On 02/10/2011 18:38, Stefan Jon Silverman wrote:
oy, list newbie meets n3td3v -- this should be fun
Just looked at this site. Shudder.
FYI: this is PART of one sentence!
This site should be linked to within the wikip definition of tag soup :-)
font color=#414B56 size=2 is a professional
On 03/10/2011 16:16, Laurelai wrote:
that html makes my eyes want to bleed
The site is obviously commercial, hence getting the below revoked
should be a doddle via a complaint to enom.
Registrant:
Andrew Wallace
Registrant type:
UK Individual
Registrant's address:
On 20/09/2011 06:04, James Fife wrote:
I noticed a recent flaw in Facebooks security resolution process recently.
After being asked to confirm my identity simply because I was using a
different computer, I apparently took too long to
identify my friends in their photos. However, I was able
is running wordpress 3.2.1
This lahore based spammer is running a PPC link blog and is pushing his crap
all over the social networks right now and has just appeared in my work
spamtraps from botnett'd systems.
Anyone know if the above site has any known exploits?
Note the hosting company has
On 27/08/2011 23:12, Dan Dart wrote:
Looks like it's freeWARE but not free per se.
With the added disadvantage that it runs on none of the platforms I use.
How sad. 0/5 review from me then.
http://www.insecurityresearch.com/files/download/
From the readme's its an old version of metasploit
On 20/07/2011 14:19, Dave wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
OK This is not new, but it happened to me just an hour ago.
A stranger on the end of a phone call tells you your PC is infected, and you
should download and install a RC server so it can be fixed.
SOP.
I just
I need some real internet whizzes in order to do cyber ...
I probably have to do better than I am doing at the moment, or else my
internet whizzes are not going to stay… and we do have a steady drip, I am
afraid.
On 13/07/2011 19:47, r...@segfault.net wrote:
The technical details are available at http://wiki.thc.org/vodafone.
Much more importantly it allows you to avoid the insane VF roaming charges...
Hacking one of these to use via openvpn when abroad means you could
take your UK mobile whereever you
On 07/07/2011 08:03, 김무성 wrote:
Is there a system or program which presents HTTP response count?
Yes.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
On 07/07/2011 11:00, William Reyor wrote:
Webalizer?
Sent from my ATmega128
On Jul 7, 2011, at 5:44 AM, Jacqui Caren-homejacqui.ca...@ntlworld.com
wrote:
On 07/07/2011 08:03, 김무성 wrote:
Is there a system or program which presents HTTP response count?
Yes.
Sorry folks but wrong list,
On 07/07/2011 11:34, Ed Carp wrote:
Smart ass... :p
My hubs says I have a nice ass :-)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 29/06/2011 02:40, Nick FitzGerald wrote:
Christian Sciberras wrote:
Rather than that, I'd say the dev team is out of sync with the security
team..
Assuming that that may be a reasonable one-sentence encapsulation of
how Joomla development is organized...
The fact such a sentence can be
On 29/06/2011 02:40, Nick FitzGerald wrote:
The kind of problems that scream Why would anyone in their right mind
use it?
The official line.
http://forum.joomla.org/viewtopic.php?f=432t=335090
and a good example of how CVE's are handled
http://forum.joomla.org/viewtopic.php?f=432t=631398
On 28/06/2011 07:25, YGN Ethical Hacker Group wrote:
Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabilities
FYI 1.5.21 seems to be AOK.
IMHO The Joomla team do not seem to grok the concept of regression testing and
keep
re-introducing the same XSS problems over and over
On 27/06/2011 09:15, YGN Ethical Hacker Group wrote:
Mambo CMS 4.6.x (4.6.5) | Multiple Cross Site Scripting Vulnerabilities
I thought these were found in Joomla ages ago?
Did you really test a code base that is a version of an old Joomla base
or did you look at the code, and test old Joomla
On 03/05/2011 12:11, Cal Leeming wrote:
Eww, what a horrible acronym.
I thought it was common usage!
The reason for the acronym?
I keep getting stupid rejections from members on this list from a certain
clueless US ISP
who sends backscatter to whoever is in the envelope from address.
Yes
On 25/04/2011 16:31, Steven Pinkham wrote:
It's entirely possible that is all there is to it.
Let me be perfectly clear: For people in the real world to trust your
tool,
This stupid f-wit is now sending linkedin invites to full-disclosure
posting addresses - following his abusive adverts for
On 25/04/2011 06:51, Beatyou Man wrote:
I tried Pangolin 2.5.2 and the latest one. No data will be transfered to the
server you mentioned in
http://laramies.blogspot.com/2009/05/pangolin-and-your-data.html;
Why don't you trust your eyes and try this one?
OK let have a bash - literally.
On 25/04/2011 11:29, Jacqui Caren-home wrote:
On 25/04/2011 06:51, Beatyou Man wrote:
I tried Pangolin 2.5.2 and the latest one. No data will be transfered to the
server you mentioned in
http://laramies.blogspot.com/2009/05/pangolin-and-your-data.html;
Why don't you trust your eyes and try
On 31/03/2011 13:13, BlackHawk wrote:
to close with a semi-serious joke: put all this together and you will
know why black market selling of exploit is increasing his size: at
least someone will appreciate your work and eventually recompensate
you for it..
Everyone makes mistakes. Being
On 15/02/2011 16:55, Michele Orru wrote:
2011/2/14 MustLivemustl...@websecurity.com.ua:
Hello Michele!
Few days ago I saw your advisory about Drupal's captcha. It's interesting
advisory, but I have one note concerning it - your research is very close to
mine ;-) (it concerns similar holes
On 15/01/2011 01:53, Glenn Everhart wrote:
If you have a system that is built well secured in the first place (existence
proof: VMS)
then patches are comparatively rare.
This is a joke right?
When I first used VMS there was a bug that when a directory was deleted all
files within the
Fionnbharr wrote:
Thanks for the marketing spam
On 2 June 2010 20:11, Laurent OUDOT at TEHTRI-Security
laurent.ou...@tehtri-security.com wrote:
There, we will release more than 13 remote pre-auth zero-days against
many different products (yes: 13 0days...).
Hmm a company that can predict
PsychoBilly wrote:
The_UT went to jail because his Gonzales m8 kindly supplied irc logs
A *long* time ago I found a buffer overflow issue with a MAC web server
reported to devs but no takeup. With only a few hundred web requests I
could take down a web server. Noddy stuff today but in those
24 matches
Mail list logo