Re: [Full-disclosure] DakaRand

2012-08-20 Thread Paul Schmehl
bits, \ u_int frac, enum esource source); Here's a copy of random.h: <http://bintree.net/freebsd/d1/d79/random_8h_source.html> -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. **

Re: [Full-disclosure] DakaRand

2012-08-20 Thread Paul Schmehl
--On August 20, 2012 8:32:59 AM -0700 Dan Kaminsky wrote: > > > > On Mon, Aug 20, 2012 at 8:29 AM, Paul Schmehl > wrote: > > > --On August 20, 2012 2:22:28 AM -0700 Dan Kaminsky > wrote: > > > May I ask what FreeBSD's entropy sources are? > >

Re: [Full-disclosure] DakaRand

2012-08-20 Thread Paul Schmehl
--On August 20, 2012 2:22:28 AM -0700 Dan Kaminsky wrote: > > May I ask what FreeBSD's entropy sources are? I'm surprised you don't already know. From device noise. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own an

Re: [Full-disclosure] Fuckloads...

2012-01-26 Thread Paul Schmehl
--On January 26, 2012 10:27:29 AM +1100 xD 0x41 wrote: > i will destroy FD this year, mark these words. > Is today the anniversary of this annual threat? Man I've lost track of time.... -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions ar

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-14 Thread Paul Schmehl
secret. > It's 2012. I seriously doubt most sites ignore vulnerabilities any more. We HAVE learned a few things over the years. We are constantly auditing for flaws, assessing for flaws and insisting that flaws are corrected. We don't need your help to do our jobs. I can assure

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-13 Thread Paul Schmehl
--On January 13, 2012 2:03:36 PM -0600 Laurelai wrote: >> > Well just remember they could have *not* told you and helped themselves > to a backdoor. If they wanted to door you they probably wouldn't have > told you. > Which is precisely what he'd like you to thin

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-13 Thread Paul Schmehl
--On January 13, 2012 12:03:22 PM -0500 Benjamin Kreuter wrote: > On Fri, 13 Jan 2012 10:37:31 -0600 > Paul Schmehl wrote: > >> --On January 12, 2012 3:16:19 PM -0500 Benjamin Kreuter >> wrote: >> >> > The law is not going to stop the really bad people >

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-13 Thread Paul Schmehl
--On January 12, 2012 9:01:28 AM -0500 valdis.kletni...@vt.edu wrote: > > Bottom line: In most corporations, the CSO *can't* spend more money on > security unless he can show increased profits by doing so. Or decreased losses. -- Paul Schmehl, Senior Infosec Analyst As if it

Re: [Full-disclosure] Rate Stratfor's Incident Response

2012-01-13 Thread Paul Schmehl
t; Assuming everyone's motives are as pure as the driven snow is a bit naive, don't you think? -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is a

Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response

2012-01-09 Thread Paul Schmehl
andard install procedures didn't disable or secure sendmail because that wasn't the purpose of the box. That's just human nature. The really secure places plan ahead for such things, routinely check for out of compliance conditions, an

Re: [Full-disclosure] one of my servers has been compromized

2011-12-07 Thread Paul Schmehl
serland to get done. The kernel is > fully capable of sending out packets, creating files, etc. Userland in > fact relies on the kernel for all of these. If you get to the kernel you > control all of both worlds. You get the userland and in truth you only > control a portion of the userland. &

Re: [Full-disclosure] one of my servers has been compromized

2011-12-07 Thread Paul Schmehl
effort to make your > userland kit work to satisfaction for a far weaker hold on the box. It > would simply be idiotic. And I think we can all agree that an attacker > able to do either of the above is not an idiot. > > On Dec 6, 2011 10:19 AM, "Paul Schmehl" wrote: >> >

Re: [Full-disclosure] one of my servers has been compromized

2011-12-06 Thread Paul Schmehl
I know ya mean well, but your first block of advice isn't pratical or > effective. The second one the OP already did so alls well for that. > > :) > On Dec 6, 2011 10:19 AM, "Paul Schmehl" wrote: > > A "poor man's" root kit detector is to take md5sums

Re: [Full-disclosure] one of my servers has been compromized

2011-12-06 Thread Paul Schmehl
ot;find", under /tmp/.m > > Deleted them, looked up remote connections with netstat, killed perl > processes that where trying to connect to port 6959 (only trying because > I've now set up iptables so that they actually can't), but those processes > kept spawning. Checked crontab of www-d

