How can you compare gobbles with n3td3v thats blasphemy !
- Original Message -
From: "Thierry Zoller" <[EMAIL PROTECTED]>
To: ; ;
; <[EMAIL PROTECTED]>
Sent: Friday, August 25, 2006 10:40 PM
Subject: Re: [Full-disclosure] Re: Security researcher
> Dear Denis Jedig,
>
> DJ> Gobbles? Th
> He isn't a Yahoo employee and i'm not someone who is malicious, get
> your facts straight before you make fun of people on mailing lists or
> you'll just make yourself look stupid.
>
> Another Hushmail address to add to my trash filter, thanks for that.
>
> n3td3v
Oh yes indeed listen to him!
Couldn't you have used sockets? Its just a simple connect()
whats the big deal..Using netcat trusting the env and using system() is baaad
:-)
- Original Message -
From: "John Hackenger" <[EMAIL PROTECTED]>
To:
Sent: Saturday, July 01, 2006 12:38 AM
Subject: [Full-disclosure] Data Mining
> Kiddie flaming mood?
Yes thats when someone is in the mood to actually answer your stupid mails.
>Thats a very cheeky comment there. I guess you want people to think
>you know more than me.
Well its not hard to know more than you. Actually about 99,9% of the
people here on this list know more
Thank you John! We appriciate your efforts as usually. Keep up the good work :-)
Don't let such fools annoy you. Your doing a great job.
-sk
- Original Message -
From: "John Cartwright" <[EMAIL PROTECTED]>
To: "internationalhackers" <[EMAIL PROTECTED]>
Cc:
Sent: Friday, June 23, 2006 5:
When you say that by running a portscan you "dossed" a whole network
then i would say either you are crazy or your portscanner is seriously broken
lol
I have been doing pen-tests since 1998 and never ever dossed a whole Network
by accident, especially not with a simple portscan.
-sk
- Origin
or you just put
[EMAIL PROTECTED]ERROR:"550 piss off"
in /etc/mail/access if you use sendmail
- Original Message -
From: "Byron Sonne" <[EMAIL PROTECTED]>
Cc:
Sent: Sunday, June 11, 2006 6:16 PM
Subject: Re: [Full-disclosure] terrorists have invaded the united states
> Why
Hello David,
while your intentions are nice, you wont have much luck, as he wont listen.
In his universe he thinks he is the king. Its a mental problem and you cant
help him.
All we can do is see it with humor :-) afterall he is pretty entertaining.
EVERYONE here knows that n3td3v is just some l
>Blacklist all .br/.kr/.jp/.cn IPs on your firewall already is what I say.
That would work for your home computer, but on a business server
not a very bright idea.
> >Is it illegal if I perform a vulnerability scan on a site without
> >permission from the owner? How about a simple port scan? than
and you really wonder why people blacklist your mails.
- Original Message -
From: "n3td3v" <[EMAIL PROTECTED]>
To:
Sent: Monday, May 22, 2006 2:45 AM
Subject: Re: [Full-disclosure] I'm ready to tell the police
> On 5/22/06, Michael Silk <[EMAIL PROTECTED]> wrote:
> > yep, fd defin
>The trolls arent't the problem, it's the retarded morons who keep responding
>to and arguing with them.
So that means you too are a retarded moron ?
- Original Message -
From: "Anders B Jansson" <[EMAIL PROTECTED]>
To: "Full Disclosure"
Sent: Sunday, May 07, 2006 3:09 PM
Subject: Re:
lol you are the one who only posts XSS, then finally get off this list kid.
What did you ever post other than your lame XSS ? nothing so you can
aswell finally unsubscribe as you told us 3-4 times ago, but you never did.
We would enjoy seeing you unsubscribed. This is probably the last
Mailinglist
erm what do you mean with "new" documents
?
The old ones that cover shellcode, won't be any
different to a "new" document.
Its the same technics there unless you want
polymorphic shellcode.
Just look at the phrack magazine, there you will
find papers regarding shellcode.
