Start by not touching any kind of digital device. You wouldn't know how many
chinese have put tracking/spy bugs inside them. Or how many modified NSA
backdoors, for the matter.
Using a PC probably increases risk by 1000%.
On Mon, Mar 1, 2010 at 5:49 AM, Simon Garfinkle wrote:
> -BEGIN PGP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello.
I am interested in getting some advice from you security
professionals (white hat and black hat) about going underground.
I am sick of big brother, I love independence, I was to experience
the world and have no commitments.
I am just sick of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA-2004-1secur...@debian.org
http://www.debian.org/security/ Dann Frazier
February 27, 2010 h
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yes.
To clarify, this post was meant to be satirical. It was not written
by an employee at Yahoo. I apologize for mentioning age. (In the
United States, you're not allowed to mention age, creed, gender,
etc. in terms of hiring new guys)
However, I ha
On 2/28/2010 2:22 PM, Pavel Kankovsky wrote:
> On Sun, 24 Jan 2010, Dan Kaminsky wrote:
>> Nah, it's actually a lot worse. You have to start thinking in terms of
>> state explosion -- having turing complete access to even some of the
>> state of a remote system creates all sorts of new states that,
Alzo see: USB DMA.
On Fri, Feb 26, 2010 at 8:29 AM, McGhee, Eddie wrote:
> Its simply using USB autorun to launch and install itself, not sure how much
> it is picked up but tbh you could build one yourself possibly with the
> features you need, just look into getting some decent bot source and
yet another nice troll with a stylistic stench of n3td3v about it, judging by
the fanciful misconceptions surrounding a kernel of truth
(and the phony attribution to someone to whom he's taken an unreasonable
disliking...)
it's true that yahoo is hiring security people, though, typically not as
On 26/02/10 19:55, John Q Public wrote:
> Well considering the tone I used, Frankly, I'm surprised you even
> dignified that. I don't always speak in such a tone. It's just the
> atmosphere of the scene here.
>
> I want my system here to be pure and free. No blogcruft.
>
> Remember how XP and Vista
The error of the future:
"srry ur computar doent werks lolz. brb gng two teh bathrm"
On Fri, Feb 26, 2010 at 5:15 PM, wrote:
> Le jeudi 25 février 2010 23:43:54, Mark Shuttleworth a écrit :
>
>> We're bringing social interaction from the web, into the desktop. We're
>> breathing life back into
Le jeudi 25 février 2010 23:43:54, Mark Shuttleworth a écrit :
> We're bringing social interaction from the web, into the desktop. We're
> breathing life back into the city center, as it were. We're making the
> desktop more human. This is our mission, our reason for loving what we
> do. I'm sorry
http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-011-orbital-viewer-orb-buffer-overflow/
Kind regards,
Steven Seeley
(mr_me)
_
View photos of singles in your area!
Its simply using USB autorun to launch and install itself, not sure how much it
is picked up but tbh you could build one yourself possibly with the features
you need, just look into getting some decent bot source and go from there,
would save the 130 dollars imo.
Plenty source code out there to
On 26.02.2010 15:35, RandallM wrote:
> anyone see this and know about it? How it works and good detection?
>
> http://www.brickhousesecurity.com/pc-computer-spy.html
>
I doubt very much in that. The matter is that USB hardware is able to transfer
data only when host requests that, IOW it is the ho
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Andrew Auerheimer (Weev) was contacted by a honeytrap at a bar who
tried to seduce him.
Weev has previously alluded that it might be FBI (probably
counterintelligence). This is actually only a "maybe".
Who says weev hasn't attracted this attention of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2004-1 secur...@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
February 28, 2010
"Sometimes the vulnerability itself is a functional requirement (or
considered to be one of them). Has anyone mentioned ActiveX?"
Or NPAPI for the matter. Really, other then the
automated-after-user-accept-installation they're both the same.
On Sun, Feb 28, 2010 at 9:22 PM, Pavel Kankovsky <
p...@
On Sun, 24 Jan 2010, Dan Kaminsky wrote:
It took me more than one month to write this response? Ouch!
> > When you discover the program is designed too badly to be
> > maintained, the best strategy is to rewrite it.
> No question. And how long do you think that takes?
It depends. Probably in t
I've seen better on planetsourcecode.com haha
--
Founder/Activist
http://fusecurity.com/ | "Free Security Technology"
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
18 matches
Mail list logo