You want to be very careful with that line of thought. You are taking the
creator the rightful owners profits, which they are entitled to if it is a
product they created to be sold. You are confusing what you want - with what
the law states. Theft is typically very widely defined in the law,
No one lives in a server, but the server certainly occupies space somewhere.
Even a VM runs in a physical space somewhere. If someone attacks my server in
my home, I think of that as physically being in my home. If someone were to
hack into my daughters webcam, and enable it to view her, I
Once upon a time, yes.
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
throwaw...@columbus.rr.com
Sent: Friday, October 14, 2011 8:49 AM
To: full-disclosure@lists.grok.org.uk
Subject: Re:
And I thought this wasn't a place for politics, I am certain there are forums
for that - or your Twitter or Facebook page or whatever, just not here.
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
I know in the old days (15 years ago) – there were networks that were
completely separate from the outside world. I remember trying to do telephone
tech support to someone on a secure network…
Tell him to do “this”
He puts down the phone, goes through physical security, tries “this”
He comes
A lot of the banking industry uses lowercase only. Easier to type form a
telephone handset. Legacy system suckage.
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Rack911
Security Lists
Sent: Monday, October 10, 2011 10:58 AM
To:
I have no idea, I assume – this is usually what they mean when they talk about
an “air barrier”
From: evejou [mailto:g...@techn0ev3.net]
Sent: Monday, October 10, 2011 1:04 PM
To: Michael Schmidt
Cc: Thor (Hammer of God); Christian Sciberras; Michael T;
full-disclosure@lists.grok.org.uk
Subject
My worst nightmare is that it's something like this
We wipe the virus from the network, then when Bob uses his flash drive for a
map update we get it again, weird huh?
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Christian
If its bot net code and it is behind an air barrier then it will never phone
home. They can take their time to kill it because it will never get
instructions to do anything. If it's something more destructive then maybe they
need to call in someone more experienced. But it does not sound
Yeah, cause those robots always, always, always obey the robots file... :-)
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Carlos Alberto
Lopez Perez
Sent: Thursday, October 06, 2011 2:54 AM
To:
Someone’s just not reading the bulletins – Note the term “Remote” – including
webdav, so a share that could be fully controlled by the exploiter. At least
that is what I am understanding.
Updates released on September 13, 2011
Microsoft Security Bulletin MS11-071, Vulnerability in Windows
11 matches
Mail list logo