Re: [Full-disclosure] one of my servers has been compromized

2011-12-05 Thread Paul Schmehl
rver logs to see what they did to get in. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue with those who have renounced the use of r

Re: [Full-disclosure] one of my servers has been compromized

2011-12-05 Thread Paul Schmehl
IOW, they didn't get root on the box - they only compromised the web application and then ran shells in perl off of that.) -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-17 Thread Paul Schmehl
commonplace, not > spectacular, and it usually isn't a result of a conscious decision you > made. > OTOH, don't you think someone who qualifies for a Darwin Award has demonstrated a mental deficiency? -- Paul Schmehl, Senior Infosec Analyst As if it wa

Re: [Full-disclosure] Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

2011-10-16 Thread Paul Schmehl
and where that money is coming from. Paul Schmehl, If it isn't already obvious, my opinions are my own and not those of my employer. ** "When intelligence argues with stupidity and bias, intelligence is bound to lose; intelligence has limits,

Re: [Full-disclosure] [OT] Obama said: "American people understand that not everybody's been following the rules"

2011-10-14 Thread Paul Schmehl
--On October 14, 2011 3:39:06 PM -0400 valdis.kletni...@vt.edu wrote: > On Fri, 14 Oct 2011 13:56:12 CDT, Paul Schmehl said: >> Go watch a few beheading videos and then come back and regale us with >> your stories of innocent civilians. > > Do you have actual hard evidence t

Re: [Full-disclosure] [OT] Obama said: "American people understand that not everybody's been following the rules"

2011-10-14 Thread Paul Schmehl
Go watch a few beheading videos and then come back and regale us with your stories of innocent civilians. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is

Re: [Full-disclosure] [OT] Obama said: "American people understand that not everybody's been following the rules"

2011-10-14 Thread Paul Schmehl
;armed individuals" is one thing. If it's "civilians and > Reuters employees" who *aren't* obviously armed, it's something else. > And if they hadn't actually been armed, with AK-47s and RPGs, you might have a point. But since they were, you don't.

Re: [Full-disclosure] [OT] Obama said: "American people understand that not everybody's been following the rules"

2011-10-13 Thread Paul Schmehl
icans-have-more-wealth-/> So how would you pay for NEXT year? The problem isn't that we're not taxing the rich enough. It's that our government is completely out of control and spending 40% more than it takes in. The rich people can't save us from that insanity. --On Oct

Re: [Full-disclosure] [OT] Obama said: "American people understand that not everybody's been following the rules"

2011-10-12 Thread Paul Schmehl
ay!? >> >> >> >> If you protest against rich filthy thieves you mustn't own a semi >> >> decent camera? >> >> >> >> Its not a right but a privilege to own a nice camera, now. >> >> >> >>

Re: [Full-disclosure] [OT] Obama said: "American people understand that not everybody's been following the rules"

2011-10-12 Thread Paul Schmehl
t see the irony and hypocrisy of that position, you might be a liberal. Oh, 'scuse me, progressive. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to

Re: [Full-disclosure] VPN provider helped track down alleged LulzSec member

2011-09-30 Thread Paul Schmehl
/ > >> >> >>>> > >> >> >>>> _______ > >> >> >>>> Full-Disclosure - We believe in it. > >> >> >>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >

Re: [Full-disclosure] Encrypted files and the 5th amendment

2011-07-12 Thread Paul Schmehl
mployee or agent responsible for delivering > the message to the intended recipient, is prohibited. If you have > received this e-mail in error, please immediately notify us by calling > our Help Desk at (212)590-7600, or e-mail to > helpdes...@omnicommediagroup.com. > __

Re: [Full-disclosure] Florida Power & Light Company (FPL) Fort Sumner Wind turbine Control SCADA was HACKED

2011-04-19 Thread Paul Schmehl
- We believe in it. >> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> > Hosted and sponsored by Secunia - http://secunia.com/ >> >> ___ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok

Re: [Full-disclosure] What the f*** is going on?

2011-02-24 Thread Paul Schmehl
can be leveraged to gain further access. But if you forgo routine patching, allow lousy passwords, allow poor configuration practices and run services that aren't vetted and authorized, then, well, you're an HBGary clone.. -- Paul Schmehl, Senior Infosec Analyst As if it wasn&

Re: [Full-disclosure] Other recommended lists?