-sk
Http://www.g
06 1:19 AM
Subject: Re: [Full-disclosure] MSIE Nested Object Vulnerability Is Exploitable
> On 4/29/06, GroundZero Security <[EMAIL PROTECTED]> wrote:
> > You have no idea
> > of the nature of the vulnerabilities that are beeing discussed. So go back
> > and
> > res
Ywwwnnn..
> Does Secunia with their pathetic "verification" of advisories have any
> credibility left if you ever had any?
Yes, at least people care about their information, while your Emails are just
beeing ignored
for the most time unless someone wants some cheap coffee break e
There is no such thing as "public 0-day sources"
You don't even understand the meaning of 0day.
As soon as some exploit hits the public, its not
0day anymore..
now please stop to spam FD with your nonsense.
> This is my last ever Full-Disclosure post... i'm no longer going to
> give Secunia t
The Advisory can be found here: http://www.g-0.org/code/rz2-adv.html
Regards,
GroundZero Security Research and Software Development
http://www.groundzero-security.com
Wir widersprechen der Nutzung oder Übermittlung unserer Daten
für Werbezwecke oder für die Markt- oder Meinungsforschung (§ 28
ow such Software to be hosted. Of course in public they act like they
would want to prevent
such activity.
-sk
GroundZero Security Research and Software Development
http://www.groundzero-security.com
Wir widersprechen der Nutzung oder Übermittlung unserer Daten
für Werbezwecke oder für die Markt-
So you think the only system that they could
possibly have used is wondows based?
I doubt they would use windows and even if
so, on a Gigabit link and with a clever
programmed Software with multithreads this could
push out a lot of requests from a single
IP. Not that i belive RSA has no subne
roblems. I've googled around but aren't really sure what
> else to search on other than "software exploits" but don't seem to be able
> to find a really good one.
>
> Again, thanks for your helpful email Groundzero.
>
> Ian t
>
> >From: "
Hello,
well the problem is, if you do access the System, you cross the line.
Even if its open or without password, but that is already illegal access.
Sure you just want to be nice, but if one of the users you try to inform
gets angry, then he could still contact law enforcement. On the legal sid
ll-disclosure] Security
Alert: Unofficial IE patches appearoninternet
On 3/29/06, GroundZero
Security <[EMAIL PROTECTED]>
wrote:
Oh shut up i thought you have unsubscribed from
this list ?
You claim that your imaginary people work for
microsoft,
so why d
Oh shut up i thought you have unsubscribed from
this list ?
You claim that your imaginary people work for
microsoft,
so why dont you simply tell them to act up instead
of
annoying everyone here on FD. Stop pretending and
get lost.
Inofficial patches are not evil no matter what you think
first you say:
"One reason being the folks within the n3td3v group are actually people
from MS, YAHOO, AOL, etc already"
or:
"the n3td3v group is the biggest thing you'll ever meet in your life
time"
then later:
"..as the big players get it so badly wrong infront of the international
stage"
lol ?
- Original Message -
From:
n3td3v
To: [EMAIL PROTECTED] ; full-disclosure@lists.grok.org.uk
Sent: Saturday, March 25, 2006 11:12
PM
Subject: [Full-disclosure] Industry calls
on Microsoft to scrap PatchTuesday for Critical flaws
Dear Microsoft and Secu
As far as i know, there are only 2 methodes for USB autorun,
either you install a driver first that will enable the autorun or you change
some
flags on the device itself. Just search on google that will give you detailed
informations.
Or you just buy a device that is autorun enabled by default, t
funny example and i totally agree on this.
if you subscribe to an unmoderated list you have to expect that you
may have to config your mail filter if you want to get rid of certain crap.
-sk
- Original Message -
From: "Dave Korn" <[EMAIL PROTECTED]>
To:
Sent: Tuesday, March 21, 2006 8:59
weekend, where events took place."
