Re: [Full-disclosure] Full-Disclosure Digest, Vol 100, Issue 21

2013-06-18 Thread Daniel Sichel
You mean like using GMail via Webmail (without PGP)? Which security professional would do this? Do you still use Telnet to manage your devices instead of SSH? Yeah, pretty much. Is that a problem? I mean who cares about the privacy or security of email? As to the telnet, I have a firewall, what c

[Full-disclosure] Donkey Kick Exploit

2013-03-29 Thread Daniel Sichel
> I could go thru this list and make money turning all you assholes in... > > I found a flaw in my front door's lock. It's called a "donkey kick" and is > quite > effective on 98% of all door locks. > > you guys slay me. > > > > FOAD Do you have proof of concept code on the donkey kick thing

[Full-disclosure] stealing ssh keys

2012-10-23 Thread Daniel Sichel
> Hello everybody: > environment is A is hacker client? B is target and C is Manager > center and C have all A and B private key. > C are open 80,22. And this is http's 403 state on the C. > I have A's root,how to steal private key On the C. Are there have > some vuln with openssh.

[Full-disclosure] Snail mail vs. Email

2011-10-12 Thread Daniel Sichel
>Well there is no push to make snail-mail encrypted and lets face it most >peoples mailboxes don't have any sort of locking mechanisms and is >available to anyone with two hands and the malicious intent to steal >someones mail however the US Gov needs a warrant to intercept your >physical mail

[Full-disclosure] Search and Seizure of Email

2011-10-12 Thread Daniel Sichel
>In fact, law enforcement officials don?t even need a search warrant to >access private emails. In point of fact, nobody does, although acquiring this access is clearly easier for law enforcement. One of the burdens that the freedom the Internet brings, is the freedom. Your email is out there, typ

[Full-disclosure] Wipe off, rub out, reappear...

2011-10-10 Thread Daniel Sichel
Somebody posted the following; > I'm just curious to these questions. It's strange to hear someone > saying "we basically have no idea what's going on". > Doesn't sound funny to me, happens to me all the time. That's how I learn. Dan S. ___ Full-

[Full-disclosure] Expired certificate

2010-07-16 Thread Daniel Sichel
OK, I am in the Golden state (California) where things are not so golden at the moment. I deal with a state agency and use their "secure" ftp site. Their certificate has expired and won't be renewed for a few weeks, but they want me to continue to ftp stuff Using their expired cert. So, as a rela

Re: [Full-disclosure] Full-Disclosure Digest, Vol 65, Issue 14

2010-07-12 Thread Daniel Sichel
>Message: 4 >Date: Fri, 09 Jul 2010 09:38:49 -0400 >From: Iadnah >Subject: [Full-disclosure] Nostalgia and days gone by >To: full-disclosure@lists.grok.org.uk >Message-ID: <4c372669.4000...@uplinklounge.com> >Content-Type: text/plain; charset=ISO-8859-1; format=flowed > >I know this is offtopic bu

[Full-disclosure] RDP, can it be done safely?

2010-06-09 Thread Daniel Sichel
We have a boneheaded group of software developers who even in this day and age eschew the client server model of software for the easier dumber run it from the console school of design. So I have this idiotic Windows accounting application that MUST run on an application server, cannot be

[Full-disclosure] Secure Computing (McAfee) Smart Filter possible issue

2009-03-19 Thread Daniel Sichel
While resolving a tech support issue with McAfee Smart Filter I found the clear text password and user name of the SmartFilter user ID that authenticates to the proxy server in at least one place, the config.txt file in the config subdirectory under c:\Program Files\Secure Computing\Smartfilter Adm

[Full-disclosure] Thank you for help with management.

2008-05-23 Thread Daniel Sichel
all again. Daniel Sichel, CCNP, MCSE,MCSA,MCTS (Windows 2008) Network Engineer Pwnderosa Telephone (559) 868-6367 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by

[Full-disclosure] Need some help with management

2008-05-22 Thread Daniel Sichel
when you are in the United States, it's a bad idea to drive on the left hand side of the road. It's just so basic it's not documented anywhere. So, please help me explain why netbios and file shares on machines not within your network are bad ideas. Thanks, Daniel Sichel,

[Full-disclosure] Is this sane?