2011-02-21 Thread Paul Schmehl
gt; > I refer you also > to: http://www.urbandictionary.com/define.php?term=trolling > > > On Mon, Feb 21, 2011 at 7:12 PM, Paul Schmehl > wrote: > > I rest my case. > > > > > --On February 21, 2011 7:04:33 PM + "Cal Leeming [Simplicity Media &g

Re: [Full-disclosure] Other recommended lists?

2011-02-21 Thread Paul Schmehl
related discussion? Seriously? I think it's safe to assume you don't understand irony. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue w

Re: [Full-disclosure] Other recommended lists?

2011-02-21 Thread Paul Schmehl
I rest my case. --On February 21, 2011 7:04:33 PM + "Cal Leeming [Simplicity Media Ltd]" wrote: > And why is that, Paul? > > > On Mon, Feb 21, 2011 at 7:03 PM, Paul Schmehl > wrote: > > > > > --On February 21, 2011 6:15:07 PM + "Cal Leemin

Re: [Full-disclosure] (this thread is now about porn).‏

2011-02-18 Thread Paul Schmehl
this list becomes moderated, the only control any of us have over > its content, is to block individuals whom we don't wish to receive mail > from. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. **

Re: [Full-disclosure] from hbgary: stuxnet, WL attack, Psyop and Anonymous trackdown‏

2011-02-17 Thread Paul Schmehl
iw> >> >> > > > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > > -- Pau

Re: [Full-disclosure] jaillords.com hacked, login/password/email list

2011-02-08 Thread Paul Schmehl
eve that admins for a site like this would be reading FD? -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue with those who have renounced the

Re: [Full-disclosure] Path to IT Security

2011-01-19 Thread Paul Schmehl
ty easy, since you'll be familiar with > most of the ideas already. > > I got a certificate to get past HR and because it looks pretentious on a > business card. It wasn't worth the hassle of submitting paperwork and > paying dues to continue having it, so I let it lapse.

Re: [Full-disclosure] Getting Off the Patch

2011-01-14 Thread Paul Schmehl
Just adding another 400 Amp service gives them palpitations. I swear they think these things grow on trees and cost nothing to operate. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer.

Re: [Full-disclosure] FreeBSD backdoor full disclosure

2010-12-28 Thread Paul Schmehl
--On December 28, 2010 8:51:40 AM -0500 Григорий Братислава wrote: > > Is question: 'I is created code.c and I is release it. Paul Schmehl is > come and take code.c and is backdoor it.' > > a) Is I to is blame? > b) Is Schmehl responsible for is backdoor > c) Is

Re: [Full-disclosure] OpenBSD Smoking Gun

2010-12-23 Thread Paul Schmehl
--On December 23, 2010 6:51:27 AM -0500 Григорий Братислава wrote: > Hello Full Disclosure!!! > > Musntlive has warned you all about > OpenB(ackdoored)S(oftwared)D(istrobution) for is some time and is all > say musntlive is crazy. However is now when Theo discloses bug, is > people like Paul "I

Re: [Full-disclosure] OpenBSD has Open Backdoored Software Distribution - admitted by Theo

2010-12-22 Thread Paul Schmehl
--On December 22, 2010 3:47:25 PM -0800 Dave Nett wrote: > http://marc.info/?l=openbsd-tech&m=129296046123471&w=2 > > Long mail which just admit has backdoor, poor Theo. > > In your dreams. Paul ___ Full-Disclosure - We believe in it. Charter: http

Re: [Full-disclosure] OpenBSD has Open Backdoored Software Distribution - admitted by Theo

2010-12-22 Thread Paul Schmehl
--On December 22, 2010 8:55:49 PM -0500 valdis.kletni...@vt.edu wrote: > > And at some point, you really have to ask yourself "Is this really a > plausible attack method, or did I forget to take my meds again?". > > Well, it certainly makes for entertaining reading on the FD list. Haven't had th

[Full-disclosure] SSD and WDE

2010-12-17 Thread Paul Schmehl
on and not to WDE in general would be of great interest. (I'm not interested in articles on the cold boot attack. I'm already familiar with that one.) -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-17 Thread Paul Schmehl
--On December 17, 2010 12:37:34 PM -0500 Григорий Братислава wrote: > > Is no one asking you for is your expertease Mr. Schmehl, is in fact we > say is you need retire back to мошонка sniffing > Think of me as a bozo detector. -- Paul Schmehl, Senior Infosec Analyst As if it wa

