On 10/22/06, K F (lists) [EMAIL PROTECTED] wrote:
Where were the politics? I was simply stating the facts.
-KF
crap, trolls. I just responded to the same person or one of his
friends who disputed the usage of the word their.. damn
It seems to be trying to get a response with a one liner that
On 10/16/06, Michael Holstein [EMAIL PROTECTED] wrote:
Here's what I did when researching the same thing ...
Google free stuff. Find a page with thousands of free offers. Fill
one out and check *every* box. Reply to whatever confirm emails come in.
Technically thats not spam. since you
On 10/13/06, Turgut Baumann [EMAIL PROTECTED] wrote:
Welcome to RACISM FULL-DISCLOSURE. What was this list supposed to be? An
Chatbox for Stupid White american male, with their CNN-view-of-life,
stupid nazi scum, with the old, lame arguments about jews, colored
people and the true Herrenrasse,
if [EMAIL PROTECTED] is actually Mischa Spiegelmock i'll eat my two
week old tighty whities on youtoube.com
and about the claim that it is a fake:
The JavaScript issue appears to be a real vulnerability, Window Snyder,
Mozilla's security chief, said after watching a video of the
presentation
.
- Original Message -
From: Pink Hat
To: Dude VanWinkle
Cc: [EMAIL PROTECTED] ; full-disclosure@lists.grok.org.uk
Sent: Wednesday, October 04, 2006 12:16 AM
Subject: Re: [Full-disclosure] Firefox Vulnerabilities FAKED
Seeing how you obviously can't trust a boy to do a man's job
Has anyone tested these against the (very) recent MS patch?
-JP
On 9/26/06, H D Moore [EMAIL PROTECTED] wrote:
Nice work Aviv! All of these methods, along with a few extras, are
implemented in the Metasploit 2.6 version of this module. Last I checked,
not a single AV or IPS could pick it up.
why not just use a dumb terminal if you are going to go to all that trouble?
-JP
On 9/15/06, Dean Pierce [EMAIL PROTECTED] wrote:
There is the convenience issue of the speed that the image transfers
across the network.
There is also the issue that infected workstations may be collecting
If history truely repeats itself, I expect we will see these after
every patch tuesday for sometime to come.
-JP
On 9/15/06, Juha-Matti Laurio [EMAIL PROTECTED] wrote:
SANS ISC:
http://isc.sans.org/diary.php?storyid=1701
MS Security Advisory #925444:
On 9/15/06, Richard Golodner [EMAIL PROTECTED] wrote:
As we had seen today everybody has an opinion about how the Botnet
metrics are computed. I have been reading Gadi's post for many years now and
believe he is a very knowledgeable and competent person. Give the guy a
break, he has
On 9/14/06, Geo. [EMAIL PROTECTED] wrote:
POC did nothing for my Foxit PDF reader. No www-page was opened and no
script was executed. Maybe you folks should just dump the clumsy and
insecure Acrobat Reader and move onto something better for reading .pdf
documents? ;)
Good suggestion but
On 9/14/06, Jose Nazario [EMAIL PROTECTED] wrote:
i guess i'm curious about your position, then, and what you're meaning by
our instinctive ideas about what's possible.
You see, the universe operates with a distinct prejudice towards
individuals with an inclination towards lunacy...
they
On 9/14/06, Gadi Evron [EMAIL PROTECTED] wrote:
This counts bot samples. Whether they are variants (changed) or
insignificant changes such as only the IP address to the CC, they are
counted as unique.
So if you have multiple machines NAT'ed under one IP, that is one pot.
err bot eh? OK.
this ones for you Paul ;-)
http://www.workingforchange.com/comic.cfm?itemid=21200
On 8/29/06, Paul Schmehl [EMAIL PROTECTED] wrote:
--On Tuesday, August 29, 2006 16:59:41 +0100 teh kids
[EMAIL PROTECTED] wrote:
try googling BBC and Hezbollah - it took me all of 30 seconds to find
_and_ read
On 8/29/06, Paul Schmehl [EMAIL PROTECTED] wrote:
Or this?
http://news.bbc.co.uk/2/hi/middle_east/4781551.stm
On the evening of 23 July, he and two other medics answered a call to
rendezvous with an ambulance from Tibnin, in the hills to the east, to
relay three civilian patients down to Tyre.
