Hi,
On Thu, Dec 11, 2008 at 03:45:26PM +0200, Viktor Larionov wrote:
By baking trojans, I meant trojans injecting additional payment information
into your bank transfers - e.g. you make 5 payments, but the trojan makes
also the sixth one, still browser with the help of a trojan displays you
Hi,
does anyone have good ideas on how to secure our computers better? is
it a problem at the user end, or a problem at the corporate and
government end?
It's a problem at the geek end, i.e. with the people who actually build the
systems. We like our systems to be incredibly customizeable and
Hi,
Florian Echtler さんは書きました:
Just to make myself clear: I don't think it is a viable option to create
email noise, I just pointed out that it makes more sense than TCP/HTTP
noise.
There is already enough email noise thanks to spam. It might make sense
to reply to some of it though, to
Hello,
Thomas Holt wrote:
The purpose of this research is to understand
the ways that people become interested in computers and hacking, their
motives for hacking, and how they apply their skills in different
settings. This study will also consider individuals’ conceptions of
hacking
Hello,
Cullen, Michael wrote:
Given the new threats and the change in policy with the airlines and
traveling in and around the UK, has anyone changed their laptop and
portable computing device policy? We are being questioned about the
safety of executives traveling with their laptops.
Last
Hi,
Q Beukes wrote:
I am looking for linux utility that checks if a specified machine's
network device is in promiscious mode or not.
Technically, promiscuous mode only affects packet reception, so it is
pretty difficult to detect; however most packet sniffers will not hide
the packets
Hi,
Gadi Evron wrote:
As many of us know, handling such users on tech support is not very
cost-effective to ISP's, as if a user makes a call the ISP already
losses money on that user. Than again, paying abuse desk personnel just
so that they can disconnect your users is losing money too.
Hello,
Joe Average schrieb:
It has been said on C|NET/SecurityFocus and other places that experts
are telling people to use unofficial patches, and to make things worse
the experts are releasing patches.
I agree that unofficial Windows patches are a bad thing, but not for the
reasons you
Hello,
Jamie C. Pole wrote:
Given the history of terrorist activity in Germany, I'm really
surprised that you feel the way you do - your government is benefitting
from the intelligence that is being gathered as well. Thankfully, Ms.
Merkel seems to understand that.
Which is why I'm
Hello,
Ron wrote:
In Apache 1.3.33 (untested on any other version), if you have a file
called file.php.bak, and you navigate to it in the browser, it will run
on the server as a .php file. This works with any extension that isn't
known to the server (.rar, .bak, .test, .java, .cpp, .c,
Hi,
Native.Code wrote:
Something not related to vulnerabilities you guys are requested to
suggest names for our meeting rooms. We don't want to call them with sad
names like Room A, Board Room etc. but something interesting.
The Kevin Mitnick Room.
Simon (ducksruns)
signature.asc
Hi,
Dave Ockwell-Jenner wrote:
Except the 302 room would be constantly moving around, 409 would always
be booked, 404 would be hidden away somewhere you couldn't find it, and
410 just wouldn't exist!
Well, all important decisions are made in the elevator anyway[1], so why
not assign it the
Hello,
Josh Perrymon wrote:
While performing a pen-test for a large company I found a directory
transversal vulnerability in a search program—
Were you testing for the company that produces that software? If so,
they are the customer, and since they are paying you, they get to choose
who
Hi,
[EMAIL PROTECTED] wrote:
The svchost.exe will stop to run when I stop the automatic update.
But I'm sure the IP tried to connect by the svchost is NOT MS related site.
218.213.255.29
80.15.249.167
I believe this to be automatic update. The second IP address is listed
for Akamai, which
14 matches
Mail list logo