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-17 Thread Paul Schmehl
keyed VPN system used at 235+ US Attorney locations and which later proved to have been backdoored by the FBI so that they could recover (potentially) grand jury information from various US Attorney sites across the United States and abroad." Still think he never wrote any and had no knowledg

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-17 Thread Paul Schmehl
enBSD code or the possibility of a backdoor existing in it. The fact that I have to write all this irritates me. It's a waste of my time. But that's the price you pay for being on the internet, which abounds with idiots who will swallow every wild and unsubstantiated claim without qu

Re: [Full-disclosure] Backdoor in OpenBSD Explained proof of Theo's lieying

2010-12-16 Thread Paul Schmehl
--On December 16, 2010 11:23:10 PM + John Bond wrote: > On 16 December 2010 22:26, musnt live wrote: >> Hello Full Disclosure!!! >> >> I'd like to warn you about Paul Schmehl. Is obvious. Paul Schmehl is >> like to smell Theo's crotch. > Sorry P

Re: [Full-disclosure] Backdoor in OpenBSD Explained proof of Theo's lieying

2010-12-16 Thread Paul Schmehl
07. For why is he underhanded the world? > Is he want to dominate world, because he is . Just like Bill Gates. Is you need me send you to some meds? -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my em

Re: [Full-disclosure] Why OpenBSD is can be backdoored and no one is see comeing

2010-12-16 Thread Paul Schmehl
ruth. Who is was we to question Lickingberg Is your mind gone? Or merely on the road? -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-16 Thread Paul Schmehl
Rational people don't fall for this stuff. Should the code be audited? Of course! Auditing is always useful and often productive. Should we assume the worst? Not without better evidence than what we have before us now. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already

Re: [Full-disclosure] Making Security Suck Less

2010-12-16 Thread Paul Schmehl
s should consider. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue with those who have renounced the use of reason as to admini

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-15 Thread Paul Schmehl
--On December 15, 2010 10:55:39 AM -0800 bk wrote: > > On Dec 15, 2010, at 10:32 AM, Paul Schmehl wrote: > >> --On December 14, 2010 8:40:14 PM -0500 b...@fbi.dhs.org wrote: >>> >>> http://www.downspout.org/?q=node/3 >>> >>> Seems IPSE

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-15 Thread Paul Schmehl
rson examining the code has noticed it? Or even questioned it? That's a bit hard to believe. It's along the same lines as the stories that Microsoft captures all your packets and harvests your personal information. Read The Cathedral and The Bazaar. -- Paul Schmehl, Senior Infos

Re: [Full-disclosure] Windows is 100% self-modifying assemblycode?(Interesting security theory)

2010-12-10 Thread Paul Schmehl
self assembling kernel and libraries etc Check the archives, there's been some truly dim bulbs who have wandered through here. :) Archives? Just read the list every day. -- Paul Schmehl (pa...@utdallas.edu) Senior Information Security Analyst The University of Texas at Dallas http://www.ut

Re: [Full-disclosure] WikiLeaks

2010-10-07 Thread Paul Schmehl
ell >>>>>>> slightly fishy... >>>>>>> >>>>>>>         -h >>>> ___ >>>> Full-Disclosure - We believe in it. >>>> Charter: http://lists.grok.org.uk/full-disclosure

Re: [Full-disclosure] Reliable reports on attacks on medical software and IT-systems available?

2010-08-12 Thread Paul Schmehl
the wall and see if some sticks" type of attacks. Who knows what impact they might have on heart monitor or a networked IV? And since most expensive equipment that requires a separate PC controller will be running Windows, older OSes, unpatched and without AV, the chances of a "thro

Re: [Full-disclosure] Reliable reports on attacks on medical software and IT-systems available?

2010-08-10 Thread Paul Schmehl
press reports to avoid panic reaction (for many > patients health and logic does not go together) or to inhibit terrorism in > that area. > Government probably doesn't know about them. When they do, they will pass a stupid law that will make them feel better and extract money f

Re: [Full-disclosure] Project Vigilant

2010-08-09 Thread Paul Schmehl
to have a Avengers type squad of uber nerds, but > I can't find any record of his '10 years' of crime-fighting awesomeness. > Thoughts? Opinions? Flames? http://blogs.forbes.com/firewall/2010/08/06/bbhc-global-and-project-vigilant-wheres-the-money/ -- Paul Schmehl, Seni

Re: [Full-disclosure] Expired certificate

2010-08-04 Thread Paul Schmehl
ss it) that checked the SQL version, including the > revision number at runtime, which made patching SQL impossible. > In those cases where there are such systems, there should be mitigating controls around them that increase the difficulty of break-in. Otherwise the IT department is negligent.

