+1
Daniel Preussker
[ Research and Engineering
[ dan...@preussker.net
[ http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x87E736968E490AA1
On 16.08.2013, at 23:49, adam wrote:
> Jann, you know what's even worse than someone being a dick for no
> reason? Someone being a _stup
can you paste it somewhere where no login is required please?
Daniel Preussker
[ Security Consultant, Network & Protocol Security and Cryptography
[ LPI & Novell Certified Linux Engineer and Researcher
[ dan...@preussker.net
[ http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x87E7
+1 (including +1 for the 'rant' about cloud)
Daniel Preussker
[ Security Consultant, Network & Protocol Security and Cryptography
[ LPI & Novell Certified Linux Engineer and Researcher
[ +49 178 600 96 30
[ dan...@preussker.net
[ http://pgp.mit.edu:11371/pks/lo
Hi,
it seems to be patched now
Cheers,
Daniel Preussker
[ Security Consultant, Network & Protocol Security and Cryptography
[ LPI & Novell Certified Linux Engineer and Researcher
[ +49 178 600 96 30
[ dan...@preussker.net
[ http://pgp.mit.edu:11371/pks/lookup?op=ge
bump
On 29.05.2013, at 16:11, Andre Helwig wrote:
> Best solution, don't report the bugs.
> Use the bugs to get your money.. and publish them afterwards :D
>
>
> On 29.05.13 16:04, James Condron wrote:
>> Hrm,
>>
>> I read it that the issue was still the age but that the previous disclosure
>
intelligent...
There are ofc a lot more examples, one individual I used to talk to was close
to jail due to an SQL-Injectection disclosure...
I admit, I might have over exaggerated the situation a bit in rage.
Kind regards,
Daniel Preussker
[ Security Consultant, Network & Protocol Securi
u solve...
And on the other hand, those same companies give away 3-15.000 for a single bug
if the researcher happens to be known :|
Now I don't intent to start a shitstorm or a war here...
Kind regards from the U-Bahn,
Daniel Preussker
[ Security Consultant, Network & Protocol Security
fake clients and
> off goes the AP...
>
> But I would put this "design flaw" in the same cat as the Y2K Problem or the
> Y10K (Y100K, and so on) - just beacuse we currently dont hit it doesnt mean
> we can leave it as it is...
>
>
> Kind Regards without coffe
question, is this known?
Daniel Preussker
[ Security Consultant, Network & Protocol Security and Cryptography
[ LPI & Novell Certified Linux Engineer and Researcher
[ +49 178 600 96 30
[ dan...@preussker.net
[ http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x87E736968E490AA
Christmas and a happy new year!
Daniel Preussker
[ Security Consultant, Network & Protocol Security and Cryptography
[ LPI & Novell Certified Linux Engineer and Researcher
[ +49 178 600 96 30
[ dan...@preussker.net
[ http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x87E736968E490AA1
10 matches
Mail list logo