On 8/29/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
I can think of two explanations. Either the story isn't fake (very
unlikely if you read the evidence) or the media isn't controlled by the
jews after all.
Drat, foiled again!
Damn you Schmehl! :-)
-JP
On 8/26/06, ... [EMAIL PROTECTED] wrote:
Secure OWA: Oxymoron
Really? go for it: https://mail.microsoft.com/exchange
-JPwho thinks sendmail is a little less secure
___
Full-Disclosure - We believe in it.
Charter:
On 8/26/06, Adriel Desautels [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dude, which is more secure in your opinion. A base install of sendmail
or a base install of OWA/exchange?
sorry, that was a bad comparison/joke. They are two different
products. One is a
On 8/18/06, ... [EMAIL PROTECTED] wrote:
forth: getting angry if someone spots you
fifth: insulting for free (i did not, you uneducated subject).
Your email forensics skills are only matched by your command of the
english language, and only surpassed by your deductive reasoning.
-JP
On 8/17/06, Fetch, Brandon [EMAIL PROTECTED] wrote:
/secures tinfoil hat
And didn't Intel just announce here recently they were making their
hardware drivers open source for the ...betterment of the Linux
community...?
http://ipw3945.sourceforge.net/
seems like they have been open source
On 8/15/06, Peter Besenbruch [EMAIL PROTECTED] wrote:
Dude VanWinkle wrote: What? you can dish it but you cant take it?No, I just filter. I suspect a lot fewer people will be reading youre-mails, Dude.You do know I didnt send out the pr0n right?
Just trying to make light of the situation
VanWinkle
To: Peter Besenbruch
Cc: full-disclosure
Sent: Tuesday, August 15, 2006 12:31 PM
Subject: Re: [Full-disclosure] Reverse LOL HELLO FURRY PORN
On 8/15/06, Peter Besenbruch [EMAIL PROTECTED] wrote:
Dude VanWinkle wrote:
What? you can dish it but you cant take it?
No, I just filter. I
On 8/15/06, cardoso [EMAIL PROTECTED] wrote:
Back in the old BBS days it was an old trick already.Oh, it wasn´t me. My friend/cousing/dog/pel llama used my computer andsent those lucky charm chain mails and all the get rich fast schemes,please do not ban me from your BBS
Damn you busted me, I am
On 8/15/06, Julio Cesar Fort [EMAIL PROTECTED] wrote:
Dude VanWinkle,
snip
-
Looks to me like they are using port 0.
http://www.grc.com/port_0.htm
-JP
*NEVER TRUST* Steve Gibson. I bet he smokes crack. See
http://attrition.org/errata/charlatan.html#gibson
On 8/15/06, Darren Bounds [EMAIL PROTECTED] wrote:
Adriel,
I was replying to Dude VanWinkle, who's been chasing down the src/dst port 0
unnecessarily.
Nah, I realized after the 4th post it was an ICMP packet and was just
curious about port 0
Only TCP/UDP have ports, I know that :-)
-JPone
On 8/14/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Sun, 13 Aug 2006 08:32:16 EDT, Dude VanWinkle said:
When I worked at a university, the students were always getting
compromised till we implemented sandboxing. People DHCP'ing into the
network were placed in a subnet by themselves till
On 8/14/06, Peter Besenbruch [EMAIL PROTECTED] wrote:
I keep hitting reply, and not posting to the list.
Original Message
[EMAIL PROTECTED] wrote:
On Sun, 13 Aug 2006 08:32:16 EDT, Dude VanWinkle said:
When I worked at a university, the students were always getting
On 8/14/06, Jonathan Glass (gm) [EMAIL PROTECTED] wrote:
Peter Besenbruch wrote:
I keep hitting reply, and not posting to the list.
Original Message
[EMAIL PROTECTED] wrote:
On Sun, 13 Aug 2006 08:32:16 EDT, Dude VanWinkle said:
When I worked at a university
who is bernal?
