Re: [Full-disclosure] Advantages of Stack Guard over Stack Shield

2013-10-22 Thread Pavel Kankovsky
). This is prone to break various things (multithreading, longjmp) and I am afraid a hypothetical implementation would have to be quite heavyweight and messy in order to avoid breaking them. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up

Re: [Full-disclosure] The right to read, debuggers and building future Fedora kernels

2012-07-12 Thread Pavel Kankovsky
On Thu, 12 Jul 2012, Georgi Guninski wrote: > Helped by m$, Fedora are actively working this to become true [2] [3] Don't blame Sophie for her choice. Blame Nazis for making her choose. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is com

Re: [Full-disclosure] Hacking IPv6 Networks (slides)

2011-08-14 Thread Pavel Kankovsky
uting to > security breaches, etc. Whenever possible, IPv6 > address-/netblock-related information should be transmitted in written > form, not verbally. Spelling alphabets have been invented during WW1 (or even earlier). It would be absolutely inappropriate to use such an antiquated soluti

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-15 Thread Pavel Kankovsky
aid firewall with well-formed, > programatically-generated traffic. Yup. We all know servers handle traffic without any of those pesky state-tables that can be filled up with well-formed, programatically-generated traffic. -- Pavel Kankovsky aka Peak / Jeremiah 9:2

Re: [Full-disclosure] how would browser vendors deal with $O(10^k)$ fake certs?

2011-04-17 Thread Pavel Kankovsky
bits must be hashed) or to find it in some kind of cache of verified certs (a positive result is needed here, therefore all bits must be checked and match). -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(t

Re: [Full-disclosure] how would browser vendors deal with $O(10^k)$ fake certs?

2011-04-10 Thread Pavel Kankovsky
O(l) operations. \Omega(l) + O(l) = \Omega(l). -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / ___ Full-Disclosure - We believe in it. Ch

Re: [Full-disclosure] adobe.com important subdomain SQL injection again!

2010-12-23 Thread Pavel Kankovsky
zing feat in a printed book but the wonders of modern technology will make it possible soon. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / _

Re: [Full-disclosure] adobe.com important subdomain SQL injection again!

2010-12-19 Thread Pavel Kankovsky
On Sat, 18 Dec 2010, Victor Rigo wrote: > It's not ineptness, it's what you get when you right software that can > actually do stuff. The bad news is security's made of the stuff one CAN'T do. -- Pavel Kankovsky aka Peak / Jeremiah 9:21

Re: [Full-disclosure] The GNU C library dynamic linker expands $ORIGIN in setuid library search path

2010-10-19 Thread Pavel Kankovsky
n of a set*id program with a transition to a domain whose privilege to execute files is restricted. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition /

Re: [Full-disclosure] The GNU C library dynamic linker expands $ORIGIN in setuid library search path

2010-10-18 Thread Pavel Kankovsky
as far as to propose to erase ANY environment variable upon the execution of set*id program. At least unless it is allowed EXPLICITLY.) -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 2

Re: [Full-disclosure] Gödel and kernel backdoors

2010-10-14 Thread Pavel Kankovsky
On Sun, 19 Sep 2010, Georgi Guninski wrote: > On Sun, Sep 19, 2010 at 06:21:35PM +0200, Pavel Kankovsky wrote: > > On the other hand, It is possible to "detect all bad programs" if it is > > allowed to err on the safe side and mistake some good programs for bad > >

Re: [Full-disclosure] Gödel and kernel backdoors

2010-09-19 Thread Pavel Kankovsky
programs for bad programs. An extreme example is to call all programs bad unless their exact code appears on the list of known good programs. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edi

Re: [Full-disclosure] Nmap NOT VULNERABLE to Windows DLL Hijacking Vulnerability

2010-09-18 Thread Pavel Kankovsky
vendor improperly using strcpy? Providing a very dangerous API to developers and advising them to avoid the most straightforward way of using it is like giving a hand grenade to kids and advising them to be very careful when they play with it. -- Pavel Kankovsky aka Peak

