Re: [Full-disclosure] FW: 21 Million German bank accounts stolen - but accounts are still more secure than many other ones

2008-12-12 Thread Simon Richter
Hi, On Thu, Dec 11, 2008 at 03:45:26PM +0200, Viktor Larionov wrote: By baking trojans, I meant trojans injecting additional payment information into your bank transfers - e.g. you make 5 payments, but the trojan makes also the sixth one, still browser with the help of a trojan displays you

Re: [Full-disclosure] Securing our computers?

2008-11-03 Thread Simon Richter
Hi, does anyone have good ideas on how to secure our computers better? is it a problem at the user end, or a problem at the corporate and government end? It's a problem at the geek end, i.e. with the people who actually build the systems. We like our systems to be incredibly customizeable and

Re: [Full-disclosure] Standing Up Against German Laws - Project HayNeedle

2007-11-18 Thread Simon Richter
Hi, Florian Echtler さんは書きました: Just to make myself clear: I don't think it is a viable option to create email noise, I just pointed out that it makes more sense than TCP/HTTP noise. There is already enough email noise thanks to spam. It might make sense to reply to some of it though, to

Re: [Full-disclosure] Call For Participants For A Research Study Of Hacker Culture

2006-12-08 Thread Simon Richter
Hello, Thomas Holt wrote: The purpose of this research is to understand the ways that people become interested in computers and hacking, their motives for hacking, and how they apply their skills in different settings. This study will also consider individuals’ conceptions of hacking

Re: [Full-disclosure] New Laptop Polices

2006-08-11 Thread Simon Richter
Hello, Cullen, Michael wrote: Given the new threats and the change in policy with the airlines and traveling in and around the UK, has anyone changed their laptop and portable computing device policy? We are being questioned about the safety of executives traveling with their laptops. Last

Re: [Full-disclosure] Promiscious Device Detection

2006-03-09 Thread Simon Richter
Hi, Q Beukes wrote: I am looking for linux utility that checks if a specified machine's network device is in promiscious mode or not. Technically, promiscuous mode only affects packet reception, so it is pretty difficult to detect; however most packet sniffers will not hide the packets

Re: [Full-disclosure] Quarantine your infected users spreading malware

2006-02-21 Thread Simon Richter
Hi, Gadi Evron wrote: As many of us know, handling such users on tech support is not very cost-effective to ISP's, as if a user makes a call the ISP already losses money on that user. Than again, paying abuse desk personnel just so that they can disconnect your users is losing money too.

Re: [Full-disclosure] Unofficial Microsoft patches help hackers, not security

2006-01-04 Thread Simon Richter
Hello, Joe Average schrieb: It has been said on C|NET/SecurityFocus and other places that experts are telling people to use unofficial patches, and to make things worse the experts are releasing patches. I agree that unofficial Windows patches are a bad thing, but not for the reasons you

Re: [Full-disclosure] [Clips] A small editorial about recent events.(fwd)

2005-12-19 Thread Simon Richter
Hello, Jamie C. Pole wrote: Given the history of terrorist activity in Germany, I'm really surprised that you feel the way you do - your government is benefitting from the intelligence that is being gathered as well. Thankfully, Ms. Merkel seems to understand that. Which is why I'm

Re: [Full-disclosure] Bug with .php extension?

2005-12-05 Thread Simon Richter
Hello, Ron wrote: In Apache 1.3.33 (untested on any other version), if you have a file called file.php.bak, and you navigate to it in the browser, it will run on the server as a .php file. This works with any extension that isn't known to the server (.rar, .bak, .test, .java, .cpp, .c,

Re: [Full-disclosure] Meeting Room Names

2005-11-09 Thread Simon Richter
Hi, Native.Code wrote: Something not related to vulnerabilities you guys are requested to suggest names for our meeting rooms. We don't want to call them with sad names like Room A, Board Room etc. but something interesting. The Kevin Mitnick Room. Simon (ducksruns) signature.asc

Re: [Full-disclosure] Meeting Room Names

2005-11-09 Thread Simon Richter
Hi, Dave Ockwell-Jenner wrote: Except the 302 room would be constantly moving around, 409 would always be booked, 404 would be hidden away somewhere you couldn't find it, and 410 just wouldn't exist! Well, all important decisions are made in the elevator anyway[1], so why not assign it the

Re: [Full-disclosure] Publicly Disclosing A Vulnerability

2005-10-05 Thread Simon Richter
Hello, Josh Perrymon wrote: While performing a pen-test for a large company I found a directory transversal vulnerability in a search program— Were you testing for the company that produces that software? If so, they are the customer, and since they are paying you, they get to choose who

Re: [Full-disclosure] svchost.exe try to send http outside

2005-08-17 Thread Simon Richter
Hi, [EMAIL PROTECTED] wrote: The svchost.exe will stop to run when I stop the automatic update. But I'm sure the IP tried to connect by the svchost is NOT MS related site. 218.213.255.29 80.15.249.167 I believe this to be automatic update. The second IP address is listed for Akamai, which