- n3td3v
"I am dead, BANG"
- n3td3v
"Everything I have said is based on facts,
there is nothing been said that I wouldn't be prepared to repeat"
- n3td3v
"XSS will always remain part of the Full-Disclosure list if little
&q
Yes you might be bigger than me (i'm just
1,78m), but i am better than you ;-)
- Original Message -
From:
n3td3v
To: GroundZero Security ; full-disclosure@lists.grok.org.uk
Sent: Monday, March 20, 2006 3:27
PM
Subject: Re: [Full-disclosure] Fwd:
SURRO
>WE'RE NEVER RELEASED ACTUAL EXPLOIT CODE OR VULN INFO UNDER THE N3TD3V
>NAME, BUT THERES ALREADY THE "N3TD3V" THIGN WORLD WIDE ON FD AND
>AROUND THE WORLD, SO WHOS GOT MORE POLTICAL PULL? YOU OR ME?
lol too damn funny. someone is getting pissed, so he has to write in caps SO
YOU ALL CAN FEEL TH
--
Apple MacOSX has extended no commentary on this vulnerability indentified.
--
Contact
--
GroundZero Security [EMAIL PROTECTED]
GSAE CEH GREM SSP-CNSA SSP-MPA GIPS GWAS
i offer you a handfull magic beans !
- Original Message -
From: "Expanders" <[EMAIL PROTECTED]>
To:
Sent: Wednesday, March 15, 2006 2:23 AM
Subject: Re: [Full-disclosure] Internet Explorer 0day
> Do you know what "Full Disclosure" mean?
> Go posting your shit anywhere else.
>
> Regard
long kidz...
- Original Message -
From:
System
Outage
To: full-disclosure@lists.grok.org.uk
Sent: Friday, March 10, 2006 10:42
PM
Subject: Re: [Full-disclosure] For Sale:
Security Vulnerability DatabaseCompany
Greetings, GroundZero Security,
I don
Noone takes a google group serious get a real
domain.
the n3td3v thing is just a site thrown together so
they can
put up adsense and make some cash. It looks totally
unprofessional,
yet they claim its build from "software developers,
international hackers,
security researchers, online media
your pathetic ..
- Original Message -
From: "Dave Korn" <[EMAIL PROTECTED]>
To:
Sent: Friday, March 03, 2006 4:59 PM
Subject: [Full-disclosure] Re: reduction of brute force login
attemptsviaSSHthrough iptables --hashlimit
> GroundZero Security wrote:
> >
intended was to help out a little, but i guess its not much
appriciated if its not foolproof, so
i wont supply any quick scripts anymore. Thanks anyhow to those who provided
serious comments.
- Original Message -
From: "Gary Leons" <[EMAIL PROTECTED]>
To: "GroundZ
only logs "logged in" users not all those that tried. so your
script is useless.
- Original Message -
From: "Gary Leons" <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc:
Sent: Thursday, March 02, 2006 4:43 PM
Subject: Re:
FD then you can be happy and feel
superior :-)
-sk
- Original Message -
From: "nocfed" <[EMAIL PROTECTED]>
To:
Sent: Thursday, March 02, 2006 1:48 PM
Subject: Re: [Full-disclosure] reduction of brute force login attempts via
SSHthrough iptables --hashlimit
> On 3/1/06,
flames can be sent to /dev/null
-sk
GroundZero Security Research and Software Development
http://www.groundzero-security.com
Wir widersprechen der Nutzung oder Übermittlung unserer Daten
für Werbezwecke oder für die Markt- oder Meinungsforschung (§ 28 Abs. 4 BDSG).
pub 1024D/69928CB8 2004-09-27
those bruteforce attacks?
- Original Message -
From: "Gary Leons" <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc: "Jay Libove" <[EMAIL PROTECTED]>;
Sent: Tuesday, February 28, 2006 10:52 PM
Subject: Re: [Full-disclo
!
-sk
GroundZero Security Research and Software Development
http://www.groundzero-security.com
Wir widersprechen der Nutzung oder Übermittlung unserer Daten
für Werbezwecke oder für die Markt- oder Meinungsforschung (§ 28 Abs. 4 BDSG).
pub 1024D/69928CB8 2004-09-27 Stefan Klaas <[EMAIL PROTEC
if it would at least be funny, but its just a lame approach.
i enjoy those fun advisories, but thisone clearly lacks creativity...
-sk
- Original Message -
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>;
Sent: Wednesday, February 22, 2006 9:10 PM
Subject: [EMAIL PROTECTED] back RE
you said you are not quiet sure what this is and posted
those strings which clearly are from an old irc bot with
DoS functionality
- Original Message -
From: "Gadi Evron" <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc:
Sent: S
oh my god this is a stone old DoS irc bot.
you can find the source on packetstorm :P
its by no means "new" maybe it has been modified
by some kid that changed the printf()'s, but this is
no news at all.
