I concur :-)
2008/5/1 magickal1 <[EMAIL PROTECTED]>:
> I don't often write to the list nor contribute much at all at this point
> mostly due to work commitments but I felt a need to this time.
>
> Why on earth was this posted to the list? it provided no usefull
> information.
> It had nothing t
more info
http://www.news.com/8301-10789_3-9932600-57.html?tag=blog.promos
On Thu, May 1, 2008 at 9:00 AM, coderman <[EMAIL PROTECTED]> wrote:
> On Wed, Apr 30, 2008 at 2:17 PM, Rob Thompson
> <[EMAIL PROTECTED]> wrote:
>
> > ...
> > > Meaning if you disable autorun on all USB/Firewire/"hot-pl
I don't often write to the list nor contribute much at all at this point
mostly due to work commitments but I felt a need to this time.
Why on earth was this posted to the list? it provided no usefull information.
It had nothing to do with full disclosure of anything. all it did was waste
m
===
Summary
===
Name: Unauthenticated Stack Overflow in SNMPc
Release Date: 30 April 2008
Reference: NGS00526
Discover: Wade Alcorn <[EMAIL PROTECTED]> and John Heasman
<[EMAIL PROTECTED]>
Vendor: Castle Rock Computing
Systems Affected: SNMPc versions 7.1 and earlier
Risk: Critical
Status:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Akamai Technologies Security Advisory 2008-0001
* Akamai ID: 2008-0001
* Date: 2008/04/30
* Product Name: Download Manager
* Affected Versions: < 2.2.3.5
* Fixed Version: 2.2.3.5
* CVE IDs: CVE-2007-6339
* CVSS
On Wed, Apr 30, 2008 at 2:17 PM, Rob Thompson
<[EMAIL PROTECTED]> wrote:
> ...
> > Meaning if you disable autorun on all USB/Firewire/"hot-plug" devices
> > does it potentially eliminate this threat?
>
> I doubt it. They probably have something coded into the device that
> works with something
Can't help but think of the Group Policy that disables
usbstor.sys.(http://www.petri.co.il/disable_usb_disks_with_gpo.htm for
some info)
Surely that driver could be replaced (with some windows file
protection workarounds as well, obviously) that would perhaps prompt
before allowing the device to b
On Wed, Apr 30, 2008 at 11:25 AM, Fetch, Brandon <[EMAIL PROTECTED]> wrote:
> I'd be more curious what the requirements are on the host machine.
>From what I have read, which isn't _too_ much...
It needs Windows. I'd assume 2000 and forward... But that's an
assumption. It just makes sense when
I'd be more curious what the requirements are on the host machine.
Meaning if you disable autorun on all USB/Firewire/"hot-plug" devices
does it potentially eliminate this threat?
Yes, rebooting from the USB key will obviate any Windows
policies/settings but the goal seems to stem from getting "l
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1563-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
April 30, 2008
On Tue, Apr 29, 2008 at 8:35 PM, reepex <[EMAIL PROTECTED]> wrote:
> you are a retard.
As are you, re-read the article...
>
> its for live memory analysis on a running machine. not anything like a
> bootable Live Cd.
>
It doesn't only read memory. It does other things as well...
But not quite
>
> Cyber rolling is when you visit a phishing site which plays "Never Gonna
> Give You Up" in the background. This is *much* worse than normal
> phishing, as it can permamently damage your ears as well as stealing your
> credentials.
>
Hopefully this trend will buck before it progresses to "Toget
On 4/30/08, John Lamb <[EMAIL PROTECTED]> wrote:
>
> On Wed, Apr 30, 2008 at 09:55:33AM +0100, mcwidget wrote:
> > I've asked you this one before because I'm just not getting it. What's
> the
> > difference between "cyber rolling" and phishing? If there's no
> difference,
> > is there any need fo
n3td3v, sounds like ur trying to suck ur own dick again. can you do that?
On Sun, Apr 27, 2008 at 9:54 PM, n3td3v <[EMAIL PROTECTED]> wrote:
>
> On Sun, Apr 27, 2008 at 8:27 PM, G D Fuego <[EMAIL PROTECTED]> wrote:
> >
> >
> >
> > On Apr 27, 2008, at 3:11 PM, n3td3v <[EMAIL PROTECTED]> wrot
good. you proved you know how to im with others.
lets see, you have email, copy and paste, ranting, im and webpage
creation through templates down. what else can you do?
On Tue, Apr 29, 2008 at 11:04 PM, n3td3v <[EMAIL PROTECTED]> wrote:
>
> On Wed, Apr 30, 2008 at 3:53 AM, Pat <[EMAIL PROTECT
[-]
_.-..__ .__.__
,'9 )\)`-.,.--. | | _|__|_ _ _|__| 2k8
`-.| `. | |/ / \ \/ \/ / |/ ___\/ _ \ /\
\, ,\)|<| |\
On Wed, Apr 30, 2008 at 09:55:33AM +0100, mcwidget wrote:
> I've asked you this one before because I'm just not getting it. What's the
> difference between "cyber rolling" and phishing? If there's no difference,
> is there any need for another name for it?
Cyber rolling is when you visit a phish
>
> I think they should have called it how to avoid getting "cyber rolled"
> though.
>
I've asked you this one before because I'm just not getting it. What's the
difference between "cyber rolling" and phishing? If there's no difference,
is there any need for another name for it?
Last time they used windows it crashed (BSOD) so they are sticking with a
more stable OS
On Tue, Apr 29, 2008 at 8:16 PM, William Lefkovics <[EMAIL PROTECTED]>
wrote:
> I would expect him to use no less than all relevant products that
> Microsoft's competition creates. And thankfully, he does.
>
19 matches
Mail list logo