Re: RE[Full-disclosure] WMF Risk Analysis for Win9X anyone ?

2006-01-06 Thread Technica Forensis
> >What ARE the real risks (or lack of them) for Win9X/ME systems ? I think the risk he is that they are running Win9x/ME. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secu

Re: [Full-disclosure] WMF Exploit

2006-01-04 Thread Technica Forensis
> I have 2 win98 machines here, my own and a customer's, both are unpatched, > (one runs IE6 sp1 the other IE 5.5) I cannot find shimgvw.dll on either. is GDI32.dll on either of those systems? ref: http://www.viruslist.com/en/weblog?discuss=176892530&return=1 _

Re: Fwd: [Full-disclosure][WAY OFF TOPIC] complaints about the government spying!

2006-01-03 Thread Technica Forensis
> burst your bubble buddy, but I am a dyed in the wool republican freak who > has never, - EVER - , voted for a Dem. Of course, I've never voted for > Shrub either... Two questions for y'all: 1 - shouldn't you pick the most qualified candidate instead of the one that happened to pick the same pa

Re: [Full-disclosure][WAY OFF TOPIC] complaints about the governemnt spying!

2005-12-30 Thread Technica Forensis
> Calling me a moron without telling me why is STUPID :) You are all morons for insisting on furthering a political debate on an information security forum with people who know neither tact, restraint, nor empathy. ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] Let's check out cocc.com

2005-12-30 Thread Technica Forensis
should we all call his cell phone? On 12/30/05, Dave Horsfall <[EMAIL PROTECTED]> wrote: > Another out-of-orifice reply... > > -- Dave > > -- Forwarded message -- > Date: Fri, 30 Dec 2005 04:20:28 -0500 > From: "Preston, Ian" <[EMAIL PROTECTED]> > To: Dave Horsfall <[EMAIL PROTECT

Re: [Full-disclosure] complaints about the governemnt spying!

2005-12-29 Thread Technica Forensis
> Or have you already forgetten that terrorists have been killing us (and > many others around the world) since the 1970's without pause? It's been going on for A LOT longer than that. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.or

Re: [Full-disclosure] Snort as IDS/IPS in mission-critical enterprise network

2005-12-09 Thread Technica Forensis
> what ever happened to FPGA/hardware based NIDS classifiers? There > seemed to be a number of papers and even some open source (open cores) > code to do 10GigE with ease. > > still in the research labs? http://www.cloudshield.com and have your pocketbook ready, 'cause it ain't cheap. ___

Re: [Full-disclosure] SANS Stuff

2005-12-05 Thread Technica Forensis
, than SANS's 'class' will cover ;-) (you're welcome, Stephen) On 12/5/05, c0ntex <[EMAIL PROTECTED]> wrote: > On 05/12/05, Technica Forensis <[EMAIL PROTECTED]> wrote: > > what are floppies formatted with, again? as bad as FAT is, it's > > hardl

Re: [Full-disclosure] SANS Stuff

2005-12-05 Thread Technica Forensis
what are floppies formatted with, again? as bad as FAT is, it's hardly outdated. most people focus on the big picture and never learn the guts of the file system, so a class like this is extremely useful - especially in the forensics arena. On 12/5/05, c0ntex <[EMAIL PROTECTED]> wrote: > On 05/1

Re: [Full-disclosure] Enough's enough...

2005-11-14 Thread Technica Forensis
On 11/14/05, Samuel Beckett <[EMAIL PROTECTED]> wrote: > > http://forum.crime-research.org/teech-me-how-to-hack-vt6.html?highlight= > > "I'm I want to become a hacker. By the way, whats "netbus"?" > Posted: Sun Mar 27, 2005 7:30 pm > > http://www.geocities.com/n3td3v/home/about.html > > "Extensive

Re: [Full-disclosure] new IE bug (confirmed on ALL windows)

2005-11-02 Thread Technica Forensis
> > And my dick is longer than yours. > > Unless that's what you do your code analysis with, it's immaterial. And if it > *is* what you do your code analysis with, all I can say is: > > Eww. That's just... wrong. Get professional help, fast. > Full-disclosure is taking on a whole new meaning...

Re: [Full-disclosure] Is this a phishing attempt?

2005-08-25 Thread Technica Forensis
On 8/24/05, winsoc <[EMAIL PROTECTED]> wrote: > I seriously cannot believe that someone would be so mundane in > thinking that people would reply to this. I have heard of several cases of people giving up hundreds of thousands of dollars and even flying to Nigeria to personally meet the 'prince'.

Re: [Full-disclosure] talk.google.com

2005-08-25 Thread Technica Forensis
> I don't understand the big fuss over google talk. I think the fuss has to do with the 'Privacy' paragraph in the terms of service: "You agree that Google may access or disclose your personal information, including the content of your communications" and "Personal information collected by Google

Re: [Full-disclosure] An old/new security list

2005-08-23 Thread Technica Forensis
On 8/22/05, Ill will <[EMAIL PROTECTED]> wrote: > thinking security-minded people always backed up their hdds daily :D > Real men don't do backups, they just put their work on an FTP site and let the world mirror it. --Linus Torvalds ___ Full-Disclosure

Re: [Full-disclosure] The Cisco media frenzy

2005-08-19 Thread Technica Forensis
It is rather humourous to see: > > -snip- To see these self proclaimed hackers > > goto Blackhat and Defcon is a complete joke. and > > The best security team is http://groups-beta.google.com/group/n3td3v in the same message. Sounds like self-proclaimation to me. __

Re: [Full-disclosure] Disney Down?

2005-08-19 Thread Technica Forensis
On 8/17/05, Jason Coombs <[EMAIL PROTECTED]> wrote: > What about attacks that took place with the worms as cover? How many high- > value systems just got compromised, and will remain so, by something other > than the worms' code -- where the victim won't even bother to investigate > that > possi

Re: [Full-disclosure] Fw: US-CERT Technical Cyber Security Alert TA05-224A -- VERITAS Backup Exec Uses Hard-Coded Authentication Credentials

2005-08-13 Thread Technica Forensis
Jason Coombs wrote: > "responsible disclosure" causes serious harm to people. It is no > different than being an accessory to the intentional destruction of > innocent lives. But then when an alert was posted to full-disclosure that didn't include the details about how to actually exploit the vuln

Re: [Full-disclosure] Re: Help put a stop to incompetent computer forensics

2005-08-10 Thread Technica Forensis
> From: > > http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29 > > In practice, Trojan Horses in the wild do contain spying functions (such > as a Packet sniffer) or backdoor functions that allow a computer, > unbeknownst to the owner, to be remotely controlled remotely from the > network,

Re: [Full-disclosure] Help put a stop to incompetent computer forensics

2005-08-10 Thread Technica Forensis
> After a trivial Google search, the following was found: After all, any experienced computer forensics person should know how to use Google. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted an

Re: [Full-disclosure] Re: Help put a stop to incompetent computer forensics

2005-08-10 Thread Technica Forensis
> Interesting. What dictionary are you reading this definition from? Industry standard > Whether or not the malware does other things as well, everyone I know > considers a Trojan to be a type of malware that allows an intruder to > gain entry to a system through the front door once the malware

Re: [Full-disclosure] Cisco IOS Shellcode Presentation

2005-08-01 Thread Technica Forensis
> CAUTION: > Internet and e-mail communications are Kohl's property and Kohl's reserves > the > right to retrieve and read any message created, sent and received. Kohl's owns the Internet? Kohl's reserves the right to read my email I send my mom just because it's on the Internet? maybe you