-sk
http://www.groundzero-security.com
- Original Message -
From: "Gadi Evron" <[EMA
the backdoor stuff is concerning, but the funny thing is, you can still rip
cd's to mp3 no matter what encryption they use,
since as long as you can play the audio files, you can always record it.
- Original Message -
From: "Feher Tamas" <[EMAIL PROTECTED]>
To:
Sent: Friday, February 17
0days in the warez scene have a different meaning as in security.
in the security "scene" 0days are undisclosed vulnerabilities. some are
in the underground for years before they get disclosed. in warez its just
a new release that hasnt been there yet.
- Original Message -
From: <[EMAIL P
to sniff packets ? :P
- Original Message -
From: "xyberpix" <[EMAIL PROTECTED]>
To: "Zolee" <[EMAIL PROTECTED]>
Cc:
Sent: Tuesday, February 07, 2006 8:33 PM
Subject: Re: [Full-disclosure] aix sniffer
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> My big question is why would you
or learn how to do such tests by hand as that is more accurate as any automated
tool out there!
a penetration test shouldnt be automated it would miss too many bugs i.e. in
custom php/cgi scripts.
a professional security audit can only be done by hand. period.
too many people rip their customers
> done with sarcasm ?
> >
> >> ** this is not an endorsement or support of any community
> >> members, but rather an observation that it is typical business
> >> practice to treat even the most annoying potential customer with
> >> respect.
> >
> People who install software on their computers and connect them to
> networks then receive and process incoming data with those computers and
> said software do not want security, we just want full disclosure of the
> risks that we expose ourselves to by engaging in such unsafe behavior.
why
Our software works for NTFS and FAT filesystems and in the new version you can
also
wipe the free space to get rid of data that is left on unallocated portions of
the disk.
It was tested against encase which is one of the most popular recovery tools.
(apparently has been used to recover data fro
say, then
why dont you stfu.
- Original Message -
From: "J.A. Terranson" <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc:
Sent: Tuesday, January 17, 2006 5:56 AM
Subject: Re: [Full-disclosure] Secure Delete for Windows
>
&
t: Re: [Full-disclosure] Secure Delete for Windows
> Hi,
>
> GroundZero Security wrote:
> > New version of GroundZero Secure Delete which also supports securely
> > wiping of Free Space on a Device, has been released! A free trial can
> &
New version of GroundZero Secure Delete which also supports securely wiping of
Free Space on a Device, has been released!
A free trial can be downloaded here:
http://www.groundzero-security.com/software/g0-SecureDelete-Trial.zip
regards,
GroundZero Security Research and Software Development
why dont you shut up? everytime someone is picked
on, you try to label them as "the real person that causes
trouble other than n3td0rk" even though it has
absolutely nothing to do with the n3td3v troll (you).
its your own fault that you have been bashed.
infosec is at least making a point an
sk
GroundZero Security Research and Software Development
http://www.groundzero-security.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
your last point was "*IF* you are not doing *nothing illegal* and have nothing
to hide no big deal."
thats what i responded on. try to stick to your points :-)
- Original Message -
From: "Leif Ericksen" <[EMAIL PROTECTED]>
To:
Sent: Wednesday, December 28, 2005 6:08 PM
Subject: [Full-di
>Well the harder we try to hide our data from the government the more
>they are going to think that you are an entity that needs to be taken
>down as a threat to the government be the government US, UK, Sweden,
>Norway, China, Japan, N/S Korea, Iraq, Iran, Pakistan, India, Africa.
