On Fri, 17 May 2013, Kirils Solovjovs wrote:
Requests always come from the same IP 65.52.100.214.
Oddly, I have an HTTP request from 65.52.100.214 in my apache log files.
It asked for http://stratigery.com/scripting.ftp.html by far the most
popular page on my web site. It used a HEAD. Refere
On Mon, 12 Dec 2011, Lamar Spells wrote:
> For the past several days, I have been seeing thousands of requests
> looking for awstats.pl like this one:
Yeah, me too. They just started up. I haven't seen any awstats.pl
requests since 2010-05-18, and now I've gotten batches of them, since
about 20
On Sat, 11 Jun 2011, Nick FitzGerald wrote:
> Nowadays the big, noisy, obvious, "own the net" type "outbreak" of
> yesteryear is not the model of choice for your typical cyber-thug (you
> know, those running virtually all malware these days)..
>
> In fact, _avoiding_ exactly that is pretty much to
On Tue, 7 Oct 2008, Miller Grey wrote:
> What? I think I missed something here.
> On Tue, Oct 7, 2008 at 1:53 PM, Bruce Ediger <[EMAIL PROTECTED]> wrote:
>> On Mon, 6 Oct 2008, [EMAIL PROTECTED] wrote:
>>> Hint 2: If botnets in home computers were so easy to shut down
On Mon, 6 Oct 2008, [EMAIL PROTECTED] wrote:
> Hint 2: If botnets in home computers were so easy to shut down, why are
> there so many miscreants still using them for nefarious purposes?
Easy. For the same reason that the NSA used to have (circa 1985) big, 3-ring
binders full of 0-days for VMS,
> On Wed, 3 Sep 2008 16:31:25 +0700
> "Samuel Beckett" <[EMAIL PROTECTED]> wrote:
>> After the successful credit card transaction, certain credit card details
>> are then encrypted and stored within the database.
And then, on Thu, 4 Sep 2008, Shaun wrote:
> There is your worst case. Game over.
A
On Tue, 27 May 2008, Anders B Jansson wrote:
> Limiting the continued propagation of sql-slammer is both a worthy and
> commendable deed.
>
> But I'm afraid that it's totally futile.
How so? Code Red II and Nimda appear to have disappeared, albeit after many
years.
I suspect that somebody let l
On Fri, 6 Apr 2007 [EMAIL PROTECTED] wrote:
...
> moderate risk) environments, you need to remember: security is a
> measurement of risk. If the threat is low enough, then WEP should
> be fine.
...
Wait just a minute. Do you propose to say that "security" is an economic
good, wit
" userland and libc would constitute
a different flavor, right?
Nevertheless, the received wisdom remains that "If linux took over from
Windows tomorrow, all the hackers would concentrate on linux flaws, and
we'd be in the same position."
--
Bruce Ediger
720-932-1954
[EMAIL
On Sat, 31 Dec 2005, Geo. wrote:
Actually not. If you fill an NTFS disk with files that are 1K or smaller it
forces the MFT to suck up the whole disk, small files are stored entirely in
the MFT instead of like larger files which have an MFT entry and a data
segment for storage area. Once that ha
On Wed, 23 Nov 2005, Michael Holstein wrote:
The fact that Mac users are an elitist group that believes themselves
invulnerable to viruses/etc doesn't help either.
What, is an OSX virus or worm going around? Has anybody got details?
Or is this just the old NeXTStep problem where a Mach task
point me to it?
Sincerely,
Bruce Ediger
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On Fri, 9 Sep 2005, Bruce Ediger wrote:
If you can get a hold of a copy of the now-defunt "Brill's Content"
magazine for September of 1998, you can read a big expose' of the
way MSFT deals with reporters and trade pressmen. I doubt that
any money changes hands on these
On Fri, 9 Sep 2005, Larry Seltzer wrote:
Well, MSFT is going to issue a critical patch next Tuesday. Maybe this is a
shiny object,
intended to divert some media pressure away from an MSFT design botch.
Allright, maybe I haven't listened to enough Air America lately, so help me
out with how t
On Fri, 9 Sep 2005, Larry Seltzer wrote:
Whatever. My point was that he treated the two situations differently. Why?
Do you believe in Conspiracy Theories? Do you believe that certain media
people, and indeed, many others get a certain Large Software Company's
money for doing things for them?
On Sat, 12 Mar 2005, Feher Tamas wrote:
If Microsoft gives fixes info to Uncle Sam first, it gives
USA the exploits first.
Note that this may have gone on for some time, and MSFT is not the
only culpable vendor:
Cambridge security researcher Ross Anderson says in his paper "Security
in Open versus
16 matches
Mail list logo