On 8/14/06, Time 4 [EMAIL PROTECTED] wrote:
LOL THIS IS PORN FOR BERNAL AND THE WHITEHATS
BERNAL CANNOT STOP FULL DISCLOSURE
___
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Oh yeah, well take this, punk:
attachment: ent_beaarthur_pic.jpg
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
What? you can dish it but you cant take it?
attachment: bea-arthur.jpg
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
attachment: yo_mama.jpg
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 8/14/06, Eric Ericson [EMAIL PROTECTED] wrote:
Dude,
You know damn well the Geneva Convention states very clearly that there shall be NO FIRST USE OF BEA ARTHUR.
Expect a summons to the ICC at the Hague to account for these war crimes.I thought I showed amazing restraint actually.I found
On 8/13/06, Gadi Evron [EMAIL PROTECTED] wrote:
Hi guys, here is a forward of my follow-up to the previous message.
Gadi.
-- Forwarded message --
Date: Sat, 12 Aug 2006 13:12:30 -0500 (CDT)
From: Gadi Evron [EMAIL PROTECTED]
To: botnets@whitestar.linuxbox.org
Subject:
On 8/11/06, Brendan Dolan-Gavitt [EMAIL PROTECTED] wrote:
Is there any technical reason that an exploit cannot be developed
against XP SP2 and Server 2003 SP1? Or is this only a limitation of
the current Metasploit exploit?
I think the poster you are referring to was talking about Core IMPACT
On 8/11/06, Peter Dawson [EMAIL PROTECTED] wrote:
ACK that !! :)-
On 8/11/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
What a maroon
http://www.google.com/search?hl=enq=%22Alif+Terranson%22btnG=Google+Search
from the listed google search, 1st hit
Alif Terranson, a former Savvis
On 8/11/06, root [EMAIL PROTECTED] wrote:
Some (web) security blogs/sites I like:
http://ha.ckers.org/ - in my opinion this is (by far) the best web
security related blog. RSnake rocks!
http://isc.sans.org/ - security news, latest stuff
http://netsec.blogspot.com/ - latest links
On 8/10/06, H D Moore [EMAIL PROTECTED] wrote:
On Wednesday 09 August 2006 13:10, Matt Davis wrote:
Did I completely miss exploit code being released in the wild for that
vulnerability?
The Metasploit Framework module is now public, I included a copy of the
email I sent to the Framework
On 8/7/06, Nikolay Kubarelov [EMAIL PROTECTED] wrote:
On Friday 04 August 2006 16:06, pdp (architect) wrote:
IMHO, if you want to do stuff on lower level, you need to think of
something else. JavaScript, Flash and Java Applets are technologies
that are designed to run on the WEB. This is why,
On 8/7/06, Thomas D. [EMAIL PROTECTED] wrote:
-Original Message-
From: Bipin Gautam
Sent: Saturday, August 05, 2006 9:21 AM
Subject: when will AV vendors fix this???
to keep things simple, let me give you a situation;
if there is a directory/file a EVIL_USER is willing to hide
On 8/2/06, Matt Burnett [EMAIL PROTECTED] wrote:
The charter says the list is supposed to be self-policing. How do
we take action against offending members, short of a d0s? The charter
also says that management can remove members for spamming or
misappropriation. Have anyone from management read
On 8/1/06, Marc Maiffret [EMAIL PROTECTED] wrote:
Hi,
I am happy to announce to the first incarnation of
http://research.eEye.com. On this site you can find everything from our
previously released advisories to our previously unreleased research
tools. A lot of these tools are seeing daylight
On 7/31/06, Stan Bubrouski [EMAIL PROTECTED] wrote:
On 7/31/06, n3td3v v3dt3n [EMAIL PROTECTED] wrote:
That goes for you too mister. Stop impersonating me or i will tell your mom,
I am the real n3td3v as i own n3td3v.com So there you little twerp.
