bits, \
u_int frac, enum esource source);
Here's a copy of random.h:
<http://bintree.net/freebsd/d1/d79/random_8h_source.html>
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
**
--On August 20, 2012 8:32:59 AM -0700 Dan Kaminsky wrote:
>
>
>
> On Mon, Aug 20, 2012 at 8:29 AM, Paul Schmehl
> wrote:
>
>
> --On August 20, 2012 2:22:28 AM -0700 Dan Kaminsky
> wrote:
>
>
> May I ask what FreeBSD's entropy sources are?
>
>
--On August 20, 2012 2:22:28 AM -0700 Dan Kaminsky wrote:
>
> May I ask what FreeBSD's entropy sources are?
I'm surprised you don't already know. From device noise.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own an
--On January 26, 2012 10:27:29 AM +1100 xD 0x41 wrote:
> i will destroy FD this year, mark these words.
>
Is today the anniversary of this annual threat? Man I've lost track of
time....
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
ar
secret.
>
It's 2012. I seriously doubt most sites ignore vulnerabilities any more.
We HAVE learned a few things over the years. We are constantly auditing
for flaws, assessing for flaws and insisting that flaws are corrected. We
don't need your help to do our jobs. I can assure
--On January 13, 2012 2:03:36 PM -0600 Laurelai
wrote:
>>
> Well just remember they could have *not* told you and helped themselves
> to a backdoor. If they wanted to door you they probably wouldn't have
> told you.
>
Which is precisely what he'd like you to thin
--On January 13, 2012 12:03:22 PM -0500 Benjamin Kreuter
wrote:
> On Fri, 13 Jan 2012 10:37:31 -0600
> Paul Schmehl wrote:
>
>> --On January 12, 2012 3:16:19 PM -0500 Benjamin Kreuter
>> wrote:
>>
>> > The law is not going to stop the really bad people
>
--On January 12, 2012 9:01:28 AM -0500 valdis.kletni...@vt.edu wrote:
>
> Bottom line: In most corporations, the CSO *can't* spend more money on
> security unless he can show increased profits by doing so.
Or decreased losses.
--
Paul Schmehl, Senior Infosec Analyst
As if it
t;
Assuming everyone's motives are as pure as the driven snow is a bit naive,
don't you think?
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is a
andard install procedures didn't
disable or secure sendmail because that wasn't the purpose of the box.
That's just human nature.
The really secure places plan ahead for such things, routinely check for
out of compliance conditions, an
serland to get done. The kernel is
> fully capable of sending out packets, creating files, etc. Userland in
> fact relies on the kernel for all of these. If you get to the kernel you
> control all of both worlds. You get the userland and in truth you only
> control a portion of the userland.
&
effort to make your
> userland kit work to satisfaction for a far weaker hold on the box. It
> would simply be idiotic. And I think we can all agree that an attacker
> able to do either of the above is not an idiot.
>
> On Dec 6, 2011 10:19 AM, "Paul Schmehl" wrote:
>>
>
I know ya mean well, but your first block of advice isn't pratical or
> effective. The second one the OP already did so alls well for that.
>
> :)
> On Dec 6, 2011 10:19 AM, "Paul Schmehl" wrote:
>
> A "poor man's" root kit detector is to take md5sums
ot;find", under /tmp/.m
>
> Deleted them, looked up remote connections with netstat, killed perl
> processes that where trying to connect to port 6959 (only trying because
> I've now set up iptables so that they actually can't), but those processes
> kept spawning. Checked crontab of www-d
rver logs to see what they did to get in.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue with those who have
renounced the use of r
IOW, they didn't get root on the box - they
only compromised the web application and then ran shells in perl off of
that.)
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
*
commonplace, not
> spectacular, and it usually isn't a result of a conscious decision you
> made.
>
OTOH, don't you think someone who qualifies for a Darwin Award has
demonstrated a mental deficiency?
--
Paul Schmehl, Senior Infosec Analyst
As if it wa
and where that money is coming from.
Paul Schmehl, If it isn't already
obvious, my opinions are my own
and not those of my employer.
**
"When intelligence argues with stupidity and bias,
intelligence is bound to lose; intelligence has limits,
--On October 14, 2011 3:39:06 PM -0400 valdis.kletni...@vt.edu wrote:
> On Fri, 14 Oct 2011 13:56:12 CDT, Paul Schmehl said:
>> Go watch a few beheading videos and then come back and regale us with
>> your stories of innocent civilians.
