On 2/4/2014 6:36 PM, Mark Litchfield wrote:
On 2/4/2014 3:13 PM, security curmudgeon wrote:
: This is not the behavior of the site as of 48 hours ago.
: Let me check. Normal registration should also be available ? Infact I
: will remove the registration.
:
: The purpose of this whole
On 8/28/2011 6:52 PM, Juan Sacco wrote:
This isnt a company making a big product, Im doing this because I like
doing it.
Good for you. I think that is great. But you are pretending to be a big
company. Stop that.
I am happy to see you removed that silly donation-for-download scheme.
I'm
How can you expect to be taken seriously when your Web site doesn't have
pictures of attractive, multi-ethnic women in business attire pointing
at holographic displays of random binary digits?
Bah!
Randy
On 5/23/2011 10:10 AM, Mastere NIS wrote:
Our master “/Network and Information security/”
On 05/01/2011 01:38 PM, satyam pujari wrote:
*request* Hello FD, Can anyone handle this guy please ?
Allow me to spin this broken record again...
Censorship = Bad
E-Mail Filters = Good
Take control of your inbox and don't rely on others!
Randy
___
On 3/27/2011 4:29 PM, Dan Tulovsky wrote:
Beside that, scnc is written in pure-Perl, and is easily modifiable
by anyone. Such really simple (dumb?) stuff should not be written in
low-level languages such as C.
You can't be serious...
Shirley, he is.
Perl is shite. It's a dependency hell,
On 3/30/2011 11:31 PM, r...@bellaliant.ca wrote:
The following email message was *blocked* by Bell Aliant Content
Filtering Device:
*From:* ra...@procyonlabs.com
*To:*peter.mo...@bellaliant.ca
*Subject:* Re: [Full-disclosure] SSL Capable NetCat and more
On 3/29/2011 9:13 PM, runlvl wrote:
Insecurity Research is happy to announce the release of version 2.5,
get it now while is still hot !
Insect Pro 2.5 is a penetration security auditing and testing software
solution designed to allow organizations of all sizes mitigate,
monitor and manage
On 3/29/2011 9:13 PM, runlvl wrote:
Insecurity Research is happy to announce the release of version 2.5,
get it now while is still hot !
snip
Oh! And you list the Dept. of Energy as a customer. I used to work
there, and still talk to a lot of the security offices for various
locations. They've
Thought this would be appropriate :-)
http://xkcd.com/149/
On 2/15/2011 4:00 PM, Eyeballing Weev wrote:
What do you expect from a woman?
Rebecca, kindly make me a sandwich
On 02/15/2011 03:44 PM, Cal Leeming [Simplicity Media Ltd] wrote:
I did apologise, no need to drag it out into the
On 12/15/2010 5:00 PM, BMF wrote:
2010/12/15 musnt live musntl...@gmail.com:
What is this time to stop the press!
This fake broken English schtick is really stupid and annoying. Knock
it off. In the meantime you are kill filed. I suggest everyone else do
the same as nothing useful has ever
On 12/10/2010 10:10 AM, John Horn wrote:
Is this a joke?
--
John Horn
City of Tucson, IT Department
Network Services (Network security)
Phone: (520) 837-6036
--
CONFIDENTIALITY NOTICE: If you have received this
I find it humorous that an organization that pretends to be a bank and
regularly steals money from its members has the balls to distribute a
PayPal Responsible Disclosure Policy.
Good luck with that.
Randy
On Fri, March 26, 2010 10:49 pm, Orbeton, Jon wrote:
All:
The XSS vulnerability
On Fri, March 12, 2010 1:45 pm, Michal Zalewski wrote:
http://www.securityfocus.com/news/11582
While the news portal section of SecurityFocus will no longer be
offered, we think our readers will be better served by this change as
we combine our efforts with Symantec Connect and continue to
Decent attempt at trolling. Some beginner mistakes, but the message was
relayed as intended (I'm sure). Comments inline.