>and down under.
lol "high jacking" .. oh my god this is
sowhatever...
by the way securityfocus has/had some hackers
working for themselfs, but since you are new to hacking/security
and have no idea what you talk about, you should
look who kevin poulsen is for example
- Original Message -
the usa still controls the internet and they dont give a fuck if we
feel that our privacy is invaded since we are all foreign countries to them
and anything outside the usa should be sniffed as they could be potential
terrorists.
remember only usa is the "free world" lol (in their opinion)
they wa
Hi !
i tested this bug and it is fact that indeed kernel memory can be leaked.
this leads to priviledge escalation as the encrypted root password is in there.
it could be cracked with john. in the log is more information that could lead
to a full system compromise. nice bug and not hard to code :-
y alais since 1995, now I see that this
> chump is going round putting a black mark by it)
>
> -----Original Message-e
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of n3td3v
> Sent: 21 December 2005 17:17
> To: GroundZero Security; full-disclosu
your ass and get lost kid.
- Original Message -
From: "n3td3v" <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>;
Sent: Wednesday, December 21, 2005 6:16 PM
Subject: Re: [Full-disclosure] XSS vulnerabilities in Google.com
> You trol
, the last mail he sent just asks
for a reply :P
but ok...must...resist.
btw my name is not groundzero, thats my company :)
greetz
-sk
Http://www.groundzero-security.com
- Original Message -
From: "php0t" <[EMAIL PROTECTED]>
To: "'GroundZero Security'&
alize
that you are at the wrong place. i mean look around how many people complain
about you beeing annoying.
oh and if you couldnt figure it out by now, groundzero is my company you little
moron.
-sk
- Original Message -
From: "n3td3v" <[EMAIL PROTECTED]>
To: "Gr
> Sure, but "google != howardsblog.com". A large part of the population
> (including myself) relies on Google's various services for day-to-day
> use. I sure as hell would not feel comfortable knowing that I'm using
> a service that can potentially leak my information.
i'm not talking about some
AIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>;
Sent: Wednesday, December 21, 2005 3:00 PM
Subject: Re: [Full-disclosure] XSS vulnerabilities in Google.com
> You couldn't help but bash other peoples Google and Yahoo
> vulnerabilities. When you find
are we starting to post vulnerabilities in specific
websites now rather than daemons/clients etc. ?
i mean there are thousands of websites which are
vulnerable to xss,sql injection or worse because of their
custom scripts. in my opinion this should be posted
to the website owners if you feel
where is your brain oh senseless one
- Original Message -
From: "n3td3v" <[EMAIL PROTECTED]>
To:
Sent: Wednesday, December 21, 2005 12:45 AM
Subject: Re: [Full-disclosure] N3td3v poll
> Wheres your Google and Yahoo vulnerabilities "fdlister"? I await your
> reply, oh jealous one. ;-)
>
LOL!
- Original Message -
From: "KF (lists)" <[EMAIL PROTECTED]>
To:
Sent: Monday, December 19, 2005 10:42 PM
Subject: Re: [Full-disclosure] Unzip *ALL* verisons ;))
> Im thinking this is a pretty old school bug... this is damn old code I
> believe. I know its something I found while
0x0 0
gs 0x33 51
i thought i share my findings right away as this seems perfect to move away
from all this
political and troll mails. back to security research :)
regards,
-sk
GroundZero Security Research and Software Development
http://www.groundzero-security.com
ago...
but hey afterall every law is just a "goddamn piece of paper" isnt it ?
i wonder why people even bother making laws.
- Original Message -
From: "J.A. Terranson" <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc:
Sent:
ROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc: "Jamie C. Pole" <[EMAIL PROTECTED]>;
Sent: Monday, December 19, 2005 8:28 AM
Subject: Re: [Full-disclosure] [Clips] A small editorialaboutrecentevents.(fwd)
>
>
> On Mon, 19 Dec 2005, GroundZer
t;[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc:
Sent: Monday, December 19, 2005 8:06 AM
Subject: Re: [Full-disclosure] [Clips] A small editorialaboutrecentevents.(fwd)
>
> Okay.
>
> Here is the fundamental problem - we do not know the circumstances
uh oh, looks like i was right and the echelon sensors go off with this thread.
neh just joking :)
- Original Message -
From: <[EMAIL PROTECTED]>
To: "GroundZero Security" <[EMAIL PROTECTED]>
Cc:
Sent: Monday, December 19, 2005 8:08 AM
Subject: Report to Recipi
rced by the military, and quite a few
> less people would have died.