>
> Do you have actual hard evidence t
Go watch a few beheading videos and then come back and regale us with your
stories of innocent civilians.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is
;armed individuals" is one thing. If it's "civilians and
> Reuters employees" who *aren't* obviously armed, it's something else.
>
And if they hadn't actually been armed, with AK-47s and RPGs, you might
have a point. But since they were, you don't.
icans-have-more-wealth-/>
So how would you pay for NEXT year?
The problem isn't that we're not taxing the rich enough. It's that our
government is completely out of control and spending 40% more than it takes
in. The rich people can't save us from that insanity.
--On Oct
ay!?
>> >>
>> >> If you protest against rich filthy thieves you mustn't own a semi
>> >> decent camera?
>> >>
>> >> Its not a right but a privilege to own a nice camera, now.
>> >>
>> >>
t see the irony and hypocrisy of that position, you might be a
liberal. Oh, 'scuse me, progressive.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to
/
> >> >> >>>>
> >> >> >>>> _______
> >> >> >>>> Full-Disclosure - We believe in it.
> >> >> >>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>
mployee or agent responsible for delivering
> the message to the intended recipient, is prohibited. If you have
> received this e-mail in error, please immediately notify us by calling
> our Help Desk at (212)590-7600, or e-mail to
> helpdes...@omnicommediagroup.com.
> __
- We believe in it.
>> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> > Hosted and sponsored by Secunia - http://secunia.com/
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok
can be leveraged to gain further access.
But if you forgo routine patching, allow lousy passwords, allow poor
configuration practices and run services that aren't vetted and authorized,
then, well, you're an HBGary clone..
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn&
gt;
> I refer you also
> to: http://www.urbandictionary.com/define.php?term=trolling
>
>
> On Mon, Feb 21, 2011 at 7:12 PM, Paul Schmehl
> wrote:
>
> I rest my case.
>
>
>
>
> --On February 21, 2011 7:04:33 PM + "Cal Leeming [Simplicity Media
&g
related discussion?
Seriously? I think it's safe to assume you don't understand irony.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue w
I rest my case.
--On February 21, 2011 7:04:33 PM + "Cal Leeming [Simplicity Media
Ltd]" wrote:
> And why is that, Paul?
>
>
> On Mon, Feb 21, 2011 at 7:03 PM, Paul Schmehl
> wrote:
>
>
>
>
> --On February 21, 2011 6:15:07 PM + "Cal Leemin
this list becomes moderated, the only control any of us have over
> its content, is to block individuals whom we don't wish to receive mail
> from.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
**
iw>
>>
>>
>
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>
--
Pau
eve that admins for a site like this would be reading
FD?
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue with those who have
renounced the
ty easy, since you'll be familiar with
> most of the ideas already.
>
> I got a certificate to get past HR and because it looks pretentious on a
> business card. It wasn't worth the hassle of submitting paperwork and
> paying dues to continue having it, so I let it lapse.
Just adding another 400 Amp service gives them palpitations. I swear they
think these things grow on trees and cost nothing to operate.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
--On December 28, 2010 8:51:40 AM -0500 Григорий
Братислава wrote:
>
> Is question: 'I is created code.c and I is release it. Paul Schmehl is
> come and take code.c and is backdoor it.'
>
> a) Is I to is blame?
> b) Is Schmehl responsible for is backdoor
> c) Is
--On December 23, 2010 6:51:27 AM -0500 Григорий
Братислава wrote:
> Hello Full Disclosure!!!
>
> Musntlive has warned you all about
> OpenB(ackdoored)S(oftwared)D(istrobution) for is some time and is all
> say musntlive is crazy. However is now when Theo discloses bug, is
> people like Paul "I
--On December 22, 2010 3:47:25 PM -0800 Dave Nett
wrote:
> http://marc.info/?l=openbsd-tech&m=129296046123471&w=2
>
> Long mail which just admit has backdoor, poor Theo.
>
>
In your dreams.
Paul
___
Full-Disclosure - We believe in it.
Charter: http
--On December 22, 2010 8:55:49 PM -0500 valdis.kletni...@vt.edu wrote:
>
> And at some point, you really have to ask yourself "Is this really a
> plausible attack method, or did I forget to take my meds again?".
>
>
Well, it certainly makes for entertaining reading on the FD list. Haven't
had th
on and not to WDE in
general would be of great interest. (I'm not interested in articles on the
cold boot attack. I'm already familiar with that one.)