Re: [Full-disclosure] [Software Freedom Law Center paper] Killed by Code: Software Transparency in Implantable Medical Devices

2010-07-23 Thread Paul Schmehl
ch. So those applications that are well written and serve a useful purpose will prosper and consistently improve, while those applications that are poorly written and address obscure uses will languish and die. And that is as it should be, I think.

Re: [Full-disclosure] No anti-virus software? No internet connection

2010-06-22 Thread Paul Schmehl
they will promotes a false sense of security. Yes, you should use antivirus software if you're running windows, and yes, it's a good idea to use a firewall. Neither is a panacea, however, and neither will keep you from getting a trojan from the latest attack methodologies. -- Paul Sc

Re: [Full-disclosure] targetted SSH bruteforce attacks

2010-06-17 Thread Paul Schmehl
uthentication make you more secure (in a practical sense)? -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue with those who have renounc

Re: [Full-disclosure] targetted SSH bruteforce attacks

2010-06-17 Thread Paul Schmehl
s. > > Now, if we *all* move away from 22, your advice is more appropriate. Of course if you do account provisioning correctly and configure your hosts securely, you're not exposed on port 22 either. You just have to deal with the constant knocking at the door. Some of us have simply

Re: [Full-disclosure] Windows' future (reprise)

2010-05-18 Thread Paul Schmehl
Symantec notes as “new > threats.” > OK. What about the CO2 in your computer? :-) -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue w

Re: [Full-disclosure] Compliance Is Wasted Money, Study Finds

2010-04-27 Thread Paul Schmehl
out problems 100% of the time. Until software vendors get their act together and start building security in from the beginning of development, companies will continue to experience breaches. Even in a perfect world of zero vulnerable software packages you'll still have to deal with th

Re: [Full-disclosure] Administrivia: An Experiment

2010-03-24 Thread Paul Schmehl
n end, fd will never be the same, this is a violation of the spirit of fd" whining tape.. :-) -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is a

Re: [Full-disclosure] Men in block following me?

2010-02-18 Thread Paul Schmehl
be verified at https://www.hushtools.com/verify > > wpwEAQMCAAYFAkt6rpIACgkQwGoky+I7Eoux/gP8CWC4lR/1uD9iuyK8j4YmMmCjsz78 > IuMfDarADvLGRPTII8JZelBaD5NrHiXcx+SdUREeDICvpeq4qSp07Uj060mVEKJJ/b3S > JMIEHUlypahII+dkJcPqdrQfAhIl5Lj3BJMLkgLU1pmJswCsRQbFl/uJBxjnfMYSkn6C > cQi/XlM= > =fd2p

Re: [Full-disclosure] Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection

2010-01-11 Thread Paul Schmehl
anzer  ...@mail.acme.com  http://acme.com/jef/ > > > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > >

Re: [Full-disclosure] Geolocation Question

2010-01-07 Thread Paul Schmehl
t; are entirely altruistic. > Or you are entirely naive. :-) -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue with those who have renou

[Full-disclosure] Global warming - it's all about the money

2009-12-15 Thread Paul Schmehl
http://www.wnd.com/index.php?fa=PAGE.view&pageId=118953 Businesses hold world hostage over carbon credits Even U.N. climate chief tied to new, 'green' extortion scam It was never about the climate. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my

Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Paul Schmehl
--On December 12, 2009 5:24:27 PM + cyber armageddon wrote: > On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl > wrote: >> --On December 12, 2009 7:37:08 AM -0600 cyber armageddon >> wrote: >>> IDF, Military Intelligence >>> >>> (Government Agen

Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Paul Schmehl
six years ago. Do the math doofus. Paul Schmehl, If it isn't already obvious, my opinions are my own and not those of my employer. ** WARNING: Check the headers before replying ___ Full-Disclosure

Re: [Full-disclosure] Software developer looks at CRU code

2009-12-06 Thread Paul Schmehl
is titled "Abortions for which public funding is allowed" Need I go further? The fact is that, in their present forms, both the House and Senate version provide public funding for abortions. No, it's not abortion on demand, but it is abortion. Stop taking the news media's