I've never bothered to impersonate you,
On 7/31/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
My experience has been that many companies simply do not care about
security until they are forced to.
opinion
The problem with companies is that they are pubicly traded. This means
that if total profits for your company are
http://www.sysadminday.com/
Happy SysAdmin day all :-)
-JP
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 7/18/06, Gadi Evron [EMAIL PROTECTED] wrote:
A couple more notes...
This can have significant uses for corporations. For example, finding lost
source code by using the filetype: feature, or as Dude already mentioned
on this thread, to find wrongly named executables.
Also, using the site:
On 7/17/06, Debasis Mohanty [EMAIL PROTECTED] wrote:
Nice .. Realy nice pointers H.D. !! :)
Really nice pointers yourself!
By searching for:
site:.il signature: 4550 filetype:pif
I find a site with badtrans.b
www.arava.co.il/matan/svgalib/hypermail/att-1469/01-fun.MP3.pif
Hmm, any
On 7/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Mon, 17 Jul 2006 17:27:30 EDT, Dude VanWinkle said:
Hmm, any bets on who is the most infected TLD... :-)
-JPwho is betting on .ru
Biggest source of malware isn't the same as most infected.
I'm betting on .com/.net (the US
top 2 weird malware distribution sites:
http://lists.w3.org/Archives/Public/site-comments/2003Aug/att-0008/movie0045.pif
lists.suse.com/archive/suse-sparc/2004-Jan/att-0009/message.pif
-JP
___
Full-Disclosure - We believe in it.
Charter:
On 7/17/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Mon, 17 Jul 2006 21:45:07 EDT, Dude VanWinkle said:
Still, AV was around then, and for some reason i feel w3.org should be
a site that didnt allow viruses in its mailing lists, public or not
You must be the only guy who's never had
On 7/13/06, Castigliola, Angelo [EMAIL PROTECTED] wrote:
This doesn't mean that W98 is secure. On Secunia's site the latest(corrected) vulnerability is dated 20060613, less than 1 month ago, andtomorrow someone could find a new one that won't be corrected.
Sure, that could happen but seeing how
On 7/12/06, Flavio Visentin [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Castigliola, Angelo wrote:
There are no known remote exploits for the
Windows 98 operating system.
This doesn't mean that W98 is secure. On Secunia's site the latest
(corrected) vulnerability
On 7/10/06, Line Noise [EMAIL PROTECTED] wrote:
On 7/10/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Mon, 10 Jul 2006 06:21:17 -0500 Bartlomiej Szymanski
[EMAIL PROTECTED] wrote:
Hello,
I have a problem with message delivery via Postfix...
[snip]
Refrain from off-topic discussions
On 7/8/06, Gadi Evron [EMAIL PROTECTED] wrote:
On Sat, 8 Jul 2006, J.A. Terranson wrote:
On Sat, 8 Jul 2006, Gadi Evron wrote:
And, for the second time, in the second forum (but with no answer as yet),
I ask Why is this closed to these communities?. These are the very
communities most
On 6/23/06, Gadi Evron [EMAIL PROTECTED] wrote:
Last year some of us made jokes about Vishing on funsec, today it's a
reality. Here is the incident going public:
http://www.websense.com/securitylabs/alerts/alert.php?AlertID=534
Special thanks to the good guys at Websense and the PIRT guys at
On 5/22/06, Brian Dessent [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] wrote:
On Mon, 22 May 2006 12:02:23 EDT, Dude VanWinkle said:
DNS foo to the client, how easy is that? Would you have to get the
upstream DNS server to cache your bogus entry?
You'd be *amazed* how many are still
On 5/23/06, Brian Eaton [EMAIL PROTECTED] wrote:
On 5/23/06, Dude VanWinkle [EMAIL PROTECTED] wrote:
I guess you would hijack their machines with a bug that would edit the
local cache, refresh the cache, then report to you about the websites
the victim's machine had visited, and you could
On 5/21/06, Thierry Zoller [EMAIL PROTECTED] wrote:
Dear Dude VanWinkle,
DV Why would it matter who signed it? As long as the data is encrypted as
DV it travels over the internet, I am happy.