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are
--On December 17, 2010 12:37:34 PM -0500 Григорий
Братислава wrote:
>
> Is no one asking you for is your expertease Mr. Schmehl, is in fact we
> say is you need retire back to мошонка sniffing
>
Think of me as a bozo detector.
--
Paul Schmehl, Senior Infosec Analyst
As if it wa
keyed VPN system used at 235+ US Attorney locations and
which later proved to have been backdoored by the FBI so that they
could recover (potentially) grand jury information from various US
Attorney sites across the United States and abroad."
Still think he never wrote any and had no knowledg
enBSD code or the possibility of a backdoor existing in it.
The fact that I have to write all this irritates me. It's a waste of my
time. But that's the price you pay for being on the internet, which
abounds with idiots who will swallow every wild and unsubstantiated claim
without qu
--On December 16, 2010 11:23:10 PM + John Bond
wrote:
> On 16 December 2010 22:26, musnt live wrote:
>> Hello Full Disclosure!!!
>>
>> I'd like to warn you about Paul Schmehl. Is obvious. Paul Schmehl is
>> like to smell Theo's crotch.
> Sorry P
07. For why is he underhanded the world?
>
Is he want to dominate world, because he is . Just like
Bill Gates.
Is you need me send you to some meds?
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my em
ruth. Who is was we to
question Lickingberg
Is your mind gone? Or merely on the road?
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue
Rational people don't fall for this stuff.
Should the code be audited? Of course! Auditing is always useful and
often productive. Should we assume the worst? Not without better evidence
than what we have before us now.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already
s should consider.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue with those who have
renounced the use of reason as to admini
--On December 15, 2010 10:55:39 AM -0800 bk wrote:
>
> On Dec 15, 2010, at 10:32 AM, Paul Schmehl wrote:
>
>> --On December 14, 2010 8:40:14 PM -0500 b...@fbi.dhs.org wrote:
>>>
>>> http://www.downspout.org/?q=node/3
>>>
>>> Seems IPSE
rson examining
the code has noticed it? Or even questioned it? That's a bit hard to
believe. It's along the same lines as the stories that Microsoft captures
all your packets and harvests your personal information.
Read The Cathedral and The Bazaar.
--
Paul Schmehl, Senior Infos
self assembling kernel and libraries etc
Check the archives, there's been some truly dim bulbs who have wandered
through here. :)
Archives? Just read the list every day.
--
Paul Schmehl (pa...@utdallas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.ut
ell
>>>>>>> slightly fishy...
>>>>>>>
>>>>>>> -h
>>>> ___
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure
the wall and
see if some sticks" type of attacks. Who knows what impact they might have on
heart monitor or a networked IV? And since most expensive equipment that
requires a separate PC controller will be running Windows, older OSes,
unpatched and without AV, the chances of a "thro
press reports to avoid panic reaction (for many
> patients health and logic does not go together) or to inhibit terrorism in
> that area.
>
Government probably doesn't know about them. When they do, they will pass a
stupid law that will make them feel better and extract money f
to have a Avengers type squad of uber nerds, but
> I can't find any record of his '10 years' of crime-fighting awesomeness.
> Thoughts? Opinions? Flames?
http://blogs.forbes.com/firewall/2010/08/06/bbhc-global-and-project-vigilant-wheres-the-money/
--
Paul Schmehl, Seni
ss it) that checked the SQL version, including the
> revision number at runtime, which made patching SQL impossible.
>
In those cases where there are such systems, there should be mitigating
controls around them that increase the difficulty of break-in. Otherwise the
IT department is negligent.
ch. So those applications that are well written and serve a
useful purpose will prosper and consistently improve, while those applications
that are poorly written and address obscure uses will languish and die.
And that is as it should be, I think.
they will promotes a false sense of security.
Yes, you should use antivirus software if you're running windows, and yes, it's
a good idea to use a firewall. Neither is a panacea, however, and neither will
keep you from getting a trojan from the latest attack methodologies.
--
Paul Sc
uthentication make you more secure (in a practical sense)?
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue with those who have
renounc
s.
>
> Now, if we *all* move away from 22, your advice is more appropriate.
Of course if you do account provisioning correctly and configure your hosts
securely, you're not exposed on port 22 either. You just have to deal with the
constant knocking at the door. Some of us have simply
Symantec notes as “new
> threats.”