On Fri, February 19, 2010 6:45 pm, John Q Public wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1
Greetings.
I've been holding this one back for a while. It's been
The Sp3ctacle wrote:
http://www.ipetitions.com/petition/mudge4cyberczar/index.html
This petition is posted in support for the nomination of Peiter Zatko
(aka mudge) to the President's post of Cybersecurity Chief. We've all
seen how effective past efforts have been regarding this initiative,
It's fun :-)
On Mon, September 14, 2009 12:14 pm, D-vice wrote:
You wrote an exploit in java
*head explodes*
On Mon, Sep 14, 2009 at 6:02 AM, Randal T. Rioux
ra...@procyonlabs.comwrote:
After testing my version of the exploit (using Java instead of Python) I
tried it against
On Mon, September 14, 2009 12:02 am, Randal T. Rioux wrote:
After testing my version of the exploit (using Java instead of Python) I
tried it against a Windows Server 2008 R2 installation - it went down.
http://www.procyonlabs.com/software/smb2_bsoder
Randy
laurent gaffie wrote:
Advisory
After testing my version of the exploit (using Java instead of Python) I
tried it against a Windows Server 2008 R2 installation - it went down.
http://www.procyonlabs.com/software/smb2_bsoder
Randy
laurent gaffie wrote:
Advisory updated :
=
-
On Thu, July 23, 2009 5:47 pm, Compsec Guy wrote:
What's wrong with Slashdot today?
Nothing.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On Mon, March 30, 2009 8:14 pm, jmoss wrote:
Hey Full Disclosure,
I am proud to announce that the audio and video from BH USA 2008 is now
available for free download, and is in several formats, the first of which
is a large, hi-res format with video-sync speaker and presentation:
On Tue, November 25, 2008 1:44 am, Memisyazici, Aras wrote:
SSNNIIPP
OK... Maybe I'm going a bit extreme, but WTH?! Am I the only one who is
interpreting this, this way? Really? When has releasing a solution to a
problem 7 years later ever been acceptable?
May not be acceptable, but it is
On Mon, September 15, 2008 1:08 pm, n3td3v wrote:
On Mon, Sep 15, 2008 at 5:49 PM, [EMAIL PROTECTED] wrote:
On Mon, 15 Sep 2008 08:09:12 BST, n3td3v said:
n3td3v is outspoken but hes not a troll. he is a serious security
researcher with his own mailing list.
...
and then someone hurtfully
On Tue, Sep 2, 2008 at 11:07 AM, n3td3v [EMAIL PROTECTED] wrote:
you've not post any security news all week, what's going on cnet??? is
the journalist that does the security news off ill???
:(
yours,
cnet fan
surely they will cave to pressure from the global powers of the netdev
group. i
On Wed, August 27, 2008 11:34 am, Simon Smith wrote:
Hi Mike,
Next time you decide to say something stupid make sure that you do it
anonymously.
Michael C Shirk
Home:
4205 Chapel Gate Pl
Belcamp, MD 21017-1636
(410) 273-1377
M. Shirk wrote:
DIE IN A FIRE !!!1!1!
Shirkdog
' or
On Tue, July 29, 2008 2:31 pm, [EMAIL PROTECTED] wrote:
You might eliminate phishing but there are occasionally messages from
people at these institutions also. This sort of thing is in essence
allowing phishers a denial of service attack against anyone they choose
to make themselves a
On Fri, July 4, 2008 7:02 am, Panda Security Response wrote:
Please allow at least one week for us to respond before public
disclousure. We only received this information a few days ago.
Regards,
-- Pedro Bustamante Senior
Research Advisor Panda
FYI - http://www.emergingthreats.net
This was discussed on the snort-sigs mailing list back in 2003. Check out
http://marc.info/?l=snort-sigsm=106601612825950w=2
Also, as Ray mentioned, the Emerging Threats emerging-policy.rules
contains some PCRE CC# checks. This will show you some:
$ more
On Fri, May 9, 2008 4:23 am, West, Bill (USA) wrote:
I am no longer on-site full time and have limited access to e-mail. I will
respond to you as soon as I can. If your issue is an emergency, please use
the contacts below.
