im going to the 'benz dealer in the morning to express my 1st amendment right...
The Somalians are learning the hard way that it just isnt so...
bma___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
On 1/27/2012 2:24 AM, Jerry dePriest wrote:
im going to the 'benz dealer in the morning to express my 1st
amendment right...
The Somalians are learning the hard way that it just isnt so...
bma
___
Full-Disclosure - We believe in it.
HAHAHAA...
Well... it's hard to convince people that data piracy is the same as
physical piracy! The think that if they CAN do somehting... they have the
RIGHT to DO IT!
As a content producer... I can't stand this sense of entitlement... but oh
well... I've just gotta tranform with the times i
when you enter piracy into google the 1st link is the piratebay...
dictionary.com-
1. practice of a pirate; robbery or illegal violence at sea.
2. the unauthorized reproduction or use of a copyrighted book, recording,
television program, patented invention, trademarked product, etc.: The record
Hello,
http://img256.imageshack.us/img256/2527/1282302008370.jpg
know the difference.
--
Cheers,
Kai
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
On 1/27/2012 3:01 AM, Robert Kim App and Facebook Marketing wrote:
HAHAHAA...
Well... it's hard to convince people that data piracy is the same as
physical piracy! The think that if they CAN do somehting... they have
the RIGHT to DO IT!
As a content producer... I can't stand this sense of
On 1/27/2012 3:29 AM, Vipul Agarwal wrote:
Let's keep FD and Reddit apart!
Regards,
Vipul
Sent from my HTC
- Reply message -
From: Kai k...@rhynn.net
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] when did piracy/theft become expression of
freedom
Date: Fri,
software piracy has been around for ever. I remember copying punch cards. It
took forever and if you made one mistake hours of work was down the tubes. I
had an apple II that we used Disk Pirate 1-11 to copy games, peach tree
accounting software, etc. In the time it took to load the 5 1/4
On 1/27/12 4:12 AM, Jerry dePriest wrote:
software piracy has been around for ever. I remember copying punch
cards. It took forever and if you made one mistake hours of work was
down the tubes. I had an apple II that we used Disk Pirate 1-11 to
copy games, peach tree accounting software, etc.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2394-1 secur...@debian.org
http://www.debian.org/security/ Luciano Bello
January 27, 2012
Why yes, yes there is. :) More of a distinction, in fact, than there is in
Linux world!
On Thu, Jan 26, 2012 at 9:02 AM, valdis.kletni...@vt.edu wrote:
On Wed, 25 Jan 2012 17:54:02 PST, Alyx said:
Are you looking at kernel code or userland code? (:
Is there a clear distinction in the
On Fri, 27 Jan 2012 18:01:31 +0900, Robert Kim App and Facebook Marketing said:
As a content producer... I can't stand this sense of entitlement... but oh
well... I've just gotta tranform with the times i guess!
You may want to talk to your fellow content producers - and even more
importantly,
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201201-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Title:
==
Fortigate UTM WAF Appliance - Multiple Web Vulnerabilities
Date:
=
2012-01-27
References:
===
http://vulnerability-lab.com/get_content.php?id=144
VL-ID:
=
144
Introduction:
=
The FortiGate series of multi-threat security systems detect and
Hi,
FYI, see attached.
cheers,
joernchen
--
joernchen ~ Phenoelit
joernc...@phenoelit.de ~ C776 3F67 7B95 03BF 5344
http://www.phenoelit.de ~ A46A 7199 8B7B 756A F5AC
Phenoelit Advisory wir-haben-auch-mal-was-gefunden #0815 +--+-
[ Authors ]
joernchen joernchen () phenoelit de
You want to be very careful with that line of thought. You are taking the
creator the rightful owners profits, which they are entitled to if it is a
product they created to be sold. You are confusing what you want - with what
the law states. Theft is typically very widely defined in the law,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2395-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
January 27, 2012
On 1/27/2012 12:06 PM, Michael Schmidt wrote:
You want to be very careful with that line of thought. You are taking
the creator the rightful owners profits, which they are entitled to if
it is a product they created to be sold. You are confusing what you
want -- with what the law states.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2396-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
January 27, 2012
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201201-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
On Fri, 27 Jan 2012 18:06:28 GMT, Michael Schmidt said:
You want to be very careful with that line of thought. You are taking the
creator the rightful owners profits, which they are entitled to if it is a
product they created to be sold.
You might want to go read Courtney Love Does The Math,
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-
boun...@lists.grok.org.uk] On Behalf Of valdis.kletni...@vt.edu
Sent: Friday, January 27, 2012 4:06 PM
To: Michael Schmidt
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] when
On Jan 27, 2012 4:07 PM, valdis.kletni...@vt.edu wrote:
On Fri, 27 Jan 2012 18:06:28 GMT, Michael Schmidt said:
You want to be very careful with that line of thought. You are taking
the
creator the rightful owners profits, which they are entitled to if it
is a
product they created to be
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201201-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
24 matches
Mail list logo