>
OK. What about the CO2 in your computer? :-)
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue w
out problems 100% of the
time.
Until software vendors get their act together and start building security in
from the beginning of development, companies will continue to experience
breaches. Even in a perfect world of zero vulnerable software packages you'll
still have to deal with th
n end, fd will never be the same,
this is a violation of the spirit of fd" whining tape.. :-)
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is a
be verified at https://www.hushtools.com/verify
>
> wpwEAQMCAAYFAkt6rpIACgkQwGoky+I7Eoux/gP8CWC4lR/1uD9iuyK8j4YmMmCjsz78
> IuMfDarADvLGRPTII8JZelBaD5NrHiXcx+SdUREeDICvpeq4qSp07Uj060mVEKJJ/b3S
> JMIEHUlypahII+dkJcPqdrQfAhIl5Lj3BJMLkgLU1pmJswCsRQbFl/uJBxjnfMYSkn6C
> cQi/XlM=
> =fd2p
anzer ...@mail.acme.com http://acme.com/jef/
>
>
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
t; are entirely altruistic.
>
Or you are entirely naive. :-)
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue with those who have
renou
http://www.wnd.com/index.php?fa=PAGE.view&pageId=118953
Businesses hold world hostage over carbon credits
Even U.N. climate chief tied to new, 'green' extortion scam
It was never about the climate.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my
--On December 12, 2009 5:24:27 PM + cyber armageddon
wrote:
> On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl
> wrote:
>> --On December 12, 2009 7:37:08 AM -0600 cyber armageddon
>> wrote:
>>> IDF, Military Intelligence
>>>
>>> (Government Agen
six years ago. Do the math doofus.
Paul Schmehl, If it isn't already
obvious, my opinions are my own
and not those of my employer.
**
WARNING: Check the headers before replying
___
Full-Disclosure
is
titled "Abortions for which public funding is allowed"
Need I go further?
The fact is that, in their present forms, both the House and Senate
version provide public funding for abortions. No, it's not abortion on
demand, but it is abortion.
Stop taking the news media's
Moore contingent (there is
no bigger liar on the planet), the anthropomorphic global warming crowd,
the let-give-terrorists-constitutional-rights crowd, etc., etc. The
problems are the same on both sides. The fact that you can't see that
says a lot more about you than it does about eithe
urse presupposes that "deliberate lying" was even going on -
> which
> is *far* from conclusively proven.
>
You wrote this with a straight face, right?
Paul Schmehl
As if it wasn't already obvious,
my opinions are my own and not
those of my employer.
___
not me. If I was going to pose
> as
> a troll, I'd pose as a more clueful troll - trying to think that
> cluelessly
> makes my brain hurt.
>
> On the other hand, nobody's ever seen me and Paul Schmehl at the same
> place
> at the same time... I wonder why... :)
rograms designed to deliberately skew the data in their favor and hide
unfavorable data.
<http://www.timesonline.co.uk/tol/news/environment/article6936328.ece>
<http://www.timesonline.co.uk/tol/news/environment/article6936289.ece>
If that isn't ma
lternative energy companies? The Trilateral Commission?
>
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue with those who have
renounce
vember 30, 2009 15:31:21 -0600 valdis.kletni...@vt.edu wrote:
>
> On Mon, 30 Nov 2009 15:06:46 CST, Paul Schmehl said:
>> Recent evidence shows that the globe is again cooling
>
> So the CO2 emissions are the only things saving us, right Paul?
>
> http://en.wikipedia.org/wiki/Fallen_Ange
, November 30, 2009 06:35:50 -0600 Ali Raheem
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Simply because a few scientist have found to be fraudulent it doesn't
> mean the concept of Climate change is. Even if this was found to be
> faked it is far
ube.com/watch?v=sYxk7pnmMFw&feature=related
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Paul Schmehl, If it isn
> myself.)
>
>
> -Original Message-
> From: full-disclosure-boun...@lists.grok.org.uk
> [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Paul
> Schmehl
> Sent: Saturday, November 07, 2009 8:53 PM
> To: full-disclosure@lists.grok.org.uk
> Subject: Re
ost
> impossible.
>
> Ahah! Now we're on to something. Here's an idea. Make it easier
> to get that warrant when you need it. Improve the process, so that
> when requested, a warrant can be turned around in hours, not days.