Emergencies for MTU Users: Contact Augustin Schuster, +1-860-667-6620
On Fri, April 11, 2008 4:41 pm, n3td3v wrote:
I'm an unemployed working class dude, i'm not part of the industry.
Can one be unemployed and working class at the same time?
If one works in security in a capacity to earn an income, would that not
automatically place them in the industry?
On Wed, March 12, 2008 4:57 am, Gadi Evron wrote:
Almost a year ago I gave a talk at the CCC Camp in Germany I called
hacking
the bionic man. It even made Wired, in some fashion.
http://blog.wired.com/27bstroke6/2007/08/will-the-bionic.html
I always think of these pics when those precious snowflakes post nonsense:
http://i118.photobucket.com/albums/o100/EMPulse_of_KC/itg_quarterly.jpg
http://www.stevelambe.com/posts/Nerd.jpg
http://www.encyclopediadramatica.com/images/8/88/Itg.jpg
Attention whores, the lot of them.
Par for the
Fredrick Diggle Security Advisory
Application: Notepad
Versions: 5.1.2600.2180 verified to be vulnerable
Platforms: Microsoft Windows (All Versions)
Bugs: Cross Site Scripting (XSS)
Severity: Critically High
Date: 17 Jan 2008
Credit: Estr Hinan
[EMAIL PROTECTED] said:
Bonus points for knowing that VMS was mostly written in Bliss/32 or some
such, and VM and MVS were a mixture of assembler and (later on) PL/S.
No C knowledge needed for those critters...
OpenVMS is less than 40% Blissful... though I'm not familiar with the original
snip hack snip snip
QuiteMove
http://www.quitemove.com
QuietMove
snip snip hack snip
A tad more attention to details would be nice.
Good thing you're not graded on spelling here. C-.
Happy New Year,
Randy
___
Full-Disclosure - We believe in it.
minor float wrote:
hi
has anybody security contact in att?
http://www.nsa.gov/contacts/index.cfm
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
http://uncyclopedia.org/wiki/Pot_v._Kettle
Kradorex Xeron wrote:
Simon and Joey,
Your comments are not contributing anything of value to the list and is
causing SNR of the list to go down.
I strongly suggest for you to both take your personal banter off-list. I
suspect that the rest
Muscarella, Sebastian (IT) wrote:
snip
NOTICE: If received in error, please destroy and notify sender. Sender
does not intend to waive confidentiality or privilege. Use of this email
is prohibited when received in
Paul Schmehl wrote:
SNIP
You seem to be living under the delusion that your actions can somehow
influence the extremists. There's only two actions that will influence
the extremists in any way and that is to kill or imprison them.
Anything else you might try, like trying to make nice with
Blue Boar wrote:
dfklsddshd wrote:
1. Open attachment.
Does this actually work on people on a security mailing list?
BB
Complete scanning result of Simcard.com, received in VirusTotal at
01.02.2007, 02:38:58 (CET).
SNIP
you would be quite
Josh Bressers wrote:
eEye Research - http://research.eeye.com
Intel Network Adapter Driver Local Privilege Escalation
Release Date:
December 7, 2006
Date Reported:
July 10, 2006
Severity:
Medium (Local Privilege Escalation to Kernel)
Systems Affected:
Windows 2000, XP, 2003, Vista
Thierry Zoller wrote:
Dear List ,
Search the Enron mail archives, for example Password :
http://enron.trampolinesystems.com/search/FBI#focus=/search/password
I hope this code was changed:
*
Aspen Security Codes
Email details
From:
Sally Keepers
William Lefkovics wrote:
Tangental to this discussion is the no doubt (to be) controversial UK film
D.O.A.P. soon to be screening in Toronto.