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-05 Thread Pavel Kankovsky
e without your explicit approval. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / ___ Full-Disclosure - We believe in it. Charter: http://

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-02 Thread Pavel Kankovsky
<http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.5890> -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / ___ Full-Disc

Re: [Full-disclosure] question regarding RSA

2010-09-02 Thread Pavel Kankovsky
h as Jacobi symbol). An oracle can help you crack RSA private keys but it needs to be a DECRYPTION oracle (viz Bleichenbacher attack). -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)...&

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-08-30 Thread Pavel Kankovsky
On Thu, 26 Aug 2010, Dan Kaminsky wrote: > The question is whether they're supposed to execute code in this > particular context. I think the question ought to be: what authority and privileges shall be granted to the code when it is executed? -- Pavel Kankovs

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Pavel Kankovsky
s into executable files themselves. This happens quite often and I find it very disturbing. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / ___

Re: [Full-disclosure] Cross-Site Scripting vulnerability in Mozilla Firefox, Opera and other browsers

2010-08-09 Thread Pavel Kankovsky
; or "302 Object > moved" answer) outputs double quote in Location header in plain (not in URL > encoding) form. Would you mind showing us the actual HTTP response generated your script.php, esp. its body? -- Pavel Kankovsky aka Peak / Jeremiah 9:21\

Re: [Full-disclosure] Expired certificate

2010-08-01 Thread Pavel Kankovsky
ills but I admit I have not found a clear example affecting IT infrastructure directly. Replace interrupted power supply with expired domain registration and you'll be able to find dozens of incidents, all of them affecting IT for obvious reasons--and some of them involving big names like Mic

Re: [Full-disclosure] Expired certificate

2010-07-25 Thread Pavel Kankovsky
articular way it is used. > Expiration is one of a number of serious and genuinely unique > operational hazards in X.509. When you fail to pay your electric bill every month, they will cut your power supply. All your computers will stop working. Is it a "genuinely unique operational hazard"

Re: [Full-disclosure] In-band signalling (was: Re: NuralStorm Webmail Multiple Vulnerabilities)

2010-07-24 Thread Pavel Kankovsky
e lesson to be learned I talked about. BTW: Between? What makes you think you have simply two contexts? :) -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / _

Re: [Full-disclosure] Expired certificate

2010-07-24 Thread Pavel Kankovsky
uld make up for the one-time cost of > renewing some certs prematurely. Many (if not most) CAs let you renew a certificate two or three months before its expiration and give you the remaining time back. One who needs to renew one certificate every other day can do it once in 2 or 3 months in ba

Re: [Full-disclosure] Expired certificate

2010-07-18 Thread Pavel Kankovsky
On Sat, 17 Jul 2010, Dan Kaminsky wrote: > In reality, it's a time bomb, of the sort that usually doesn't exist. Have you never heard of passports? -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm).

[Full-disclosure] In-band signalling (was: Re: NuralStorm Webmail Multiple Vulnerabilities)

2010-07-17 Thread Pavel Kankovsky
s-than signs because we still have not learned to keep control data and user data segregated. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / __

Re: [Full-disclosure] NuralStorm Webmail Multiple Vulnerabilities

2010-07-15 Thread Pavel Kankovsky
(*) In-band signalling in telephone networks. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / ___ Full-Disclosure - We believe in i

Re: [Full-disclosure] targetted SSH bruteforce attacks

2010-06-17 Thread Pavel Kankovsky
makes a handful of login attempts against every indivial server, and disconnects to never be seen again. The whole scenario repeats with a new IP every minute or so. The set of servers is quite small, only cca 15 out of many tens available in our whole network. -- Pavel Kankovsky ak

Re: [Full-disclosure] Introducing TGP...

