I will start etching my ssn into all my game discs so that they can be
returned to me if ever stolen. That's awesome. Thanks best buy!
On Fri, Feb 4, 2011 at 9:16 AM, Thor (Hammer of God)
t...@hammerofgod.comwrote:
I found this interesting, so I thought I would share it.
Over the last
He didn't really say they used spirit -- he said, the same technique.
Which, I presume means, taking advantage of the same flaw. Same
methodology. Not necessarily same tools.
I personally don't consider the same tool, the same 'technique'. It's what
the tool does. But if you do, then it's
Why send it to a public form/blog/email list, etc. When you could email it
to yourself, mitigating some of Stu's concerns, yet still making it
available to yourself...
Additionally, you're adding less traffic (a tiny bit less, true, but
less...)
Send it to multiple email accounts if you're
On Thu, Feb 25, 2010 at 8:05 AM, Dan Kaminsky d...@doxpara.com wrote:
Sai,
I see where you're coming from, but what are the most recent statistics
on the effectiveness of hash cracking? Isn't it something like 70% of the
passwords in the field can be cracked with a minimal amount of
, Feb 25, 2010 at 9:07 AM, Dan Kaminsky d...@doxpara.com wrote:
On Thu, Feb 25, 2010 at 10:39 AM, Michael Neal Vasquez
m...@alumni.princeton.edu wrote:
On Thu, Feb 25, 2010 at 8:05 AM, Dan Kaminsky d...@doxpara.com wrote:
Sai,
I see where you're coming from, but what are the most recent
Can't help but think of the Group Policy that disables
usbstor.sys.(http://www.petri.co.il/disable_usb_disks_with_gpo.htm for
some info)
Surely that driver could be replaced (with some windows file
protection workarounds as well, obviously) that would perhaps prompt
before allowing the device to
http://www.digihax.com
Bulletin Release 02.06.08
Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability
(Or, How to Be Bill Gates, if Bill Gates uses a CheckPoint VPN Client)
Discovery Date:
December 13, 2007
Vendor Release Date:
February 6, 2008
Severity:
Impersonation of
Does anyone have a direct email contact for Checkpoint / Security to report
a vulnerability? I've gone through their portal, and attempted to create a
ticket but have received errors and not met with any success.
Thanks,
Mike
___
Full-Disclosure - We
It's valid IMO, but also depends on the client expectations. At the outset,
the parameters of what's being tested should be well outlined. Some clients
prefer purely technical measures for penetration. Others are open to a
complete (i.e. SE included) test. Obviously a better choice, but I