Why would it matter who signed it? I am happy to handle the ssl
handshake mitm for you. All your
On 5/22/06, Michael Holstein [EMAIL PROTECTED] wrote:
I was referring to the CA that signs it. It was implied that
freessl.com, who gives out trial certificates, is an unreliable CA. I
do not understand why their certs would be any less valid than
anothers.
Not less valid, less trusted. SSL
On 5/21/06, Ginsu Rabbit [EMAIL PROTECTED] wrote:
Stuff
The only thing that matters about SSL is the fact that it encrypts the
data. You can reduce your checklist to:
-
1: Make sure you use a good cipher |
On 4/16/06, n3td3v [EMAIL PROTECTED] wrote:
On 4/16/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Some whiney BS,
You guys are just pissed that Gadi gets paid for his knowledge, while
you are forced to try and gain notoriety by tossing unasked for
opinions on non-moderated mailing lists.
On 4/16/06, J.A. Terranson [EMAIL PROTECTED] wrote:
On Sat, 15 Apr 2006, nocfed wrote:
---SNIP---
DIGITAL WILL BE GIVING A PRODUCT PRESENTATION OF THE NEWEST MEMBERS OF
THE DECSYSTEM-20 FAMILY; THE DECSYSTEM-2020, 2020T, 2060, AND 2060T.
THE DECSYSTEM-20 FAMILY OF COMPUTERS HAS EVOLVED
==D~~
Appendix A Vendor Information
8==D~~
http://www.isc.org/index.pl?/sw/openreg/
8==D~~
Appendix B References
8==D~~
RFC 863
8==D~~
Contact
8==D~~
Dude
On 2/28/06, Lance James [EMAIL PROTECTED] wrote:
Eric B wrote:
Wait, so if I read this right, consumers with existing cards could
dupe their legit cards for fake ones and cash in the fake ones yet
still have credit on the legit card?
So I'm assuming Fedex has no database/authentication
On 2/27/06, coderman [EMAIL PROTECTED] wrote:
::Question:: How do I observe/participate in cypherpunks list discussions?
Err, would [EMAIL PROTECTED] be an OK place request subscription? The
http://www.cypherpunks.to/list/ site? had that listed, but I could be
in the wrong place..
On 2/24/06, Q Beukes [EMAIL PROTECTED] wrote:
no, what I was talking about was programs/algorithms that actually
scan software to find new unknown problems.
i have never heard of anything like this myself nor can't think of an
efficient way
of implementing it, yet someone claimed they exist.
I would hope X already has that kind of brains,
or maybe his GF hasent let him reclaim those brains from the jar atop
her bedframe =P
-JP
On 2/20/06, Native. Code [EMAIL PROTECTED] wrote:
Why dont u send email to johnny at ihackstuff.com and confirm?
On 2/21/06, xyberpix [EMAIL PROTECTED]
On 1/26/06, Dario Ciccarone (dciccaro) [EMAIL PROTECTED] wrote:
So, in closing, you are not 'plain out of luck' - there is a
process in place for you to be able to obtain a fixed software release,
for free, even without a service contract.
S, if we find enough flaws in IOS
On 1/27/06, Charles Cala [EMAIL PROTECTED] wrote:
BlackWorm has a LAN infection vector.
So does some kid hacking directly into your box, but he isnt a worm
No action on the part of the user of the
box on the LAN must happen for them to get got,
thus this is a worm.
On 1/24/06, Gadi Evron [EMAIL PROTECTED] wrote:
now known as the TISF BlackWorm task force.
Why do you call a .scr you have to manually install a worm? Why not
BlackVirus
the worm moniker is very misleading (actually got me worried for a
sec). The email worm is also misleading, because it only
On 1/20/06, Eliah Kagan [EMAIL PROTECTED] wrote:
Z sends spoofed packets coming from the DNS server of X even more
interesting..
When Sygate PRO blackholes a host, does it block only unsolicited
packets (bad), or does it block *all* incoming packets from that host
(worse)?
It blocks all
On 1/17/06, Shyaam [EMAIL PROTECTED] wrote:
Hello All,
My friend is starting a new company for providing Anti-reversing security
and related to forensics.