2010-06-17 Thread Pavel Kankovsky
e de Vigenere). :) -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / ___ Full-Disclosure - We believe in it. Charter: http://lists.grok

Re: [Full-disclosure] Two MSIE 6.0/7.0 NULL pointer crashes

2010-02-28 Thread Pavel Kankovsky
quot;working" :) But point taken. > The system needs to meet its functional requirements entirely the same > after. Sometimes the vulnerability itself is a functional requirement (or considered to be one of them). Has anyone mentioned ActiveX? -- Pavel Kankovsky aka Peak

Re: [Full-disclosure] help fuzzing/finding Horn CNF formula

2010-02-21 Thread Pavel Kankovsky
contradict P-completeness of HORN-SAT because the transformation of the original problem is allowed to make changes to its input--such as to negate one of variables and turn a question of nonequivalence into a question of equivalence (expressible with a Horn formula). -- Pavel Kankovsky aka Peak

Re: [Full-disclosure] Two MSIE 6.0/7.0 NULL pointer crashes

2010-01-23 Thread Pavel Kankovsky
system needs to work entirely the same after. Not entirely. You want to get rid of the vulnerability. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition /

[Full-disclosure] SSL/TLS MiTM PoC

2009-11-05 Thread Pavel Kankovsky
It might not work with up-to-date OpenSSL. Fixing that is left as an exercise for the reader. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21st century edition / #include #include #include #include

Re: [Full-disclosure] Mr. Magorium's Wunderbar Emporium

2009-08-15 Thread Pavel Kankovsky
eleased eight years ago. In other words, everyone has been screwed over for eight years but no one paid attention to it until recently. This is THE BAD THING. The fact kiddies may have learned about it a few days earlier is mere annoyance. -- Pavel Kankovsky aka Peak

Re: [Full-disclosure] Evading Windows Secure Keys

2009-07-12 Thread Pavel Kankovsky
me ago and, indeed, I was able to do strange things with modifiers (Shift et al.) but I do not recall whether it was possible to inhibit Ctrl+Alt+Del. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(

Re: [Full-disclosure] Anti virus installations on Windows servers

2009-05-02 Thread Pavel Kankovsky
alue" might be very far from "optimal". Secundo: Does "however deployed" includes "defunct"? Tertio: User experience?! -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \

Re: [Full-disclosure] Anti virus installations on Windows servers

2009-05-01 Thread Pavel Kankovsky
inaries to a server that is supposed to archive them for future reference. Should these binaries be scanned by an anti-virus? What do you think? -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..."

Re: [Full-disclosure] Virtual Machine Trojans: a new type of threat?

2009-04-19 Thread Pavel Kankovsky
de trojan. This means we can simplify the question as follows: Can antivirus prevent an arbitrary piece of malicious code from entering the network? And the answer is simple: No, it cannot. Stop fastening screws with a hammer. It has never worked. -- Pavel Kankovsky aka Peak

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-04 Thread Pavel Kankovsky
oaded page and able to make arbitrary changes as per (1)? The crash is a real (DoS) attack against the browser if and only if the answer to both questions is negative. (Assuming the crash has no consequences other than the loss of the page loaded into the crashed tab.) -- Pavel Kank

Re: [Full-disclosure] security industry software license

2008-10-12 Thread Pavel Kankovsky
nu.org/philosophy/right-to-read.html -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21th century edition / ___ Full-Disclosure - We believe in it. Charter: http://l

Re: [Full-disclosure] To disclose or not to disclose

2008-09-28 Thread Pavel Kankovsky
ort. -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windows(tm)..." \ 21th century edition / ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

Re: [Full-disclosure] Kaminsky's Law

2008-08-05 Thread Pavel Kankovsky
e vulnerable code (or protocol specification or whatever) itself? After all, the vulnerable code (or protocol or whatever) contains all the information needed to exploit it! -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ "For death is come up into our MS Windo

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-15 Thread Pavel Kankovsky
) without much trouble. > USB is probably safe. B in USB stands for a bus. You could probably do some interesting tricks when you find yourself attached to the same bus as a trusted device (like a keyboard). -- Pavel Kankovsky aka Peak / Jeremiah 9:21\ &

Re: [Full-disclosure] URI handling woes in Acrobat Reader, Netscape, Miranda, Skype

2007-10-12 Thread Pavel Kankovsky
m_. Cough, cough... --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation." ___ Full-Disclosure - We believe in it. Charter: http://lists.