2007-10-15 Thread Daniel Sichel
goal, then we have become their enemy, not their ally. It's the same old story, computer security is something you have, end user trust; and something you know, I must (and can) allow my end users to get their jobs done timely and securely. Daniel Sichel, CCNP, MCSE

[Full-disclosure] Alas poor Dunfey, I knew it well

2006-04-17 Thread Daniel Sichel
> > > >    THURSDAY, MAY 11, 1978 - 2 PM > >    DUNFEY'S ROYAL COACH > >    SAN MATEO, CA > >    (4 MILES SOUTH OF S.F. AIRPORT AT BAYSHORE, RT > > 101 AND RT 92) Sorry, but I couldn’t stop myself from mourning the loss of

[Full-disclosure] S/Mime Exchange 2003 how secure how to secure it?

2006-03-28 Thread Daniel Sichel
click, I just want to do it, no user intervention required (or allowed).   Any help would be welcomed, any Microsoft bashing would be a waste of time since the higher powers have spoken and you know how that goes, So it is written, so shall it be done.   Thanks     Daniel Sichel, MCSE, CCNP

[Full-disclosure] Security Appliances -Fortigate

2005-12-28 Thread Daniel Sichel
If you are looking for HA, good proxies, and an appliance unit that runs rock solid (if kind of loud) I strongly suggest you try a Sidewinder from Secure Computing.  They use Intel adapters and you can get units with multiple adapters (we currently use 2 quad port cards in each of our units

[Full-disclosure] Commercial pressure as a threat to security

2005-12-06 Thread Daniel Sichel
>Content-Type: text/plain > >Commercial pressures are just as harmful to security as are complexity and ignorance. > >Regards, > >Jason Coombs >[EMAIL PROTECTED] That is a profound insite (at least for me). It crystalizes what I have experienced for many years and am about to again. My company i

[Full-disclosure] RE: Keystroke Logger proof softtware

2005-12-02 Thread Daniel Sichel
>The goal of the project is to see if we can design a system that prevents an >uneducated user from shooting themselves in the in the foot. Let me save you a lot of time and effort. You can't. Dan S. Ponderosa Telephone ___ Full-Disclosure - We belie

[Full-disclosure] RE: Good old days and flames

2005-12-01 Thread Daniel Sichel
two irrelevancies for you folks >WildCAT BBS Anyone :) > >I remember playing tradewars and calling who knows where to get new text >files :) > >Used Tone-loC a lot more back then :) > I rember my first zmodem download. I dropped it in the middle to test the resume feature. When I saw it work

[Full-disclosure] Happy Helpful web apps that just need port xx open....

2005-11-09 Thread Daniel Sichel
>Sorry, no way on earth am I gonna run your wretched java virus/trojan just >in order to get the opportunity to have marketing bullshit rammed down my >throat. It's utter GARBAGE to claim that installing some completely unknown >java application is somehow a "safe environment" compared to read

[Full-disclosure] RE: Getting a clue at Cisco

2005-08-01 Thread Daniel Sichel
> Or perhaps Cisco > has already finished its transformation to the modern kind of bussines and > got rid of anyone with a clue? There are still a few people there who have their heads screwed on right. Of course finding them can be a challenge Hurrah for the global economy, the largest expo

[Full-disclosure] Forensic evidence pros and cons

2005-07-05 Thread Daniel Sichel
>The police find the data where they find it. That's called >'circumstantial evidence' and digital evidence will always be treated >exactly as such no matter who we successfully convince of the flaws >inherent in the filing cabinet or printed document/glossy photograph >analogy. It is not circ

[Full-disclosure] RE: End users as security devices

2005-06-09 Thread Daniel Sichel
Praise be to God for the User! They are powerful! They are trainable! They >>are my BEST defense! >> >>There. I fell better now. >> You are onto a good thing and make a good point. At my last job the organizatios CAO insisted that security not block ANYTHIHG any user wanted, IM, HTML mail, stre

[Full-disclosure] Mozillat trashing host file

2005-06-08 Thread Daniel Sichel
> Upon return, when she tries to go to her specified homepage, it instead > tries to access the hotel's (I'm assuming here) proxy or autorization > server - no, no proxy settings set. >The hotel DHCP probably over wrote your hosts or DNS resolver file. On >Slackware that would be /etc/hosts and /

[Full-disclosure] Somewhat off topic but related?

2005-03-29 Thread Daniel Sichel
I am headed for CCNP bootcamp so I can take some tests to see if I can do what I have been doing for the last five years. I have no idea what will be on the tests and am looking for some good braindumps. Anybody know of good CCNP braindumps. Sorry to be off topic, but I don't know who else to ask.

[Full-disclosure] Windows is EASY and SECURE

2005-03-18 Thread Daniel Sichel
I thought you might find the following, gleaned from a Microsoft web site white paper about "Myths of Security" amusing... But before you laugh too hard, remember the Dilbert bosses are all reading and believing this stuff. Myth 4: Tweaks Are Necessary Even on highly exposed systems, most of