Can someone give some tips and guidance.
If you are involved in this foray into Anti-reversing make sure your
friend gives you a signed
On 1/18/06, Madison, Marc [EMAIL PROTECTED] wrote:
I understand your point about TCO, even though you don't make a very
good case for it.
snip
Now for the Math, and why your TCO argument wasn't so good,
Developer $60K/year divided by the adopted 2080 man hours year (this is
the average
On 1/10/06, !bSt bitwarz Security Team [EMAIL PROTECTED] wrote:
We are a cell of pr0j3kt m4yh3m in Latin America and western Europe.
-snip-
--ntpd_stack_evasion.c--
/* ntpd remote root no-exec stack evasion spl0it
-snip-
I thought pr0j3kt m4yh3m and the PHC were promoting non-disclosure.
I
On 12/21/05, Leif Ericksen [EMAIL PROTECTED] wrote:
Do I need to change that to Herry Qwanakkadamanas to account for a
missed holiday.
You forgot Solstice: Meppy Solqwannakakkamas!
-JP
Satanists are Christians too
-JP
___
Full-Disclosure - We
On 12/19/05, Ben Nagy [EMAIL PROTECTED] wrote:
www.eeye.com/research/whitepapers
Generic Anti-Exploitation Technology for Windows
I would like to read it, but I get a 404 error when folloowing the link
err this one seems to work
www.eeye.com/html/research/whitepapers/
On 12/20/05, Valentin Baciu [EMAIL PROTECTED] wrote:
Try this: http://www.eeye.com/html/research/whitepapers/index.html :)
On 12/20/05, Dude VanWinkle [EMAIL PROTECTED] wrote:
On 12/19/05, Ben Nagy [EMAIL PROTECTED] wrote:
www.eeye.com/research/whitepapers
Generic Anti-Exploitation
On 12/18/05, Jamie C. Pole [EMAIL PROTECTED] wrote:
As far as the rest of your point, I actually agree with you. I see
no reason why the government needs to know which books you are
reading, and I don't believe the government should know how long you
are talking to your psychic-phone-sex
On 12/19/05, J.A. Terranson [EMAIL PROTECTED] wrote:
While we're debunking George...
Hey man, save this for netdev's next thread
that is the _only_ good excuse for filling ppl's inboxes with political rhetoric
jeez of all ppl, I am saying this ;-)
-JP
On 12/19/05, InfoSecBOFH [EMAIL PROTECTED] wrote:
You kniow guys... all I havef to say is...
fuck politics... we all have common ground so lets not go into the
political debate bullshit.
Now you know how I feel with your troll feeding BS,
-JP
turnabout is fair play
-Your Wife
On 12/18/05, Andrew A [EMAIL PROTECTED] wrote:
Trends like these will continue to worsen until someone performs a coup.
Luckily, it has been suprisingly easy throughout history to do so. All that
is needed is for someone with the will to walk up and seize power. Were
someone to perform an
On 12/18/05, Jamie C. Pole [EMAIL PROTECTED] wrote:
I'm sorry, but I was also FAR too close to one of the 09/11 attacks.
Just cause you are scared, doesnt mean you need trounce on my
liberties in a vain attempt to protect yourself. You arent even
protecting yourself: just cause GWB knows what
Well, for one thing, I am a veteran, and have EARNED these rights
that you liberal whiners take for granted. When you believe in
something enough to die for it, come back and talk to me.
Lemme guess: You defended my freedom by going to 'nam? Beause if you
hadnt, the viet-cong would have
p.s.: I know this has nothing to do with infosec, But J.A. is right
about something, its better noise than you-know-who
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
On 12/18/05, Jamie C. Pole [EMAIL PROTECTED] wrote:
Well, some of the more recent ones were as follows:
1) Singapore,
2) Russia,
3) Spain,
Agreed, and point taken; those are probably worse than the states, but
at least they admit to their evil, we hide ours behind protection.
Still you have
GroundZero Security
but hey lets forget about this and go back to the original topic, shall we ?
There was an original topic? Damn, I musta missed that one,...
