Valdis,
Good point, I didn't know that.
I did find a link to Fitna, that politically censored movie. Indirectly
related to the thread. Now I have to brush up on my Dutch.
http://www.liveleak.com/view?i=ee4_1206625795
Bil Stout
- Original Message
> From: "[EMAIL PROTECTED]" <[EMAIL P
TP, SMTP). The clustering software handled service (screend) and virtual IP
failover and the configuration files on the shared RAIDset. The systems were
equally sized. I haven't seen an application firewall cluster since then.
Bill Stout
- Original Message
From: shadow floating <
d
planned EOL is 2012 (five year lifecycle). That's pretty short product
lifecycle for a $10B* development effort.
*Ref:
http://seattletimes.nwsource.com/html/businesstechnology/2003460386_btview04.html
Bill Stout
- Original Message
From: Tyler Reguly <[EMAIL PROTECTED]&
mp;y=14
XP EOL: http://support.microsoft.com/lifecycle/?LN=en-gb&x=16&y=12&C2=1173
Bill Stout
- Original Message
From: scott <[EMAIL PROTECTED]>
To: full-disclosure@lists.grok.org.uk
Sent: Monday, January 28, 2008 12:43:51 PM
Subject: [Full-disclosure] Save XP
For
sions. Volume encryption won't encrypt temp directories,
there are many temp directory locations depending on from what source you
opened a file (email, browser, filesystem, word, etc). Volume encryption
products like Credant solve this problem by encrypting temp files.
HTH
life).
Bill Stout
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Fajar
Edisya Putera
Sent: Friday, December 15, 2006 1:45 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] [OOT] Thesis for master degree
Hello everyone, sorr
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-be
ing.html
"This exploit can be mitigated by turning off Javascripting.
Update: Turning off Javascripting is no longer a valid mitigation. A
valid mitigation is unregistering the VML dll. "
Bill Stout
-Origin
as local
admins. To quote from Securiteam:
"Also worth mentioning is that the current in-the-wild exploits attempt
system-wide software installations, as do most zero-day exploits for
such vulnerabilities. If your browser is not running under an account
with administrative privileges, this will no
There are a number of index.dat readers out there. Like Index Dat Spy
http://indexdatspy.stevengould.org/
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Vidar Løkken
Sent: Monday, September 04, 2006 3:44 AM
To: Colin Copley
Cc: full-disclosure@lists.
ly temporarily. Encryptions of the
past are obsolete and weak today, and can be decrypted at leisure.)
That's what TEMPEST is worried about. Leaking signal from red side to
black side, that signal getting picked up by some guy with telco gear, a
bug in the wall or an antenna in the ceiling, or a t
tware is
installed on too many desktops. The more eyes the better, and what
better talent is there, than on bugtraq and full-disclosure to pry into
it? Plus, I'm guaranteed that the feedback here is 'direct and terse'
(-M.W.), and not toned down and tempered which is what I don
license to anyone who downloads by July 28, 2006. This is because of both the valuable feedback, and a support load of less than 2%. The download can be found at www.greenborder.com.
Thanks,
Bill Stout
___
Full-Disclosure - We believe in it
http://news.com.com/Browser+bugs+hit+IE%2C+Firefox/2100-1002_3-6089817.h
tml?tag=nefd.top
Published: June 29, 2006, 3:14 PM PDT
I couldn't find more info on SANS site. Anyone have a link to the SANS
description?
Bill Stout
GreenBorder
http://www.greenborder.com
Free licenses first 1
Title: Browser bugs hit IE, Firefox today (SANS)
http://news.com.com/Browser+bugs+hit+IE%2C+Firefox/2100-1002_3-6089817.html?tag=nefd.top
Published: June 29, 2006, 3:14 PM PDT
I couldn’t find more info on SANS site. Anyone have a link to the SANS description?
Bill Stout
GreenBorder
p://www.greenborder.com/earlyaccess/
Bill Stout
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
alue or
a temporary value is changed, which permits the program to run without
crashingin a controlled environment. This virtualization can be done
for filesystem and registry, but also system calls and COM can be
virtualized (spoofed) to the virtual environment.
HTH
Bill Stout
-Origi
s, and are exposed to
attacks which leverage system calls, COM objects, User Shell, etc..
I believe this list is read by some of the best and most aggressive hackers
that exist, and this is the best place to expose a new security product. I am
interested in what the list has
her
than being up to date on their shots.
Virtualizing at the application level is not as intrusive as sandboxing
techniques. Virtualization provides the ability to enumerate or read
selected real resources, and the protection is more transparent to the
user.
Bill Stout
-Original Message-
Fro
which environment to open a site requested or Outlook message received.
Bill Stout
www.greenborder.com
Appended below is our marketing spiel:
“We are very pleased to give you special, early access to GreenBorder Pro, the new consumer edition of our patented enterprise technology (that’s already
efit to prevent those 'CLM' moves and to protect the
consumers of the software.
Bill Stout
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, May 03, 2006 11:10 PM
To: Bill Stout
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-dis
they simply delay the ship a few days in order to QA the patch for vulnerabilities they already knew about?
Do vendors roll the dice on discoverability?
Bill Stout
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full
://www.elsenot.com/frsirt-google.html
Subscription sites
https://www.frame4.net/mdpro/index.php?cmd=files
http://www.frsirt.com/english/
Bill Stout
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tom
Doherty
Sent: Friday, April 28, 2006 5:03 AM
To: full-disclosure
Point taken; bkfsec, Michael, Valdis.
Statistics are just that. There may be a better crafted comparison
between the webservers than Secunia vulnerabilities.
I think we're in agreement that an administrator has to be familiar with
securing that particular OS.
Bill Stout
-Ori
-2006
http://secunia.com/product/73/
Paul is right.
I would never suggest a Windows admin use UNIX, or visa-versa. A
product is only as secure as it's configured.
Bill Stout
www.greenborder.com
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
24 matches
Mail list logo