Re: [Full-disclosure] Software developer looks at CRU code

2009-12-06 Thread Paul Schmehl
Moore contingent (there is no bigger liar on the planet), the anthropomorphic global warming crowd, the let-give-terrorists-constitutional-rights crowd, etc., etc. The problems are the same on both sides. The fact that you can't see that says a lot more about you than it does about eithe

Re: [Full-disclosure] Software developer looks at CRU code

2009-12-06 Thread Paul Schmehl
urse presupposes that "deliberate lying" was even going on - > which > is *far* from conclusively proven. > You wrote this with a straight face, right? Paul Schmehl As if it wasn't already obvious, my opinions are my own and not those of my employer. ___

Re: [Full-disclosure] The Cyber War Conspiracy

2009-12-04 Thread Paul Schmehl
not me. If I was going to pose > as > a troll, I'd pose as a more clueful troll - trying to think that > cluelessly > makes my brain hurt. > > On the other hand, nobody's ever seen me and Paul Schmehl at the same > place > at the same time... I wonder why... :)

Re: [Full-disclosure] Software developer looks at CRU code

2009-11-30 Thread Paul Schmehl
rograms designed to deliberately skew the data in their favor and hide unfavorable data. <http://www.timesonline.co.uk/tol/news/environment/article6936328.ece> <http://www.timesonline.co.uk/tol/news/environment/article6936289.ece> If that isn't ma

Re: [Full-disclosure] Software developer looks at CRU code

2009-11-30 Thread Paul Schmehl
lternative energy companies?  The Trilateral Commission?  > -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue with those who have renounce

Re: [Full-disclosure] Software developer looks at CRU code

2009-11-30 Thread Paul Schmehl
vember 30, 2009 15:31:21 -0600 valdis.kletni...@vt.edu wrote: > > On Mon, 30 Nov 2009 15:06:46 CST, Paul Schmehl said: >> Recent evidence shows that the globe is again cooling > > So the CO2 emissions are the only things saving us, right Paul? > > http://en.wikipedia.org/wiki/Fallen_Ange

Re: [Full-disclosure] Software developer looks at CRU code

2009-11-30 Thread Paul Schmehl
, November 30, 2009 06:35:50 -0600 Ali Raheem wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Simply because a few scientist have found to be fraudulent it doesn't > mean the concept of Climate change is. Even if this was found to be > faked it is far

Re: [Full-disclosure] Software developer looks at CRU code

2009-11-29 Thread Paul Schmehl
ube.com/watch?v=sYxk7pnmMFw&feature=related > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ Paul Schmehl, If it isn

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-09 Thread Paul Schmehl
> myself.) > > > -Original Message- > From: full-disclosure-boun...@lists.grok.org.uk > [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Paul > Schmehl > Sent: Saturday, November 07, 2009 8:53 PM > To: full-disclosure@lists.grok.org.uk > Subject: Re

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-08 Thread Paul Schmehl
ost > impossible. > > Ahah! Now we're on to something. Here's an idea. Make it easier > to get that warrant when you need it. Improve the process, so that > when requested, a warrant can be turned around in hours, not days. > Don't remove the requirement altogeth

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-07 Thread Paul Schmehl
--On November 7, 2009 11:24:55 AM -0600 valdis.kletni...@vt.edu wrote: > On Fri, 06 Nov 2009 23:42:45 CST, Paul Schmehl said: >> communications as well. Under existing law (if you believe that FISA >> applies) they would have 72 hours maximum to submit the necessary >> pap

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-07 Thread Paul Schmehl
ctors but only nation states. The issues are complex, and they should be discussed without emotion or political rhetoric and unfounded charges that cloud the waters. And one must always keep in mind that we're talking about a military agency trying to track what our enemi

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-05 Thread Paul Schmehl
> > Which government agency is paying your mortgage? The same one that is proposing to pay for your healthcare and control every other aspect of your life because you're too blind to see the forest for the trees. You and millions of other blithering idiots who see nothing wrong with the

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
--On November 4, 2009 8:03:10 PM -0600 "Gary E. Miller" wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Yo Paul! > > On Wed, 4 Nov 2009, Paul Schmehl wrote: > >> Please cite one proven instance where surveillance was done on anyone >

