Re: [Full-disclosure] Free Iraq

2008-03-27 Thread Bill Stout
Valdis, Good point, I didn't know that. I did find a link to Fitna, that politically censored movie. Indirectly related to the thread. Now I have to brush up on my Dutch. http://www.liveleak.com/view?i=ee4_1206625795 Bil Stout - Original Message > From: "[EMAIL PROTECTED]" <[EMAIL P

Re: [Full-disclosure] clustering question

2008-02-26 Thread Bill Stout
TP, SMTP). The clustering software handled service (screend) and virtual IP failover and the configuration files on the shared RAIDset. The systems were equally sized. I haven't seen an application firewall cluster since then. Bill Stout - Original Message From: shadow floating <

Re: [Full-disclosure] Save XP

2008-01-31 Thread Bill Stout
d planned EOL is 2012 (five year lifecycle). That's pretty short product lifecycle for a $10B* development effort. *Ref: http://seattletimes.nwsource.com/html/businesstechnology/2003460386_btview04.html Bill Stout - Original Message From: Tyler Reguly <[EMAIL PROTECTED]&

Re: [Full-disclosure] Save XP

2008-01-31 Thread Bill Stout
mp;y=14 XP EOL: http://support.microsoft.com/lifecycle/?LN=en-gb&x=16&y=12&C2=1173 Bill Stout - Original Message From: scott <[EMAIL PROTECTED]> To: full-disclosure@lists.grok.org.uk Sent: Monday, January 28, 2008 12:43:51 PM Subject: [Full-disclosure] Save XP For

Re: [Full-disclosure] Hardware-based full disk encryption

2008-01-17 Thread Bill Stout
sions. Volume encryption won't encrypt temp directories, there are many temp directory locations depending on from what source you opened a file (email, browser, filesystem, word, etc). Volume encryption products like Credant solve this problem by encrypting temp files. HTH

Re: [Full-disclosure] [OOT] Thesis for master degree

2006-12-15 Thread Bill Stout
life). Bill Stout From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Fajar Edisya Putera Sent: Friday, December 15, 2006 1:45 AM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] [OOT] Thesis for master degree Hello everyone, sorr

Re: [Full-disclosure] Yet another 0day for IE (Disabling Javascript no longer a fix)

2006-09-24 Thread Bill Stout
http://sunbeltblog.blogspot.com/2006/09/seen-in-wild-zero-day-exploit-be ing.html "This exploit can be mitigated by turning off Javascripting. Update: Turning off Javascripting is no longer a valid mitigation. A valid mitigation is unregistering the VML dll. " Bill Stout -Origin

Re: [Full-disclosure] Yet another 0day for IE

2006-09-23 Thread Bill Stout
as local admins. To quote from Securiteam: "Also worth mentioning is that the current in-the-wild exploits attempt system-wide software installations, as do most zero-day exploits for such vulnerabilities. If your browser is not running under an account with administrative privileges, this will no

RE: [Full-disclosure] Browzar Footprints

2006-09-04 Thread Bill Stout
There are a number of index.dat readers out there. Like Index Dat Spy http://indexdatspy.stevengould.org/ -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Vidar Løkken Sent: Monday, September 04, 2006 3:44 AM To: Colin Copley Cc: full-disclosure@lists.

RE: [Full-disclosure] Tempest today

2006-08-20 Thread Bill Stout
ly temporarily. Encryptions of the past are obsolete and weak today, and can be decrypted at leisure.) That's what TEMPEST is worried about. Leaking signal from red side to black side, that signal getting picked up by some guy with telco gear, a bug in the wall or an antenna in the ceiling, or a t

RE: [Full-disclosure] Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know

2006-07-14 Thread Bill Stout
tware is installed on too many desktops. The more eyes the better, and what better talent is there, than on bugtraq and full-disclosure to pry into it? Plus, I'm guaranteed that the feedback here is 'direct and terse' (-M.W.), and not toned down and tempered which is what I don&#x

[Full-disclosure] Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know

2006-07-13 Thread Bill Stout
license to anyone who downloads by July 28, 2006.  This is because of both the valuable feedback, and a support load of less than 2%.  The download can be found at www.greenborder.com.  Thanks, Bill Stout ___ Full-Disclosure - We believe in it