Re: [Full-disclosure] The Death of Defence in Depth ? - An invitation to Hack.lu

2007-10-12 Thread Pavel Kankovsky
ly, the right way provides too few (if any) opportunities to sell new shiny boxes so it is very unappealing for the "security industry". --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open

Re: [Full-disclosure] The Death of Defence in Depth ? - Aninvitation to Hack.lu

2007-10-12 Thread Pavel Kankovsky
important) components, never the other way. It was not difficult. Was it? --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation."

Re: [Full-disclosure] Month of Random Hashes: DAY THREE

2007-06-16 Thread Pavel Kankovsky
nding inputs. No. There has to be at least one output having an infinite number of corresponding inputs but this does not have to hold for all output values. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare

Re: [Full-disclosure] Linux big bang theory....

2007-05-27 Thread Pavel Kankovsky
On Sat, 26 May 2007 [EMAIL PROTECTED] wrote: > On Sat, 26 May 2007 11:42:46 +0200, Pavel Kankovsky said: > > From a theoretical POV, it might be possible do it with a program > > requiring all memory of the tested system [...] to compute a correct > > result. Several diffi

Re: [Full-disclosure] Linux big bang theory....

2007-05-26 Thread Pavel Kankovsky
time into account and allowing the simulation of extra memory as long as it is impossible to do it quickly enough. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation." ___

Re: [Full-disclosure] Linux big bang theory....

2007-05-12 Thread Pavel Kankovsky
Wow! I have always suspected their software is so bloated that it is going to suffer a gravitational collapse sooner or later. Now it's official. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for a

Re: [Full-disclosure] Rapid integer factorization = end of RSA?

2007-04-27 Thread Pavel Kankovsky
1)q = pq(p-1). QED. Ok. Your "gypothesis" holds (sort of). We can factor N when we know its factors. What a breakthrough. Perhaps Bill Gates will mention it in "The Road Ahead II". --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resis

Re: [Full-disclosure] Internet Explorer Crash

2007-04-21 Thread Pavel Kankovsky
se a program running for N units of time cannot consume more than N units of memory (*) but this upper bound is too loose for most programs doing any useful work. (*) Or less than log_2(N) units of memory unless it is going to 1. read more inputs from the outer world or 2. loop forever. --Pavel Kan

Re: [Full-disclosure] Major gcc 4.1.1 and up security issue

2007-01-20 Thread Pavel Kankovsky
ned. Please help make the gcc > people fix this! Helping people fix their broken code and teach them how to write correct code might be more productive imho. :P --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and pr

Re: [Full-disclosure] code release: cryptographic attack tool

2007-01-20 Thread Pavel Kankovsky
onjecture. It is obvious the problem (cracking MD5) can be reduced to SAT. But can you reduce SAT to the problem? I am afraid it is impossible. (CNF formulas of arbitrary complexity vs. a linear chain of fixed width linking multiple instances of a fixed logical circuit. Who wins?) --Pavel K

Re: [Full-disclosure] Seeking comment on disclosure articles

2007-01-14 Thread Pavel Kankovsky
nd the vulnerabilities themselves (or to hire someone else to do it under a NDA). --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation." ___ Full-Disclos

Re: [Full-disclosure] emergent security properties

2006-12-26 Thread Pavel Kankovsky
. Perhaps some Byzantine "security-breach tolerant" systems? --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation." ___ Full-Disclosure

Re: [Full-disclosure] Could InfoSec be Worse than Death?

2006-09-30 Thread Pavel Kankovsky
be able to make legal copies covered by fair use either but who cares about fair use? (**) Whether they could trust their computers before they inserted an infected CD into them is an interesting but different question. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ]

Re: Re[2]: [Full-disclosure] JavaScript get Internal Address (thanks to DanBUK)

2006-08-13 Thread Pavel Kankovsky
*.metasploit.com requests. The solution is easy: do not hardwire the domain, make it configurable, and let people (who care) set up their own servers with their own domain names. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your sour

[Full-disclosure] Re: iDefense Q2 2006 Vulnerability Challenge

2006-05-20 Thread Pavel Kankovsky
e "Root access on the target machine"? Are you serious? Isn't "DBA access on the target database engine" enough for you? --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile

Re: [Full-disclosure] What is wrong with schools these days?

