leveraging the same access credentials and attack vector, an attacker
could shut down the affected system without authorization.
oh shit. time to patch!
On Wed, Nov 5, 2008 at 10:49 AM, alessandro telami
<[EMAIL PROTECTED]> wrote:
> What sort of vulnerability would this be???
>
>> Date: Wed, 5 No
n3td3v, shut the hell up. this isnt some esoteric discussion about the
virtues of disclosure and good vs evil empowered by fear. patch your
shitty 3 box home network, stay the hell out of the way and dont be
part of the problem.
once you have *real world* experience, you'll answer a lot of these
q
please refer to:
http://en.wikipedia.org/wiki/Jokes
and possibly:
http://www.youtube.com/watch?v=VT8uiT_rZ5k
please feel free to laugh, snicker or otherwise enjoy yourself.
On Mon, Aug 18, 2008 at 8:54 PM, Simon Valiquette <[EMAIL PROTECTED]> wrote:
> John C. A. Bambenek, GCIH, CISSP un jour
just add 'joey.mengele <[EMAIL PROTECTED]>' to the same filter as
you have setup with n3td3v to fling this sort of trash into your deleted
email folder. it helps.
On Fri, May 9, 2008 at 4:25 PM, Garrett M. Groff <[EMAIL PROTECTED]>
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Ther
Its not always easy to know what libs all of your apps are using. Unless of
course you're managing a small set of systems, have a lot of time, or are
particularly godlike at what you do. I think it's great that they identify
the software using it. Frankly, if I'm in an enterprise environment runnin
guys, really. can we just get over it? lets go on with our lives, do
something more productive. go outside, go be a better person. this is
as perpetual as good vs evil. please let it go. end this thread and
all threads like it.
On Tue, Apr 8, 2008 at 7:33 PM, steve menard <[EMAIL PROTECTED]> wrote
On behalf of the thousands of members of full disclosure who are not
at all interested in your prepubescent comments, I say: shut the fuck
up. Kthx.
On 2/22/08, worried security <[EMAIL PROTECTED]> wrote:
> On Sat, Feb 16, 2008 at 3:33 PM, Andrew A <[EMAIL PROTECTED]> wrote:
> > dear mengele,
>
Who cares?
Of all the information posted on this list each and every day, you
choose this to whine about? Is there no value in knowing that this
particular system has a remote-root exploit out of the box?
I find this information more valuable than the thousands of SQL
injection advisories for tin
forts.
Thank you reepex. <3
On Feb 8, 2008 4:22 PM, reepex <[EMAIL PROTECTED]> wrote:
> On Feb 8, 2008 3:15 PM, Erik Harrison <[EMAIL PROTECTED]> wrote:
>
> > I appreciate knowing that I can visit my friends homes and root their
> boxes while they order pizza
> &