>
> And had he done that, the liberals would very likely now be asking
> whether or not it was legal for him to have done so. For the people
> that hate President Bush, nothing he does or does not do will be
w Orleans to blow holes in the levees? Or maybe we caused
> hurricane Katrina with our special nuclear-powered hurricane-generators?
>
> Just checking...
>
> Jamie
>
>
>
> On Dec 18, 2005, at 10:56 PM, GroundZero Security wrote:
>
> >> lol you mean the
for help to arrive i
trust my gov on that. i feel pretty save also "if"
a terrorist attack would happen we surely would not invade a country. unless
that countries gov is attacking us.
- Original Message -
From: "GroundZero Security" <[EMAIL PROTECTED]>
To:
omies that tax the living daylights out of those
> lucky enough to have a job are a good idea.
>
> JCP
>
>
> On Dec 18, 2005, at 10:14 PM, GroundZero Security wrote:
>
> > "we in the USA are still the luckiest people on Earth."
> > i would not count on
indeed and thats not the onlyone. in iraq some cap driver got carried away
because
his customer happened to be a terrorist. how should he know ? he got taken to
some
prisoner camp, tortured for 3 months and then when they noticed he isnt a
terrorist but
an ordinary taxi driver, he got sent back
"we in the USA are still the luckiest people on Earth."
i would not count on that. i feel much saver/happy here in germany.
"We've got it better than any other country on Earth."
lol yeah right.. in your dreamworld maybe. did you even leave usa before ?
i doubt that.
"If you like some other plac
what a load of bullshit... that 9/11 thing seems to be the execuse for
everything now ?
it was an terrorist act yet usa starts to invade any country that "could" be
the home of those terrorist guys.
well its bad what happened and i dont support it at all, but its not the fault
of some countries
n3td3v cant you just stop it ? it gets more and
more obvious that: n3td3v == joe average
we all know that you have no reputation at all so
just get lost!
"in the land of the blind the 1-eyed man is
king.." - Desiderius Erasmus, Adagia (III, IV, 96)
-sk
Http://www.groundzero-security.com
YES NOTHING TO LOOSE ..CAN YOU READ IT NOW
?
sorry thought if i write it in caps you'd
understand :P
he has NO skill, he has NO reputation.
period.
proove me wrong n3td0rk and show some code else
stfu.
- Original Message -
From:
Joe
Average
To: GroundZero Sec
wow this will never end..
> " a sustained attack against him and the full disclosure of information"
lol thats another great quote :)
its only an attack on his stupidity.
if someone is beeing an idiot, we tell him as simple as that. its not like only
InfoSecBOFH
has been telling n3td0rk to sh
hm i dont see why you guys attack InfoSecBOFH too ?
i mean i dont really know him, but as far as i see it, he only
told n3td0rk to piss off sofar. so whats wrong with that ?
its not like he's been trolling around, he's just been insulting him
which i dont see as a problem.
just my 2 cents..
-
ok good bye, nice to see your first and last post!
- Original Message -
From: "Allen,Steve" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; "Cosmin'" <[EMAIL PROTECTED]>;
; "Joe Average"
<[EMAIL PROTECTED]>
Sent: Friday, December 16, 2005 4:43 PM
Subject: RE: [Full-disclosure] Getting rid o
how offten do i need to tell you ? you are pathetic!
this just prooves that you are an idiot.
- Original Message -
From: "n3td3v" <[EMAIL PROTECTED]>
To:
Sent: Thursday, December 15, 2005 7:46 PM
Subject: [Full-disclosure] Fwd: WSLabs,Phishing Alert: Internal Revenue (FAO
Todd Towles)
>i
spoke with netdev and i asked him not to respond to bait mail from known
nicknames
please also ask him not to post any phishing
or xss related information.
we do not care. tell him to go learn about IT
security first and then come back in a few years
when he has grown up.
__
omg the happy script kid Carolyn Meinel strikes again !
that is so 90's
-sk
http://www.groundzero-security.com
- Original Message -
From: <[EMAIL PROTECTED]>
To: "Carolyn Meinel" <[EMAIL PROTECTED]>
Cc:
Sent: Tuesday, November 15, 2005 5:34 PM
Subject: Re: [Full-disclosure] How to disc
90 matches
Mail list logo