808-mp.shtml
Revision 1.0
For Public Release 2007 August 08 1600 UTC (GMT)
Cisco
On Wed, 08 Aug 2007 10:34:03 EDT, Byron Sonne said:
Is it morally right, wrong, don't know, don't care, good business, bad
business, etc.? Either way we're moving away from that model, but I was
just curious how others on FD see it.
It's lame, as I see it. IMO, as soon as a bug/vuln is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory:
Cisco IOS Secure Copy Authorization Bypass Vulnerability
Advisory ID: cisco-sa-20070808-scp
http://www.cisco.com/warp/public/707/cisco-sa-20070808-scp.shtml
Revision 1.0
For Public Release 2007 August 08 1600 UTC (GMT
On 8/7/07, Tonu Samuel [EMAIL PROTECTED] wrote:
btw: i seriously doubt anyone will help you ( or you buy the
ebay offered
one LOL...
have fun getting yourelf pwnt )
byez,
MW
Did you ever notice that you type like a child?
Just POC
http://evil.hackademix.net/fullscreen/js.html
Tõnu (unrelated to this web or exploit)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
It was Halvar Flake.
On Tue, Aug 07, 2007 at 06:08:51PM -0300, Ashley Wilson wrote:
Hey there,
I'm so very frustrated with Microsoft and went on a search to see if anyone
else has had the same issue and low and behold, I came across you're article
of sorts.
Its been over a month now,
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
charge back the charges on your card with your credit card company. You're
not liable for any fraudulent charges on most CC's, some have a $50
deductible.
Exibar
-Original Message-
From: Ashley Wilson [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 07, 2007 5:09 PM
To:
On Tue, 07 Aug 2007 17:46:51 -0400, Jared DeMott wrote:
Is it morally right, wrong, don't know, don't care, good business, bad
business, etc.? Either way we're moving away from that model, but I was
just curious how others on FD see it.
That depends on how much I paid for the software and
If you need to ask this question then you are clearly not qualified to do
the work. Frm it out.
--
Yours,
J.A. Terranson
sysadmin_at_mfn.org
0xBD4A95BF
Military force is justified only in self-defense; naked aggression is the
province of dictators and rogue states. This is the danger of a
On 8/7/07, Jared DeMott [EMAIL PROTECTED] wrote:
All:
So, I've tried the vendor pay model for bug hunting and it wasn't always
well received. Apparently auction sites and 3 party purchasers are
fine, but some folks don't like the idea of selling directly to the
vendor. I was thinking that
22 matches
Mail list logo