Ohh right the topic was the fact that since windows has nops you cant
actually watch all the code executing on a system to see whether
I had taken a pause, from beating Santa Clause to remember your deeds,
and the things that they breed
I remembered my goal of Judging you all:
Disclosures are Good, but I still wonder why you should;
for secrets are precious, and keep your worthless family fed,
After you reveal them, it doesn't
On 12/16/05, Stoltz, Eric CIV [EMAIL PROTECTED] wrote:
The majority of the
email is still useful stuff but it shows how easy it is to send a list into
termoil. See you guys in a month hopefully.
-snip-
Ok, this stinks, I know too many good people who have unsubscibed cuz
we are letting the
On 12/13/05, Jei [EMAIL PROTECTED] wrote:
Shortly before the election, ten days to two weeks, we were told that the date
in the machine was malfunctioning, the source recalled. So we were told 'Apply
this patch in a big rush. Later, the Diebold insider learned that the patches
were never
p.s.: http://www.house.gov/mckinney/voterrights.htm
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
dave77f ( 48Feedback score is 10 to 49) US $510.00
Dec-13-05 08:49:11 PST
holy exploits batman, thats a bunch of bucks!
-JP
On 12/13/05, Georgi Guninski [EMAIL PROTECTED] wrote:
On Mon, Dec 12, 2005 at 03:45:37PM -0700, [EMAIL PROTECTED] wrote:
It looks like the same
On 12/9/05, Michael Holstein [EMAIL PROTECTED] wrote:
Because I'll catch the kiddies when they try and actually use Metasploit
on something, and then they'll get expelled from school after a student
conduct hearing.
Hmm, when I was working at a state run institute, we had a policy of
letting
This should be the new standard for responsible disclosure when you
get a reply from MS like that for a valid exploit ;-) lol jk
-JP
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
For those of you (and there seem to be a ton hitting the market, and
this list) who want to break in on the scene. If you want a job and
don't have experience cuz you are:
-fresh out of school
-just turning the legal age to work
-Switching from a different career
-Learned IS on the side while
On 11/30/05, Andy Lindeman [EMAIL PROTECTED] wrote:
I think we're talking about legal wiretaps, e.g. a law enforcement
agency with a court order. The problem is if you can easily fool the
system, the evidence is possibly unreliable and/or tainted. However,
even if you can temporarily fool
Apparently found a way to foil email wiretaps unintentionally ;-)
-JP
-- Forwarded message --
From: [EMAIL PROTECTED] [EMAIL PROTECTED]
Date: Nov 30, 2005 1:04 PM
Subject: Report to Recipient(s)
To: Dude VanWinkle [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Incident
Mike sed:
http://www.phrack.org/show.php?p=60a=13
Probably comes with a free trip to quiet little bay in Cuba if you get
caught.
-
Not sure if I want to carry around a car battery though ;-)
I wonder what today's GPS system is transmitting under.
from :
On 11/28/05, dead troll [EMAIL PROTECTED] wrote:
nothing important
This is the first email I have recieved in a long time with netdev
being the topic of the email.
Please respect those that are smarter than you and put netdev in the
subject or body so that my filters can put these kinds of
Anyone know about this?
-- Forwarded message --
From: 4Daily.com Hotline [EMAIL PROTECTED]
Date: Nov 28, 0005 9:28 AM
Subject: [YXZ-45186]: Re: [Full-Disclosure] Return of the Phrack High Council
To: [EMAIL PROTECTED]
== Please reply above this line ==
Dude VanWinkle
On 11/24/05, InfoSecBOFH [EMAIL PROTECTED] wrote:
Actually its the time to celebrate the killing of native Indians and
the stealing of their land.
http://www.alternet.org/story/28584
___
Full-Disclosure - We believe in it.
Charter:
On 11/23/05, Koen Van Impe [EMAIL PROTECTED] wrote:
InfoSecBOFH wrote:
WRONG. SANS does not provide anything but marketing opportunities for
vendors who cannot sell product any other way and a thicker wallet for
those at the top of the pyramid scheme. I agree that training when
you are
101 - 200 of 203 matches
Mail list logo