On Fri, Feb 21, 2014 at 10:46 PM, Trevor Bergeron wrote:
> Looks like root and intermediate certificate hashes to me, but Google
> doesn't recognize them.
>
I was guessing it was hashes to either one pre-compiled exploit with two
architectures, or two separate exploits, in the later stages of a
I just don't find this kind of visualization helpful.
-r
Gadi Evron wrote:
> The upcoming issue will be about cyber war. Check out the front page image:
>
> http://sphotos.ak.fbcdn.net/hphotos-ak-snc3/hs488.snc3/26668_410367784059_6013004059_4296972_499550_n.jpg
>
> Gadi.
> __
Defending IT is frequently *harder* to do and sometimes involves hacking IT.
both enjoy the challenge.
-rick
RandallM wrote:
> answer me this riddle:
>
> Why do you chose to
>
> Hack IT?
>
> Defend IT?
>
>
___
Full-Di
On Wed, Jul 15, 2009 at 12:03 PM, Rick R wrote:
> Does your mother know you're doing this? It seems curious that Ant-Sec
> popped up right around the time summer vacation started. This is what you're
> doing with your extra 8 hours a day previously taken up by classes and
d by dust and sweat and blood, who strives valiantly, who errs and
comes up short again and again, because there is no effort without error
or shortcoming, but who knows the great enthusiasms, the great devotions,
who spends himself for a worthy cause; who, at the best, knows, in the
end, the t
or System Security and Information Assurance (www.cssia.org) come to
mind. i'm sure there are others.
Rick
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by
ot of people who are of the opinion that "if you have to ask
> where to find a copy of Sasser, you're not clued enough to be trusted with
> a copy".
perhaps the next time you need a doctor, the one you find will laugh at
you with the same sense of elitism you demonstr
-Original Message-
From: Brendan Dolan-Gavitt [mailto:[EMAIL PROTECTED]
Sent: Wednesday, August 30, 2006 9:58 AM
To: Renshaw, Rick (C.)
Cc: Dude VanWinkle; Adriel Desautels; full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Secure OWA
>On 8/30/06, Renshaw, Rick
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dude
VanWinkle
Sent: Saturday, August 26, 2006 2:30 PM
To: Adriel Desautels
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Secure OWA
> The only real fault I know about is the fact th
>-Original Message-
>From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jamie C.
Pole
>Sent: Sunday, December 18, 2005 11:13 PM
>To: full-disclosure@lists.grok.org.uk
>Subject: Re: [Full-disclosure] [Clips] A small editorial about recent
events.(fwd)
>
>On Dec 18, 2005, at 10:11
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Friday, December 02, 2005 6:39 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Most common keystroke loggers?
On Sat, Dec 03, 2005 at 12:22:17PM +1300, Nick Fi
On Thu, 7 Jul 2005, Reece Mills wrote:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_IMISERV.A
http://securityresponse.symantec.com/avcenter/venc/data/backdoor.imiserv.html
Why did you include these links? Where, in my original mail, did I
intimate this was the type of
12 matches
Mail list logo