http://www.e.bell.ca/filmfest/2006/media_centre/news_releaseItem.asp?id=261
It's a docu-drama of the possible ramifications following the ficticious
Paul Schmehl wrote:
--On Tuesday, August 29, 2006 17:34:24 -0400 [EMAIL PROTECTED] wrote:
On Tue, 29 Aug 2006 14:55:09 CDT, Paul Schmehl said:
1] Hezbollah has managed to become an important presence in the
Lebanese Parliament
They just left out - by killing opposition leaders and
Mike Owen wrote:
Sounds like IBM is going to buy out ISS. Having too much experience in
dealing with IBM contractors and support, I don't think this is a good
thing for ISS or their customers.
http://www.iss.net/about/press_center/releases/us_ibm_08233006.html
You would think IBM would try
[EMAIL PROTECTED] wrote:
On Sat, 19 Aug 2006 18:49:09 -0500 Bipin Gautam
[EMAIL PROTECTED] wrote:
Ok, here is something from the book that I was trying to
assemble/write.
Some Links: http://www.eskimo.com/~joelm/tempest.html
http://www.erikyyy.de/tempest/
Lets begin
SNIP SNIP SNIP
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Gary E. Miller wrote:
Yo All!
I thought I'd actually risk a real security question here.
Any one seen the PassMark (www.passmarksecurity.com) security system
in action?
Yes.
Bank of Bangalore^H^H^H^H^H^H^H^H^HAmerica uses it, as well
Jason Areff wrote:
Those acronoyms prove that I know more than you apparently. Way to
demonstrate your l33t hax0r skills.
Jason Areff
CISSP, A+, MCSE, Security+ == Better than Steven Rakick
I haven't heard someone brag about an MCSE in almost a decade.
The + ones are just pay to have.
or something.
I do appreciate your goal, however this is a dirty and nasty arena. It
was designed to be an alternative to the cleansed and censored corporate
controlled lists.
I must say, FD is still friendlier than the underground BBSs of the 80's
90's. Good times.
Randal T. Rioux | Procyon Labs
[EMAIL PROTECTED] wrote:
If you are interested in bidding. I can provide you wtih an
account to provide the funds. Social Security numbers are for
American citizens only so don't assume I am such a person.
I'll start the bidding at $1.25 USD. Do you take checks?
I have a slighty used
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Brian Eaton wrote:
On 4/22/06, Sol Invictus [EMAIL PROTECTED] wrote:
What you don't realize is that just by posting here that an Educational
Institution
is vulnerable to this, Some Readers (not me) might already be scanning for
web
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Rodrigo Barbosa wrote:
On Wed, Apr 19, 2006 at 07:09:11AM +0100, n3td3v wrote:
On 4/19/06, Randal T. Rioux [EMAIL PROTECTED] wrote:
I don't think the industry needs someone to verify an advisory for them.
Actually, you are wrong
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
n3td3v wrote:
If they did something special with their website like Securityfocus
does, then I might be able to bare their illegal footer message spam,
and their scene whore republication of advisories they claim are
Secunia exclusives.
No. He needs to disconnect from AOL because his sister needs the phone
and his mom just yelled to him in the basement to come up for dinner.
php0t wrote:
You need a hug.
-Original Message-
*From:* [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] *On Behalf Of *n3td3v
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Gadi Evron wrote:
snip.cut.hack
of security attitude I wonder why anybody believes OpenBSD is the most
secure OS around.
No - that would be OpenVMS duck! :-)
At least until HP kills it.
Randy. still wondering what is 'open' about
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Javor Ninov wrote:
do you realize that your so-called popularity is based on the fact that
FD is not moderated ? strange .. i don't see you on securityfocus.com
n3td3v wrote:
No THINK required, IS BIG, FACT.
Not to defend the mighty
Dave Korn wrote:
nodialtone wrote:
Google funzies.
[Snip]
Reference:
http://seclists.org/lists/fulldisclosure/2006/Feb/0553.html
Ok, I give up. Why are you posting a report to the full-disclosure list
to announce a post that was posted to... the full-disclosure list? Is this
56 matches
Mail list logo