Re: [Full-disclosure] when did piracy/theft become expression of freedom

2012-01-27 Thread Michael Schmidt
You want to be very careful with that line of thought. You are taking the creator the rightful owners profits, which they are entitled to if it is a product they created to be sold. You are confusing what you want - with what the law states. Theft is typically very widely defined in the law,

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-13 Thread Michael Schmidt
No one lives in a server, but the server certainly occupies space somewhere. Even a VM runs in a physical space somewhere. If someone attacks my server in my home, I think of that as physically being in my home. If someone were to hack into my daughters webcam, and enable it to view her, I

Re: [Full-disclosure] Full-Disclosure Digest, Vol 80, Issue 59

2011-10-14 Thread Michael Schmidt
Once upon a time, yes. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of throwaw...@columbus.rr.com Sent: Friday, October 14, 2011 8:49 AM To: full-disclosure@lists.grok.org.uk Subject: Re:

Re: [Full-disclosure] [OT] Obama said: American people understand that not everybody's been following the rules

2011-10-12 Thread Michael Schmidt
And I thought this wasn't a place for politics, I am certain there are forums for that - or your Twitter or Facebook page or whatever, just not here. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of

Re: [Full-disclosure] “We keep wiping it off, and it keeps coming back”

2011-10-10 Thread Michael Schmidt
I know in the old days (15 years ago) – there were networks that were completely separate from the outside world. I remember trying to do telephone tech support to someone on a secure network… Tell him to do “this” He puts down the phone, goes through physical security, tries “this” He comes

Re: [Full-disclosure] 0day Full disclosure: American Express

2011-10-10 Thread Michael Schmidt
A lot of the banking industry uses lowercase only. Easier to type form a telephone handset. Legacy system suckage. From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Rack911 Security Lists Sent: Monday, October 10, 2011 10:58 AM To:

Re: [Full-disclosure] “We keep wiping it off, and it keeps coming back”

2011-10-10 Thread Michael Schmidt
I have no idea, I assume – this is usually what they mean when they talk about an “air barrier” From: evejou [mailto:g...@techn0ev3.net] Sent: Monday, October 10, 2011 1:04 PM To: Michael Schmidt Cc: Thor (Hammer of God); Christian Sciberras; Michael T; full-disclosure@lists.grok.org.uk Subject

Re: [Full-disclosure] Wipe off, rub out, reappear...

2011-10-10 Thread Michael Schmidt
My worst nightmare is that it's something like this We wipe the virus from the network, then when Bob uses his flash drive for a map update we get it again, weird huh? From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Christian

Re: [Full-disclosure] Wipe off, rub out, reappear...

2011-10-10 Thread Michael Schmidt
If its bot net code and it is behind an air barrier then it will never phone home. They can take their time to kill it because it will never get instructions to do anything. If it's something more destructive then maybe they need to call in someone more experienced. But it does not sound

Re: [Full-disclosure] 0day Full disclosure: American Express

2011-10-06 Thread Michael Schmidt
Yeah, cause those robots always, always, always obey the robots file... :-) -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Carlos Alberto Lopez Perez Sent: Thursday, October 06, 2011 2:54 AM To:

Re: [Full-disclosure] Microsoft's Binary Planting Clean-Up Mission

2011-09-16 Thread Michael Schmidt
Someone’s just not reading the bulletins – Note the term “Remote” – including webdav, so a share that could be fully controlled by the exploiter. At least that is what I am understanding. Updates released on September 13, 2011 Microsoft Security Bulletin MS11-071, Vulnerability in Windows