[Full-disclosure] Browser bugs hit IE, Firefox today (SANS)

2006-06-29 Thread Bill Stout
http://news.com.com/Browser+bugs+hit+IE%2C+Firefox/2100-1002_3-6089817.h tml?tag=nefd.top Published: June 29, 2006, 3:14 PM PDT I couldn't find more info on SANS site. Anyone have a link to the SANS description? Bill Stout GreenBorder http://www.greenborder.com Free licenses first 1

[Full-disclosure] Browser bugs hit IE, Firefox today (SANS)

2006-06-29 Thread Bill Stout
Title: Browser bugs hit IE, Firefox today (SANS) http://news.com.com/Browser+bugs+hit+IE%2C+Firefox/2100-1002_3-6089817.html?tag=nefd.top Published: June 29, 2006, 3:14 PM PDT I couldn’t find more info on SANS site.  Anyone have a link to the SANS description? Bill Stout GreenBorder

[Full-disclosure] Thanks for the feedback! GreenBorder License inside - with new options - valid to end of year

2006-06-12 Thread Bill Stout
p://www.greenborder.com/earlyaccess/ Bill Stout ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] Want to test this desktop barrier?, (Unauthorized offer) 0day protection

2006-06-09 Thread Bill Stout
alue or a temporary value is changed, which permits the program to run without crashingin a controlled environment. This virtualization can be done for filesystem and registry, but also system calls and COM can be virtualized (spoofed) to the virtual environment. HTH Bill Stout -Origi

RE: [Full-disclosure] Want to test this desktop barrier? (Unauthorized offer) 0day protection

2006-06-08 Thread Bill Stout
s, and are exposed to attacks which leverage system calls, COM objects, User Shell, etc.. I believe this list is read by some of the best and most aggressive hackers that exist, and this is the best place to expose a new security product. I am interested in what the list has

RE: [Full-disclosure] Want to test this desktop barrier? (Unauthorized offer) 0day protection

2006-06-08 Thread Bill Stout
her than being up to date on their shots. Virtualizing at the application level is not as intrusive as sandboxing techniques. Virtualization provides the ability to enumerate or read selected real resources, and the protection is more transparent to the user. Bill Stout -Original Message- Fro

[Full-disclosure] Want to test this desktop barrier? (Unauthorized offer) 0day protection

2006-06-08 Thread Bill Stout
which environment to open a site requested or Outlook message received. Bill Stout www.greenborder.com Appended below is our marketing spiel: “We are very pleased to give you special, early access to GreenBorder Pro, the new consumer edition of our patented enterprise technology (that’s already

RE: [Full-disclosure] How many vendors knowingly ship GA product with security vulnerabilities?

2006-05-04 Thread Bill Stout
efit to prevent those 'CLM' moves and to protect the consumers of the software. Bill Stout -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Wednesday, May 03, 2006 11:10 PM To: Bill Stout Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-dis

[Full-disclosure] How many vendors knowingly ship GA product with security vulnerabilities?

2006-05-03 Thread Bill Stout
they simply delay the ship a few days in order to QA the patch for vulnerabilities they already knew about?  Do vendors roll the dice on discoverability? Bill Stout ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full

RE: [Full-disclosure] Exploit/POC Database

2006-04-28 Thread Bill Stout
://www.elsenot.com/frsirt-google.html Subscription sites https://www.frame4.net/mdpro/index.php?cmd=files http://www.frsirt.com/english/ Bill Stout -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Tom Doherty Sent: Friday, April 28, 2006 5:03 AM To: full-disclosure

RE: [Full-disclosure] What is wrong with schools these days?

2006-04-25 Thread Bill Stout
Point taken; bkfsec, Michael, Valdis. Statistics are just that. There may be a better crafted comparison between the webservers than Secunia vulnerabilities. I think we're in agreement that an administrator has to be familiar with securing that particular OS. Bill Stout -Ori

RE: [Full-disclosure] What is wrong with schools these days?

2006-04-25 Thread Bill Stout
-2006 http://secunia.com/product/73/ Paul is right. I would never suggest a Windows admin use UNIX, or visa-versa. A product is only as secure as it's configured. Bill Stout www.greenborder.com -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of