Hello Full-Disclosure!
I want to warn you about Denial of Service vulnerabilities in Firefox,
Internet Explorer, Chrome and Opera. Which belong to type of DoS via
protocol handlers. Earlier I already wrote about DoS vulnerabilities in
Firefox, Internet Explorer, Chrome and Opera and DoS attacks
No, only Windows machines will be grinding to a halt. OTOH, my sleek
unix boxen will be whizzing along nicely
You wish...
On Mon, Jun 14, 2010 at 12:47 PM, lsi stu...@cyberdelix.net wrote:
On 14 Jun 2010 at 4:23, Thor (Hammer of God) wrote:
create a private key with a strong password,
Ancient crypto? You really have no effing clue, do you? But, as I asked,
thanks for your feedback.
Secondly, that's NOT too small to be a scan of my passport since that is
EXACTLY what that is. Regardless, please feel free to post some actual
details about issues with the ancient crypto
I must have written it poorly. I never use the hash for authN, only to
make any tamporing with keys evident. I'm not sure it is a requirement
(pgp doesn't even bother making these checks) but I wanted to be extra
careful :)
On Jun 14, 2010, at 1:22 AM, Jeffrey Walton noloa...@gmail.com
Ancient crypto? You really have no effing clue, do you?
Whatever you use today, it will be ancient in 5 years.
why not start cracking it now
May I have source for the decryptor?
do something that would actually be useful
Just lending a clue, always a pleasure! I been there done that
The source of the decryptor? Everything you would possibly need to
know is right there in the read me. I'm confused why you would ask
for that, unless of course you didn't bother reading it, opting
instead to make immediate assumptions of how it is insecure.
And I think you misunderstand
I don't get it - in 5 years his iPhone will crack RSA2048 while
listening to Iron Butterfly yet all the PCs in the world won't be able
to handle AV.
It's evident that I should consult him, particularly when it comes to
reccomending what hash I should use :D
T
On Jun 14, 2010, at 8:51 AM,
On 14 Jun 2010 at 11:51, valdis.kletni...@vt.edu wrote:
Ancient crypto? You really have no effing clue, do you?
Whatever you use today, it will be ancient in 5 years.
PGP came out when? 1991. Will be a quarter century old in 5 years.
DES is the first example I can think of. Folks
You don't think I considered it? Really? You think that I would go
through the trouble of designing and implenting a standards based
encrytion application without considering that it could be cracked?
You are incorrect. I certainly considered it. I just know that when
brute forcing AES256
Hello Full-Disclosure,
I'd like to warn you about a big gaping goatse hole in a one of
perhaps Microsoft's server technologies. This vulnerability could be
Silverlight, BizTalk, Sharepoint or IIS server.
Gaping hole so huge, Susan Bradley might may fit through into this hole.
Example:
On Mon, 14 Jun 2010 13:39:16 EDT, musnt live said:
Since this no is free bugs. Opening bid for multipurpose remote server
PoC affecting: I no SHARE right now -- only to serious bidder who no
blink at 5 digits before decimal.
That would be in yen, correct?
pgpl2yyvTTZod.pgp
Description: PGP
or zimbabwe $?
On Mon, Jun 14, 2010 at 6:47 PM, valdis.kletni...@vt.edu wrote:
On Mon, 14 Jun 2010 13:39:16 EDT, musnt live said:
Since this no is free bugs. Opening bid for multipurpose remote server
PoC affecting: I no SHARE right now -- only to serious bidder who no
blink at 5 digits
I'm sorry I find dealing with ounces to be unsavory.
On 6/14/2010 11:55 AM, Benji wrote:
pfft, rich kid.
On Mon, Jun 14, 2010 at 6:52 PM, Mini ITmin...@rileys.com wrote:
Personally I prefer to deal with flax seed in pounds...
On 6/14/2010 11:50 AM, Benji wrote:
or zimbabwe $?
On 14 Jun 2010 at 9:52, Thor (Hammer Of God) wrote:
You don't think I considered it? Really? You think that I would go
through the trouble of designing and implenting a standards based
encrytion application without considering that it could be cracked?
The USG put a lot more into DES,
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201006-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
On Mon, Jun 14, 2010 at 3:07 PM, lsi stu...@cyberdelix.net wrote:
It doesn't differ from SSL, which also could be captured and
eventually cracked.
Hello FD, I'd like to warn you about a vulnerability in pointing out
the obvious:
“People all over the world will have to purchase a new calendar
I'm starting to wonder how much our local list court jester is being
paid for -his- (oh I'm sorry) her performance.
On Mon, Jun 14, 2010 at 9:25 PM, musnt live musntl...@gmail.com wrote:
On Mon, Jun 14, 2010 at 3:07 PM, lsi stu...@cyberdelix.net wrote:
It doesn't differ from SSL, which
On Mon, Jun 14, 2010 at 3:34 PM, Christian Sciberras uuf6...@gmail.com wrote:
I'm starting to wonder how much our local list court jester is being
paid for -his- (oh I'm sorry) her performance.
Can you care to clarify to elaborate for us? Is there be a service for
which to pay?
Oh don't tell me you're an Open Source guy (oops...gal)?!
On Mon, Jun 14, 2010 at 9:38 PM, musnt live musntl...@gmail.com wrote:
On Mon, Jun 14, 2010 at 3:34 PM, Christian Sciberras uuf6...@gmail.com
wrote:
I'm starting to wonder how much our local list court jester is being
paid for
Of you? Please no! I've seen better camels at my uncles! No more play
with you fugly nerdboy. You not even man yet, still baby
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
Well, we all know it's a bad netiquette to throw up images without a
fair comparison, so let me do that of/for you:
http://trailsauce.com/wp-content/uploads/2010/01/monkey-butt.jpg
Think the author just couldn't take the photo with a straight face.
On Mon, Jun 14, 2010 at 9:50 PM, musnt live
You keep talking about DES being cracked as if you had something to do with
it... everyone here knows that encryption is math, and that as computers get
faster, it will be easier and faster to break encryption algorithms. Yet you
say things like you've archived your data and people will be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://corelabs.coresecurity.com/
XnView MBM Processing Heap Overflow
1. *Advisory Information*
Title: XnView MBM Processing Heap Overflow
Advisory Id: CORE-2010-0514
Hey Nid -
-Original Message-
From: Nid [mailto:nidfulld...@googlemail.com]
Sent: Monday, June 14, 2010 11:18 AM
To: Thor (Hammer of God)
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Introducing TGP...
Hi Timothy
TGP - Thor's Godly Privacy
06/13/10
Why send it to a public form/blog/email list, etc. When you could email it
to yourself, mitigating some of Stu's concerns, yet still making it
available to yourself...
Additionally, you're adding less traffic (a tiny bit less, true, but
less...)
Send it to multiple email accounts if you're
Tried reproducing on yahoo mail
both on the classic and new one . Error message i got in both cases were
Sorry, but your folder name has prohibited characters (please use letters,
numbers, dashes, and underscores). Please fix it and try again.
Cheers,
Rockey
--
It's all about Hacking and
26 matches
Mail list logo