2006-04-26 Thread Pavel Kankovsky
malware). --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation." ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-discl

Re: [Full-disclosure] 4 Questions: Latest IE vulnerability, Firefox vs IE security, User vs Admin risk profile, and browsers coded in 100% Managed Verifiable code

2006-03-28 Thread Pavel Kankovsky
server as soon as it sends the request and replace it with a fresh "untainted" process handling (interpreting and displaying) the server's response (of course, we'd have to trust the server to never send the password back to the client, e.g to be 100% free of XSS bugs...). --P

Re: [Full-disclosure] 4 Questions: Latest IE vulnerability, Firefox vs IE security, User vs Admin risk profile, and browsers coded in 100% Managed Verifiable code

2006-03-28 Thread Pavel Kankovsky
mingly innocent piece of data passed to that native code might trigger a bug (perhaps even a buffer overflow) in it... Unlikely (read: less likely than a direct attack vector) but still possible. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is fut

Re: [Full-disclosure] 4 Questions: Latest IE vulnerability, Firefox vs IE security, User vs Admin risk profile, and browsers coded in 100% Managed Verifiable code

2006-03-27 Thread Pavel Kankovsky
. (The use of MAC to protect integrity is, in fact, an afterthought.) Properly implemented and configured MAC can prevent the leakage of confidential (i.e. sensitive personal) information to (unauthorized) web sites. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] &qu

Re: [Full-disclosure] 4 Questions: Latest IE vulnerability, Firefox vs IE security, User vs Admin risk profile, and browsers coded in 100% Managed Verifiable code

2006-03-27 Thread Pavel Kankovsky
ged code is very hard or > even impossible (at least in the current Windows Architecture), so the > only solution that I am seeing at the moment is to create sandboxes for > managed and verifiable code. I may be difficult on MS Windows. Been there, done that several times on other platfor

Re: [Full-disclosure] HTTP AUTH BASIC monowall.

2006-03-13 Thread Pavel Kankovsky
> server so that the session can be set up. IOW, you get around the > problems of trusting a cert, but you're back to storing passwords in > plaintext.) A moderate dose of modular exponentiation magic can overcome the need to store plaintext passwords on the server. See SRP

Re: [Full-disclosure] Security Bug in MSVC

2006-01-19 Thread Pavel Kankovsky
arginal cases like when you want to build an executable file intended to run on someone else's computer...) --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation."

RE: [Full-disclosure] McAfee VirusScan vs Metasploit Framework v2.x

2005-12-11 Thread Pavel Kankovsky
ve also added Nmap as "potentially unwanted > application" (http://vil.mcafeesecurity.com/vil/content/v_100955.htm) [...] Are we making a list? You can add Symantec reporting a copy of Netcat as a "hacking tool". --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/

Re: [Full-disclosure] Cisco IOS Shellcode Presentation

2005-07-30 Thread Pavel Kankovsky
n't know what this stands for, and neither did the people at Cisco I spoke with", esp. the 2nd part, is something I find rather unbelievable. Perhaps Lynn did not talk to the right people at Cisco. Or perhaps Cisco has already finished its transformation to the modern kind of bussines a

Re: [Full-disclosure] Windows is EASY and SECURE

2005-03-19 Thread Pavel Kankovsky
protecting Web servers and the computer running SQL Server" (the other things they did were not supposed to protect them or what?). No tweaking, indeed. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your

Re: [Full-disclosure] Reuters: Microsoft to give holes info to UncleSam first - responsible vendor notification may not be a goodidea any more...

2005-03-13 Thread Pavel Kankovsky
offer a service to sacrifice one of their own PHBs instead of the client's one. --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation." ___ F