You mean like using GMail via Webmail (without PGP)? Which security
professional would do this? Do you still use Telnet to manage your
devices instead of SSH?
Yeah, pretty much. Is that a problem? I mean who cares about the privacy or
security of email? As to the telnet, I have a firewall, what c
> I could go thru this list and make money turning all you assholes in...
>
> I found a flaw in my front door's lock. It's called a "donkey kick" and is
> quite
> effective on 98% of all door locks.
>
> you guys slay me.
>
>
>
> FOAD
Do you have proof of concept code on the donkey kick thing
> Hello everybody:
> environment is A is hacker client? B is target and C is Manager
> center and C have all A and B private key.
> C are open 80,22. And this is http's 403 state on the C.
> I have A's root,how to steal private key On the C. Are there have
> some vuln with openssh.
>Well there is no push to make snail-mail encrypted and lets face it
most
>peoples mailboxes don't have any sort of locking mechanisms and is
>available to anyone with two hands and the malicious intent to steal
>someones mail however the US Gov needs a warrant to intercept your
>physical mail
>In fact, law enforcement officials don?t even need a search warrant to
>access private emails.
In point of fact, nobody does, although acquiring this access is clearly
easier for law enforcement.
One of the burdens that the freedom the Internet brings, is the freedom.
Your email is out there, typ
Somebody posted the following;
> I'm just curious to these questions. It's strange to hear someone
> saying "we basically have no idea what's going on".
>
Doesn't sound funny to me, happens to me all the time. That's how I
learn.
Dan S.
___
Full-
OK, I am in the Golden state (California) where things are not so golden
at the moment.
I deal with a state agency and use their "secure" ftp site.
Their certificate has expired and won't be renewed for a few weeks, but
they want me to continue to ftp stuff
Using their expired cert.
So, as a rela
>Message: 4
>Date: Fri, 09 Jul 2010 09:38:49 -0400
>From: Iadnah
>Subject: [Full-disclosure] Nostalgia and days gone by
>To: full-disclosure@lists.grok.org.uk
>Message-ID: <4c372669.4000...@uplinklounge.com>
>Content-Type: text/plain; charset=ISO-8859-1; format=flowed
>
>I know this is offtopic bu
We have a boneheaded group of software developers who even in this day
and age eschew the client server model of software for the easier dumber
run it from the console school of design. So I have this idiotic Windows
accounting application that MUST run on an application server, cannot be
While resolving a tech support issue with McAfee Smart Filter I found
the clear text password and user name of the SmartFilter user ID that
authenticates to the proxy server in at least one place, the config.txt
file in the config subdirectory under c:\Program Files\Secure
Computing\Smartfilter Adm
all again.
Daniel Sichel, CCNP, MCSE,MCSA,MCTS (Windows 2008)
Network Engineer
Pwnderosa Telephone (559) 868-6367
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
when you are in the United States, it's a
bad idea to drive on the left hand side of the road. It's just so basic
it's not documented anywhere. So, please help me explain why netbios and
file shares on machines not within your network are bad ideas.
Thanks,
Daniel Sichel,
goal, then we have become their
enemy, not their ally. It's the same old story, computer security is
something you have, end user trust; and something you know, I must (and
can) allow my end users to get their jobs done timely and securely.
Daniel Sichel, CCNP, MCSE
> >
>
>
THURSDAY, MAY 11, 1978 - 2 PM
>
>
DUNFEY'S ROYAL COACH
>
>
SAN MATEO, CA
>
>
(4 MILES SOUTH OF S.F.
AIRPORT AT BAYSHORE, RT
> > 101 AND RT 92)
Sorry, but I couldn’t stop myself from mourning the
loss of
click, I just want to do it, no user
intervention required (or allowed).
Any help would be welcomed, any Microsoft bashing would be a
waste of time since the higher powers have spoken and you know how that goes,
So it is written, so shall it be done.
Thanks
Daniel Sichel, MCSE, CCNP
If you are looking for HA, good proxies, and an appliance unit
that runs rock solid (if kind of loud) I strongly suggest you try a Sidewinder
from Secure Computing. They use Intel adapters and you can get units with
multiple adapters (we currently use 2 quad port cards in each of our units
>Content-Type: text/plain
>
>Commercial pressures are just as harmful to security as are complexity
and ignorance.
>
>Regards,
>
>Jason Coombs
>[EMAIL PROTECTED]
That is a profound insite (at least for me). It crystalizes what I have
experienced for many years and am about to again. My company i
>The goal of the project is to see if we can design a system that
prevents an
>uneducated user from shooting themselves in the in the foot.
Let me save you a lot of time and effort. You can't.
Dan S.
Ponderosa Telephone
___
Full-Disclosure - We belie
two irrelevancies for you folks
>WildCAT BBS Anyone :)
>
>I remember playing tradewars and calling who knows where to get new
text
>files :)
>
>Used Tone-loC a lot more back then :)
>
I rember my first zmodem download. I dropped it in the middle to test
the resume feature. When I saw it work
>Sorry, no way on earth am I gonna run your wretched java virus/trojan
just
>in order to get the opportunity to have marketing bullshit rammed down
my
>throat. It's utter GARBAGE to claim that installing some completely
unknown
>java application is somehow a "safe environment" compared to read
> Or perhaps Cisco
> has already finished its transformation to the modern kind of bussines
and
> got rid of anyone with a clue?
There are still a few people there who have their heads screwed on
right. Of course finding them can be a challenge
Hurrah for the global economy, the largest expo
>The police find the data where they find it. That's called
>'circumstantial evidence' and digital evidence will always be treated
>exactly as such no matter who we successfully convince of the flaws
>inherent in the filing cabinet or printed document/glossy photograph
>analogy.
It is not circ
Praise be to God for the User! They are powerful! They are trainable!
They
>>are my BEST defense!
>>
>>There. I fell better now.
>>
You are onto a good thing and make a good point.
At my last job the organizatios CAO insisted that security not block
ANYTHIHG any user wanted, IM, HTML mail, stre
> Upon return, when she tries to go to her specified homepage, it
instead
> tries to access the hotel's (I'm assuming here) proxy or autorization
> server - no, no proxy settings set.
>The hotel DHCP probably over wrote your hosts or DNS resolver file. On
>Slackware that would be /etc/hosts and /
I am headed for CCNP bootcamp so I can take some tests to see if I can
do what I have been doing for the last five years. I have no idea what
will be on the tests and am looking for some good braindumps. Anybody
know of good CCNP braindumps. Sorry to be off topic, but I don't know
who else to ask.
I thought you might find the following, gleaned from a Microsoft web
site white paper about "Myths of Security" amusing... But before you
laugh too hard, remember the Dilbert bosses are all reading and
believing this stuff.
Myth 4: Tweaks Are Necessary
Even on highly exposed systems, most of
26 matches
Mail list logo