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
--On November 4, 2009 8:48:41 PM -0600 valdis.kletni...@vt.edu wrote: > On Wed, 04 Nov 2009 17:42:37 CST, Paul Schmehl said: >> You and millions of others love to conflate those issues with >> warrantless surveillance of US citizens for the purpose of obtaining >> e

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
--On Wednesday, November 04, 2009 16:36:12 -0600 valdis.kletni...@vt.edu wrote: > On Wed, 04 Nov 2009 14:08:59 CST, Paul Schmehl said: >> Please cite one proven instance where surveillance was done on anyone >> without a FISA warrant - and lefty blogs filled with hyperbole don&#x

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
, much less jailed? Yeah. That's what I > thought... > > "On what planet do you spend most of your time?" -- Barney Frank You should worry a lot more about the loss of your freedoms from people like Barney Frank than you ever should about FBI surveillance. -- Paul Sch

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
--On Wednesday, November 04, 2009 12:59:09 -0600 "Gary E. Miller" wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Yo Paul! > > On Wed, 4 Nov 2009, Paul Schmehl wrote: > >> No. But I can distinguish between an American citizen and someone

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
--On Tuesday, November 03, 2009 22:52:28 -0600 valdis.kletni...@vt.edu wrote: > On Tue, 03 Nov 2009 22:13:24 CST, Paul Schmehl said: >> Of course, without a warrant they can't wiretap anything. Furthermore >> every warrant to wiretap has to be accompanied by evidence t

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-04 Thread Paul Schmehl
--On Tuesday, November 03, 2009 22:39:06 -0600 Holt Sorenson wrote: > > On Tue, Nov 03, 2009 at 10:13:24PM -0600, Paul Schmehl wrote: >> Of course, without a warrant they can't wiretap anything. Furthermore >> every warrant to wiretap has to be accompanied by evidenc

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-03 Thread Paul Schmehl
judge who agrees that there is sufficient cause for the wiretap, and illegal wiretaps will not only get your case thrown out of court but your butt thrown in jail as well. But other than that, it's really troubling Paul Schmehl, If it isn't alrea

Re: [Full-disclosure] When is it valid to claim that a vulnerability leads to a remote attack?

2009-10-11 Thread Paul Schmehl
vulnerability definitions in real world scenarios, it's much more useful to know that something can be exploited without the attacker having access to the box. Certainly a higher priority is placed on resolving those issues than ones where the attacker first has to obtain access. Pau

Re: [Full-disclosure] When is it valid to claim that a vulnerability leads to a remote attack?

2009-10-09 Thread Paul Schmehl
ink this qualifies as "potentially leading to a remote compromise" of a machine. The attack begins when the unsuspecting user clicks on a link to either open an attachment or view a webpage or video. In the background the compromise takes place, after which the malicious software &quo

Re: [Full-disclosure] Blonde moment for the list administrator

2009-09-06 Thread Paul Schmehl
vately owned mailing list, any bars or restaurants you might frequent or even your friend's house. If you want freedom of speech on a mailing list, start your own. Then you get to make the rules. Go back to school, pay attention this time, and try to learn the difference between public and p

Re: [Full-disclosure] Blonde moment for the list administrator

2009-09-04 Thread Paul Schmehl
posed to be attracting hackers to the list not banning > them. > Hackers, yes. Bozos, no. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless

Re: [Full-disclosure] windows future

2009-08-28 Thread Paul Schmehl
lability and the knowledge that an alternative exists. At that point I think we'll see Microsoft's market share begin eroding badly. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. **

Re: [Full-disclosure] windows future

2009-08-28 Thread Paul Schmehl
ears behind. The current "technology" crackers are using to great success is social engineering. Actually breaking into systems is almost passe these days. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employe

Re: [Full-disclosure] NTFS Alternate Data Stream

2009-08-23 Thread Paul Schmehl
there, but it's not hidden when it's running. Finally, all reputable a/v companies already scan ADS for malicious code. -- Paul Schmehl (pa...@utdallas.edu) Senior Information Security Analyst The University of Texas at Dallas http://www.utdallas.edu/ir/security/ _

Re: [Full-disclosure] Questions for the iProphet

2009-08-21 Thread Paul Schmehl
o have life on the sheep, if you're so inclined? Or did you mean life on the lam? -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my own and not those of my employer. *** "It is as useless to argue

  1   2   3   4   >