> Don't remove the requirement altogeth
--On November 7, 2009 11:24:55 AM -0600 valdis.kletni...@vt.edu wrote:
> On Fri, 06 Nov 2009 23:42:45 CST, Paul Schmehl said:
>> communications as well. Under existing law (if you believe that FISA
>> applies) they would have 72 hours maximum to submit the necessary
>> pap
ctors but only nation states.
The issues are complex, and they should be discussed without emotion or
political rhetoric and unfounded charges that cloud the waters. And one
must always keep in mind that we're talking about a military agency trying
to track what our enemi
>
> Which government agency is paying your mortgage?
The same one that is proposing to pay for your healthcare and control
every other aspect of your life because you're too blind to see the forest
for the trees. You and millions of other blithering idiots who see
nothing wrong with the
--On November 4, 2009 8:03:10 PM -0600 "Gary E. Miller"
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Yo Paul!
>
> On Wed, 4 Nov 2009, Paul Schmehl wrote:
>
>> Please cite one proven instance where surveillance was done on anyone
>
--On November 4, 2009 8:48:41 PM -0600 valdis.kletni...@vt.edu wrote:
> On Wed, 04 Nov 2009 17:42:37 CST, Paul Schmehl said:
>> You and millions of others love to conflate those issues with
>> warrantless surveillance of US citizens for the purpose of obtaining
>> e
--On Wednesday, November 04, 2009 16:36:12 -0600 valdis.kletni...@vt.edu wrote:
> On Wed, 04 Nov 2009 14:08:59 CST, Paul Schmehl said:
>> Please cite one proven instance where surveillance was done on anyone
>> without a FISA warrant - and lefty blogs filled with hyperbole don
, much less jailed? Yeah. That's what I
> thought...
>
> "On what planet do you spend most of your time?" -- Barney Frank
You should worry a lot more about the loss of your freedoms from people like
Barney Frank than you ever should about FBI surveillance.
--
Paul Sch
--On Wednesday, November 04, 2009 12:59:09 -0600 "Gary E. Miller"
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Yo Paul!
>
> On Wed, 4 Nov 2009, Paul Schmehl wrote:
>
>> No. But I can distinguish between an American citizen and someone
--On Tuesday, November 03, 2009 22:52:28 -0600 valdis.kletni...@vt.edu wrote:
> On Tue, 03 Nov 2009 22:13:24 CST, Paul Schmehl said:
>> Of course, without a warrant they can't wiretap anything. Furthermore
>> every warrant to wiretap has to be accompanied by evidence t
--On Tuesday, November 03, 2009 22:39:06 -0600 Holt Sorenson
wrote:
>
> On Tue, Nov 03, 2009 at 10:13:24PM -0600, Paul Schmehl wrote:
>> Of course, without a warrant they can't wiretap anything. Furthermore
>> every warrant to wiretap has to be accompanied by evidenc
judge who agrees that there is
sufficient cause for the wiretap, and illegal wiretaps will not only get
your case thrown out of court but your butt thrown in jail as well.
But other than that, it's really troubling
Paul Schmehl, If it isn't alrea
vulnerability definitions
in real world scenarios, it's much more useful to know that something can
be exploited without the attacker having access to the box. Certainly a
higher priority is placed on resolving those issues than ones where the
attacker first has to obtain access.
Pau
ink this qualifies as
"potentially leading to a remote compromise" of a machine.
The attack begins when the unsuspecting user clicks on a link to either open an
attachment or view a webpage or video. In the background the compromise takes
place, after which the malicious software &quo
vately owned mailing list, any bars
or restaurants you might frequent or even your friend's house.
If you want freedom of speech on a mailing list, start your own. Then you
get to make the rules.
Go back to school, pay attention this time, and try to learn the
difference between public and p
posed to be attracting hackers to the list not banning
> them.
>
Hackers, yes. Bozos, no.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless
lability and the knowledge that an alternative exists.
At that point I think we'll see Microsoft's market share begin eroding badly.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
**
ears behind. The
current "technology" crackers are using to great success is social engineering.
Actually breaking into systems is almost passe these days.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employe
there, but it's not
hidden when it's running.
Finally, all reputable a/v companies already scan ADS for malicious code.
--
Paul Schmehl (pa...@utdallas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
_
o have life
on the sheep, if you're so inclined?
Or did you mean life on the lam?
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
***
"It is as useless to argue
1 - 100 of 359 matches
Mail list logo