Valdis,
Good point, I didn't know that.
I did find a link to Fitna, that politically censored movie. Indirectly
related to the thread. Now I have to brush up on my Dutch.
http://www.liveleak.com/view?i=ee4_1206625795
Bil Stout
- Original Message
From: [EMAIL PROTECTED] [EMAIL
). The clustering software handled service (screend) and virtual IP
failover and the configuration files on the shared RAIDset. The systems were
equally sized. I haven't seen an application firewall cluster since then.
Bill Stout
- Original Message
From: shadow floating [EMAIL PROTECTED
EOL is 2012 (five year lifecycle). That's pretty short product
lifecycle for a $10B* development effort.
*Ref:
http://seattletimes.nwsource.com/html/businesstechnology/2003460386_btview04.html
Bill Stout
- Original Message
From: Tyler Reguly [EMAIL PROTECTED]
To: scott [EMAIL
. Volume encryption won't encrypt temp directories,
there are many temp directory locations depending on from what source you
opened a file (email, browser, filesystem, word, etc). Volume encryption
products like Credant solve this problem by encrypting temp files.
HTH
Bill Stout
).
Bill Stout
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Fajar
Edisya Putera
Sent: Friday, December 15, 2006 1:45 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] [OOT] Thesis for master degree
Hello everyone, sorry
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-be
ing.html
This exploit can be mitigated by turning off Javascripting.
Update: Turning off Javascripting is no longer a valid mitigation. A
valid mitigation is unregistering the VML dll.
Bill Stout
-Original Message
. To quote from Securiteam:
Also worth mentioning is that the current in-the-wild exploits attempt
system-wide software installations, as do most zero-day exploits for
such vulnerabilities. If your browser is not running under an account
with administrative privileges, this will not succeed.
Thanks,
Bill
There are a number of index.dat readers out there. Like Index Dat Spy
http://indexdatspy.stevengould.org/
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Vidar Løkken
Sent: Monday, September 04, 2006 3:44 AM
To: Colin Copley
Cc:
be decrypted at leisure.)
That's what TEMPEST is worried about. Leaking signal from red side to
black side, that signal getting picked up by some guy with telco gear, a
bug in the wall or an antenna in the ceiling, or a trio of satellites
above. Doesn't help you used that 3DES PGP key 5 years ago.
Bill
many desktops. The more eyes the better, and what
better talent is there, than on bugtraq and full-disclosure to pry into
it? Plus, I'm guaranteed that the feedback here is 'direct and terse'
(-M.W.), and not toned down and tempered which is what I don't want.
Bill Stout
-Original Message
to anyone who downloads by July 28, 2006. This is because of both the valuable feedback, and a support load of less than 2%. The download can be found at www.greenborder.com.
Thanks,
Bill Stout
___
Full-Disclosure - We believe in it.
Charter: http
Title: Browser bugs hit IE, Firefox today (SANS)
http://news.com.com/Browser+bugs+hit+IE%2C+Firefox/2100-1002_3-6089817.html?tag=nefd.top
Published: June 29, 2006, 3:14 PM PDT
I couldnt find more info on SANS site. Anyone have a link to the SANS description?
Bill Stout
GreenBorder
http://news.com.com/Browser+bugs+hit+IE%2C+Firefox/2100-1002_3-6089817.h
tml?tag=nefd.top
Published: June 29, 2006, 3:14 PM PDT
I couldn't find more info on SANS site. Anyone have a link to the SANS
description?
Bill Stout
GreenBorder
http://www.greenborder.com
Free licenses first 10,000
/
Bill Stout
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
the program to run without
crashingin a controlled environment. This virtualization can be done
for filesystem and registry, but also system calls and COM can be
virtualized (spoofed) to the virtual environment.
HTH
Bill Stout
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL
.
Virtualizing at the application level is not as intrusive as sandboxing
techniques. Virtualization provides the ability to enumerate or read
selected real resources, and the protection is more transparent to the
user.
Bill Stout
-Original Message-
From: Joxean Koret [mailto:[EMAIL PROTECTED
product. I am
interested in what the list has to say.
Bill Stout
_
From: Thierry Zoller [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 08, 2006 3:04 PM
To: Bill Stout
Cc: full-disclosure@lists.grok.org.uk
Subject:Re: [Full
those 'CLM' moves and to protect the
consumers of the software.
Bill Stout
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, May 03, 2006 11:10 PM
To: Bill Stout
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] How many vendors
they simply delay the ship a few days in order to QA the patch for vulnerabilities they already knew about?
Do vendors roll the dice on discoverability?
Bill Stout
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure
://www.elsenot.com/frsirt-google.html
Subscription sites
https://www.frame4.net/mdpro/index.php?cmd=files
http://www.frsirt.com/english/
Bill Stout
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tom
Doherty
Sent: Friday, April 28, 2006 5:03 AM
To: full-disclosure
-2006
http://secunia.com/product/73/
Paul is right.
I would never suggest a Windows admin use UNIX, or visa-versa. A
product is only as secure as it's configured.
Bill Stout
www.greenborder.com
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Paul
Point taken; bkfsec, Michael, Valdis.
Statistics are just that. There may be a better crafted comparison
between the webservers than Secunia vulnerabilities.
I think we're in agreement that an administrator has to be familiar with
securing that particular OS.
Bill Stout
-Original
22 matches
Mail list logo